This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
documentation:general:vpn:vpn_service_provider [2015/10/23 11:18] admin [Torguard] |
documentation:general:vpn:vpn_service_provider [2018/05/24 09:05] (current) |
||
|---|---|---|---|
| Line 43: | Line 43: | ||
| - Choose device-type 'TUN' | - Choose device-type 'TUN' | ||
| - | {{:documentation:general:vpn:openvpn-upload-config.png?direct|}} | + | {{:documentation:general:vpn:openvpn-enabled.png?600|}} |
| + | {{:documentation:general:vpn:openvpn-certificates.png?600|}} | ||
| ==== Create authentication file ==== | ==== Create authentication file ==== | ||
| - | 1) enable SSHd | + | For using an authentication file change the Operation Mode to 'Use Custom Configutation File'. |
| - | {{:documentation:general:vpn:dropbear-enable-ssh.png?direct|}} | + | Create an Empty text-file on your Computer with an Editor of Choice(e.g. Notepad) |
| + | * this must not be an .docx, .rtf or other binary format file, but a plain text-file | ||
| + | |||
| + | The first line of the created file, should contain the Username, for your VPN access | ||
| + | |||
| + | The second line should contain the according password for the VPN access | ||
| + | |||
| + | Save and Close the file, then copy the text-file to the router as for [[:ssh_and_scp|SSH and SCP]] to the router at the location "/etc/vpnuserpass.conf" | ||
| - | 2) edit authentication file | ||
| ===== Pre-Configs ===== | ===== Pre-Configs ===== | ||
| Line 187: | Line 194: | ||
| tls-client | tls-client | ||
| remote-cert-tls server | remote-cert-tls server | ||
| - | status openvpn-status.log | ||
| - | daemon | ||
| <ca> | <ca> | ||
| -----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | ||
| Line 245: | Line 250: | ||
| <code> | <code> | ||
| + | # | ||
| + | #Set the Server of Choice | ||
| remote us-west.privateinternetaccess.com 1194 | remote us-west.privateinternetaccess.com 1194 | ||
| + | # | ||
| + | # | ||
| client | client | ||
| - | auth-user-pass /etc/vpnuserpass.conf | + | management 127.0.0.1 14 |
| - | management 127.0.0.1 5001 | + | management-log-cache 250 |
| - | management-log-cache 50 | + | status openvpn-status.log |
| - | dev tun0 | + | |
| proto udp | proto udp | ||
| comp-lzo adaptive | comp-lzo adaptive | ||
| Line 267: | Line 275: | ||
| tls-client | tls-client | ||
| remote-cert-tls server | remote-cert-tls server | ||
| - | log-append piavpn.log | ||
| status-version 3 | status-version 3 | ||
| - | status status | + | <ca> |
| - | daemon | + | |
| - | <cert> | + | |
| -----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | ||
| MIID2jCCA0OgAwIBAgIJAOtqMkR2JSXrMA0GCSqGSIb3DQEBBQUAMIGlMQswCQYD | MIID2jCCA0OgAwIBAgIJAOtqMkR2JSXrMA0GCSqGSIb3DQEBBQUAMIGlMQswCQYD | ||
| Line 295: | Line 300: | ||
| llQlzAzFiIfabACTQn84QLeLOActKhK8hFJy2Gy6 | llQlzAzFiIfabACTQn84QLeLOActKhK8hFJy2Gy6 | ||
| -----END CERTIFICATE----- | -----END CERTIFICATE----- | ||
| - | </cert> | + | </ca> |
| </code> | </code> | ||