This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
documentation:general:vpn:vpn_service_provider [2015/10/23 11:18] admin [Torguard] |
documentation:general:vpn:vpn_service_provider [2018/05/24 09:05] (current) |
||
---|---|---|---|
Line 43: | Line 43: | ||
- Choose device-type 'TUN' | - Choose device-type 'TUN' | ||
- | {{:documentation:general:vpn:openvpn-upload-config.png?direct|}} | + | {{:documentation:general:vpn:openvpn-enabled.png?600|}} |
+ | {{:documentation:general:vpn:openvpn-certificates.png?600|}} | ||
==== Create authentication file ==== | ==== Create authentication file ==== | ||
- | 1) enable SSHd | + | For using an authentication file change the Operation Mode to 'Use Custom Configutation File'. |
- | {{:documentation:general:vpn:dropbear-enable-ssh.png?direct|}} | + | Create an Empty text-file on your Computer with an Editor of Choice(e.g. Notepad) |
+ | * this must not be an .docx, .rtf or other binary format file, but a plain text-file | ||
+ | |||
+ | The first line of the created file, should contain the Username, for your VPN access | ||
+ | |||
+ | The second line should contain the according password for the VPN access | ||
+ | |||
+ | Save and Close the file, then copy the text-file to the router as for [[:ssh_and_scp|SSH and SCP]] to the router at the location "/etc/vpnuserpass.conf" | ||
- | 2) edit authentication file | ||
===== Pre-Configs ===== | ===== Pre-Configs ===== | ||
Line 187: | Line 194: | ||
tls-client | tls-client | ||
remote-cert-tls server | remote-cert-tls server | ||
- | status openvpn-status.log | ||
- | daemon | ||
<ca> | <ca> | ||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | ||
Line 245: | Line 250: | ||
<code> | <code> | ||
+ | # | ||
+ | #Set the Server of Choice | ||
remote us-west.privateinternetaccess.com 1194 | remote us-west.privateinternetaccess.com 1194 | ||
+ | # | ||
+ | # | ||
client | client | ||
- | auth-user-pass /etc/vpnuserpass.conf | + | management 127.0.0.1 14 |
- | management 127.0.0.1 5001 | + | management-log-cache 250 |
- | management-log-cache 50 | + | status openvpn-status.log |
- | dev tun0 | + | |
proto udp | proto udp | ||
comp-lzo adaptive | comp-lzo adaptive | ||
Line 267: | Line 275: | ||
tls-client | tls-client | ||
remote-cert-tls server | remote-cert-tls server | ||
- | log-append piavpn.log | ||
status-version 3 | status-version 3 | ||
- | status status | + | <ca> |
- | daemon | + | |
- | <cert> | + | |
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | ||
MIID2jCCA0OgAwIBAgIJAOtqMkR2JSXrMA0GCSqGSIb3DQEBBQUAMIGlMQswCQYD | MIID2jCCA0OgAwIBAgIJAOtqMkR2JSXrMA0GCSqGSIb3DQEBBQUAMIGlMQswCQYD | ||
Line 295: | Line 300: | ||
llQlzAzFiIfabACTQn84QLeLOActKhK8hFJy2Gy6 | llQlzAzFiIfabACTQn84QLeLOActKhK8hFJy2Gy6 | ||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | ||
- | </cert> | + | </ca> |
</code> | </code> |