Mudanças entre as edições de "Vpn"
(Criou página com '-- Setting up a Linux OpenVPN client -- You need to generate new keys (or use existing other client/username keys) for the new client/username On the serve (nao necessário,...') |
(Sem diferença)
|
Edição das 02h20min de 7 de maio de 2015
-- Setting up a Linux OpenVPN client --
You need to generate new keys (or use existing other client/username keys) for the new client/username
On the serve (nao necessário, pois a UFRGS faz isso e disponibilia os arquivos no chasque servicos):
cd easy-rsa . vars ./build-key username
Ná máquina na tua casa:
In the following, replace MyClient with a descriptive vpn connection name.
- Copy username.key, username.crt and ca.crt from server to /etc/openvpn/MyClient/.
cp -ai /usr/share/doc/openvpn*/sample-config-files/client.conf /etc/openvpn/MyClient.conf
- Edit /etc/openvpn/MyClient.conf appropriately to set your configuration (just like server configuration, port, compression,..) and key paths.
ln -s /lib/systemd/system/openvpn@.service /etc/systemd/system/openvpn@MyClient.service systemctl enable openvpn@MyClient.service systemctl start openvpn@MyClient.service
check /var/log/messages if things didn't work as expected
Alternatively, on the client, after copying the keys onto the client machine, you can use NetworkManager to add a vpn connection. Make sure you have the NetworkManager-openvpn package installed. Then just add a new VPN connection.
Should also test automatic starting at boot up, with password protected key files and maybe even --auth-user-pass. OpenVPN supports systemd's password passing if build with --enable-systemd via ./configure
Veja
http://www.ufrgs.br/cpd/servicos/redes-e-comunicacao/pasta-tutoriais/tutorial-vpn-linux