OpenVPN Server Centos6
Проверяем наличие устройства tun
nano /etc/openvpn/server.conf
status /var/log/openvpn-status.log
mkdir -p /etc/openvpn/easy-rsa/keys
export KEY_COUNTRY="RU"
export KEY_PROVINCE="NW"
export KEY_CITY="Moscow"
export KEY_ORG="OrgName"
export KEY_EMAIL="me@myhost.mydomain"
export KEY_OU="MyOrganizationalUnit"
# X509 Subject Field
export KEY_NAME="EasyRSA"
cd /etc/openvpn/easy-rsa
/etc/openvpn/
mkdir /var/log/openvpn
nano /etc/openvpn/openvpn.conf
file /dev/net/tun
/dev/net/tun: character special
yum install epel-release
yum -y install openvpn easy-rsa
chkconfig openvpn on
cp /usr/share/doc/openvpn-2.4.7/sample/sample-config-files/server.conf /etc/openvpn/
local 192.168.10.222
server 10.8.0.0 255.255.255.0
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 1.1.1.1"
user nobody
group nobody
log-append /var/log/openvpn.log
dh dh1024.pem
tls-auth server.key 0 # This file is secret
mkdir -p /etc/openvpn/easy-rsa/keys
cp -r /usr/share/easy-rsa/3.0/* /etc/openvpn/easy-rsa/
mcedit /etc/openvpn/easy-rsa/vars
export KEY_PROVINCE="NW"
export KEY_CITY="Moscow"
export KEY_ORG="OrgName"
export KEY_EMAIL="me@myhost.mydomain"
export KEY_OU="MyOrganizationalUnit"
# X509 Subject Field
export KEY_NAME="EasyRSA"
source ./vars
./easyrsa init-pki
./easyrsa build-ca
./easyrsa gen-req server nopass
./easyrsa sign-req server server
./easyrsa gen-req client2 nopass
./easyrsa sign-req client2 client
./easyrsa gen-dhcp ./pki/dh.pem /etc/openvpn/dh1024.pem cp ./pki/private/client.key /etc/openvpn/ cp ./pki/private/server.key /etc/openvpn/ cp ./pki/ca.crt /etc/openvpn/ cp ./pki/issued/client.crt /etc/openvpn/ cp ./pki/issued/server.crt /etc/openvpn/cd /etc/openvpn
mkdir ovpn-client
cp -rp client.crt client.key ca.crt ./ovpn-client/
zip ovpn-client.zip ./ovpn-client/*
openvpn --genkey --secret ta.key
Перенести архив на клиента
Настройка клиента
сюда кладем файлы/etc/openvpn/
mkdir /var/log/openvpn
nano /etc/openvpn/openvpn.conf
remote 192.168.10.222 1194
dev tun
proto udp
client
resolv-retry infinite
ca ca.crt
cert client.crt
key client.key
tls-auth "/etc/openvpn/ta.key" 1
remote-cert-tls server
persist-key
persist-tun
comp-lzo
verb 3
status /var/log/openvpn/openvpn-status.log 1
status-version 3
log-append /var/log/openvpn/openvpn-client.log
cipher AES-256-CBC
Комментарии
Отправить комментарий