Mudanças entre as edições de "Vpn"

De WikiLICC
Ir para: navegação, pesquisa
(Criou página com '-- Setting up a Linux OpenVPN client -- You need to generate new keys (or use existing other client/username keys) for the new client/username On the serve (nao necessário,...')
 
m
Linha 1: Linha 1:
-- Setting up a Linux OpenVPN client --
+
-- Configurando um cliente Linux no Fedora --
  
 
You need to generate new keys (or use existing other client/username keys) for the new client/username
 
You need to generate new keys (or use existing other client/username keys) for the new client/username
Linha 9: Linha 9:
 
     ./build-key username  
 
     ./build-key username  
  
máquina na tua casa:
+
Na primeira vez que usar, na máquina da tua casa (como root):
 +
  > cp vpn-ufrgs.conf /etc/openvpn
 +
  > cp ta.key /etc/openvpn
 +
  > cp ACRaizUFRGSv2.crt /etc/openvpn
 +
  > cd /etc/openvpn
  
    In the following, replace MyClient with a descriptive vpn connection name.  
+
* Edite /etc/openvpn/MyClient.conf appropriadamente para setar sua configuracão e caminhos.
 +
  > ln -s /lib/systemd/system/openvpn@.service /etc/systemd/system/openvpn@vpn-ufrgs.service
  
* Copy username.key, username.crt and ca.crt from server to /etc/openvpn/MyClient/.
+
  > systemctl enable openvpn@vpn-ufrgs.service
    cp -ai /usr/share/doc/openvpn*/sample-config-files/client.conf /etc/openvpn/MyClient.conf
+
  > systemctl start openvpn@vpn-ufrgs.service
* Edit /etc/openvpn/MyClient.conf appropriately to set your configuration (just like server configuration, port, compression,..) and key paths.
 
    ln -s /lib/systemd/system/openvpn@.service /etc/systemd/system/openvpn@MyClient.service
 
    systemctl enable openvpn@MyClient.service
 
    systemctl start openvpn@MyClient.service  
 
  
check /var/log/messages if things didn't work as expected
 
 
Alternatively, on the client, after copying the keys onto the client machine, you can use NetworkManager to add a vpn connection. Make sure you have the NetworkManager-openvpn package installed. Then just add a new VPN connection.
 
 
Should also test automatic starting at boot up, with password protected key files and maybe even --auth-user-pass. OpenVPN supports systemd's password passing if build with --enable-systemd via ./configure
 
  
 +
Verifique /var/log/messages se algo der errado.
  
 +
Alternativamente, no cliente, depois de copiar as keys na máquina cliente, pode usar  NetworkManager e adicionar uma coneccão vpn. Certifique-se de ter o pacote NetworkManager-openvpn instalado. Então adicione uma nova conexão VPN.
  
 
Veja
 
Veja
 
  http://www.ufrgs.br/cpd/servicos/redes-e-comunicacao/pasta-tutoriais/tutorial-vpn-linux
 
  http://www.ufrgs.br/cpd/servicos/redes-e-comunicacao/pasta-tutoriais/tutorial-vpn-linux

Edição das 22h35min de 17 de maio de 2015

-- Configurando um cliente Linux no Fedora --

You need to generate new keys (or use existing other client/username keys) for the new client/username

On the serve (nao necessário, pois a UFRGS faz isso e disponibilia os arquivos no chasque servicos):

   cd easy-rsa
   . vars
   ./build-key username 

Na primeira vez que usar, na máquina da tua casa (como root):

 > cp vpn-ufrgs.conf /etc/openvpn
 > cp ta.key /etc/openvpn
 > cp ACRaizUFRGSv2.crt /etc/openvpn
 > cd /etc/openvpn
  • Edite /etc/openvpn/MyClient.conf appropriadamente para setar sua configuracão e caminhos.
 > ln -s /lib/systemd/system/openvpn@.service /etc/systemd/system/openvpn@vpn-ufrgs.service
 > systemctl enable openvpn@vpn-ufrgs.service
 > systemctl start openvpn@vpn-ufrgs.service


Verifique /var/log/messages se algo der errado.

Alternativamente, no cliente, depois de copiar as keys na máquina cliente, pode usar NetworkManager e adicionar uma coneccão vpn. Certifique-se de ter o pacote NetworkManager-openvpn instalado. Então adicione uma nova conexão VPN.

Veja

http://www.ufrgs.br/cpd/servicos/redes-e-comunicacao/pasta-tutoriais/tutorial-vpn-linux