Vpn

De WikiLICC
Revisão de 02h20min de 7 de maio de 2015 por Dago (Discussão | contribs) (Criou página com '-- Setting up a Linux OpenVPN client -- You need to generate new keys (or use existing other client/username keys) for the new client/username On the serve (nao necessário,...')
(dif) ← Edição anterior | ver versão atual (dif) | Versão posterior → (dif)
Ir para: navegação, pesquisa

-- Setting up a Linux OpenVPN client --

You need to generate new keys (or use existing other client/username keys) for the new client/username

On the serve (nao necessário, pois a UFRGS faz isso e disponibilia os arquivos no chasque servicos):

   cd easy-rsa
   . vars
   ./build-key username 

Ná máquina na tua casa:

   In the following, replace MyClient with a descriptive vpn connection name. 
  • Copy username.key, username.crt and ca.crt from server to /etc/openvpn/MyClient/.
   cp -ai /usr/share/doc/openvpn*/sample-config-files/client.conf /etc/openvpn/MyClient.conf
  • Edit /etc/openvpn/MyClient.conf appropriately to set your configuration (just like server configuration, port, compression,..) and key paths.
   ln -s /lib/systemd/system/openvpn@.service /etc/systemd/system/openvpn@MyClient.service
   systemctl enable openvpn@MyClient.service
   systemctl start openvpn@MyClient.service 

check /var/log/messages if things didn't work as expected

Alternatively, on the client, after copying the keys onto the client machine, you can use NetworkManager to add a vpn connection. Make sure you have the NetworkManager-openvpn package installed. Then just add a new VPN connection.

Should also test automatic starting at boot up, with password protected key files and maybe even --auth-user-pass. OpenVPN supports systemd's password passing if build with --enable-systemd via ./configure


Veja

http://www.ufrgs.br/cpd/servicos/redes-e-comunicacao/pasta-tutoriais/tutorial-vpn-linux