MoRoS LAN PRO 2.0
Functions
47
7.
Repeat the steps 4 to 6 with the files
"dh1024.pem",
"Server1.crt" and
"Server1.key".
A green checkmark next to "Diffie Hellman parameters available" is dis-
played because these are already loaded as default (but can also be created
new).
A green checkmark is displayed instead of the red "X" next to "CA certifi-
cate".
A green checkmark is displayed instead of the red "X" next to "Certificate".
A green checkmark is displayed instead of the red "X" next to "Private key".
8.
Enter the range of IP addresses for the tunnel end points of the clients into
the entry field "IP address pool for clients".
The addresses for the tunnel end points of the clients are allocated from
this "Pool" or network.
9.
Enter a network mask for the address pool in the entry field "Netmask of IP
address pool".
10.
Click on OK to save the settings.
11.
For each "Common name" of the allocated certificates, enter the address and
the network mask of the network behind the tunnel end of the remote ter-
minal under "Create new route to a client network". Save each of your en-
tries by clicking OK.
In this case, the IP address of a network is an address ending with "0", e.g.
192.168.200.0. The network mask in this case is 255.255.255.0. The com-
mon name from the certificate is used to distinguish the routes to the indi-
vidual networks.
The MoRoS LAN PRO 2.0 OpenVPN server is now completely configured for
the certificate-based authentication.
To be able to establish an OpenVPN connection via the MoRoS LAN PRO 2.0,
you must activate the OpenVPN Server.