Page 166 of 226
Version: 3.3.5
– DR05 – 23.03.2017
VPN
– OpenVPN
19.3
Basics about OpenVPN
19.3.1
-OpenVPN basically works with two tunnel IP addresses, i.e. each connection has two IP addresses via which
the data traffic is processed.
- Depending on the authentication method, OpenVPN either works in point-to-point mode (with static key or no
authentication) or in server/client mode (with X.509 certificates).
- OpenVPN can use three different authentication methods:
None
: No certificate or key is needed. Used primarily for testing the connection. The tunnel data is also
NOT
encrypted.
Static key
: A 1024-bit key as required by each peer is generated for the connection. Similar to the
password.
Certificates, X.509
: The following certificate variants are distinguished:
Each subscriber needs the same root CA and a personal certificate signed by the root CA.
Like 1, but with additional username/password verification.
Like 2, but without a personal certificate. In other words, subscribers only need a root CA and
username/password.
-
OpenVPN can use an http proxy server as the outgoing connection. This is important for integration into
existing corporate networks with an Internet connection.
-
The transmission protocol setting (UDP or TCP) can be freely selected with OpenVPN. The same applies
to the port numbers to be used for the transmission protocol.
The settings for various OpenVPN con-
nection scenarios are described below.
From the start page, click
VPN
in the nav-
igation bar on the left and
OpenVPN
in
the navigation bar at the top.
Click the button on the right to create an
OpenVPN connection.