DA-660-8/16-LX User’s Manual
Managing Communications
4-24
2.
Create a configuration file named “A-tun.conf” and an executable script file named
“A-tun.sh”.
# point to the peer
remote 192.168.8.174
dev tun
secret /etc/openvpn/secrouter.key
cipher DES-EDE3-CBC
auth MD5
tun-mtu 1500
tun-mtu-extra 64
ping 40
ifconfig 192.168.2.173 192.168.4.174
up /etc/openvpn/A-tun.sh
Then modify the routing table in
/etc/openvpn/tun.sh
script file.
#----------------------------------Start------------------------------
#!/bin/sh
# value after “-net” is the subnet behind the remote peer
route add -net 192.168.4.0 netmask 255.255.255.0 gw $5
#---------------------------------- end ------------------------------
Create a configuration file named
B-tun.conf
and an executable script file named
B-tun.sh
on
OpenVPN B:
remote 192.168.8.173
dev tun
secret /etc/openvpn/secrouter.key
cipher DES-EDE3-CBC
auth MD5
tun-mtu 1500
tun-mtu-extra 64
ping 40
ifconfig 192.168.4.174 192.168.2.173
up /etc/openvpn/B-tun.sh
#----------------------------------Start------------------------------
#!/bin/sh
# value after “-net” is the subnet behind the remote peer
route add -net 192.168.2.0 netmask 255.255.255.0 gw $5
#---------------------------------- end ------------------------------
NOTE
The command
ifconfig
defines the first argument as the local internal interface and the second
argument as the internal interface at the remote peer.
NOTE
$5
is the argument that the OpenVPN program passes to the script file. Its value is the second
argument of ifconfig in the configuration file.
3.
Check the routing table after you run the OpenVPN programs, by typing the command:
# route
Destination Gateway
Genmsk Flags
Metric
Ref
Use
Iface
192.168.4.174 * 255.255.255.255
UH
0
0
0
tun0
192.168.4.0 192.168.4.174
255.255.255.0 UG 0 0 0 tun0
192.168.2.0 *
255.255.255.0
U
0
0
0
eth1
192.168.8.0 *
255.255.255.0
U
0
0
0
eth0