Chapter 3: Serial Port, Device and User Configuration
56
2.
Click
Add
and complete the
Add OpenVPN Tunnel
screen
3.
Enter any descriptive name you wish to identify the OpenVPN Tunnel you are adding, for example
NorthStOutlet-VPN
4.
Select the authentication method to be used. To authenticate using certificates select
PKI (X.509
Certificates)
or select
Custom Configuration
to upload custom configuration files. Custom
configurations must be stored in /etc/config.
NOTE
If you select PKI, establish:
§
Separate certificate (also known as a public key). This Certificate File is a *.crt file type
§
Private Key for the server and each client. This Private Key File is a *.key file type
§
Master Certificate Authority (CA) certificate and key which is used to sign each of the server and
client certificates. This Root CA Certificate is a *.crt file type
For a server, you may also need dh1024.pem (Diffie Hellman parameters). See
http://openvpn.net/easyrsa.html for a guide to basic RSA key management. For alternative authentication
methods see http://openvpn.net/index.php/documentation/howto.html#auth.
5.
Select the
Device Driver
to be used, either
Tun-IP
or
Tap-Ethernet
. The TUN (network tunnel) and
TAP (network tap) drivers are virtual network drivers that support IP tunneling and Ethernet
tunneling, respectively. TUN and TAP are part of the Linux kernel.
6.
Select either
UDP
or
TCP
as the
Protocol.
UDP is the default and preferred protocol for OpenVPN.
7.
Check or uncheck the
Compression
button to enable or disable compression.
8.
In
Tunnel Mode,
nominate whether this is the
Client
or
Server
end of the tunnel. When running as
a server, the console server supports multiple clients connecting to the VPN server over the same
port.