MoRoS ADSL 2.1 PRO
Functions
In order to configure the authentication with certificates, select the radio
button "Authentication based on certificate". It is indicated under the
option here, whether the individual certificates and keys are present
(green checkmark) or not (red cross). Present certificates can also be
downloaded (blue arrow) or deleted again (red cross on white box). The
private key can only be deleted. Check the checkbox "Allow
communication between clients" to enable a communication between
the clients as well. Define the IP address pool for the clients in the fields
"IPv4 address pool / Netmask" or "IPv6 address pool / Netmask". In order
to create a new route to a client network, enter in the section "Create
new route to a client network" the Common Name of the client into the
field "Name in certificate" as well as its net address and netmask into the
fields "IPv4 net address / netmask" or "IPv6 net address / netmask".
Optionally, enter the VPN IPv4 address for the tunnel end of a client into
the field "VPN IPv4 address". One IPv4 and one IPv6 address will always
be assigned to each tunnel end, even if the tunnel of one IP version is not
used at all. Click on "OK" to take over the new route. You can delete
existing routes by checking the checkbox in the column "delete" of the
respective route and clicking on "OK".
A link of a network address with "DEFAULT" as "Common Name" may
be created as "Standard route". It is always used as route, when a
client registers with a certificate, for whose "Common Name" no other
link has been entered.
In order to configure the authentication with static key, select the radio
button "No authentication or authentication with preshared key". It is
indicated under the option here, whether the static key is present (green
checkmark) or not (red cross). A present key can also be downloaded
(blue arrow) or deleted again (red cross on white box). If no key exists,
the remote terminal will neither be authenticated nor the data traffic
through the OpenVPN tunnel will be encrypted. You can also generate a
new static key using the "Generate a new static key" link. This static key
must then be downloaded and also uploaded to the remote terminal.
Both OpenVPN remote terminals must have the same static key that a
tunnel is functional with this authentication type. Enter the IP address or
the domain name of the remote terminal into the "IP address or domain
name of remote site" field. You can enter the IP address or the domain
name of an alternative remote terminal into the "Alternative remote site"
field. Enter the IP address of the local tunnel end into the "IPv4 tunnel
address local" or "IPv6 tunnel address local" field and the IP address of
the remote tunnel end into the "IPv4 tunnel address remote" or "IPv6
tunnel address remote" field. Enter the address as well as the associated
netmask of the network behind the OpenVPN tunnel into the "IPv4 net
address behind the tunnel" or "IPv6 net address behind the tunnel" and
"IPv4 netmask behind the tunnel" or "IPv6 netmask behind the tunnel"
fields.
In order to confirm all settings made above, click on "OK".
61