mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-09-20 10:40:39 +03:00
138 lines
4.7 KiB
Plaintext
138 lines
4.7 KiB
Plaintext
|
###############################################################################
|
||
|
# OpenVPN 2.0 Sample Configuration File
|
||
|
# for PacketiX VPN / SoftEther VPN Server
|
||
|
#
|
||
|
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
|
||
|
#
|
||
|
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
|
||
|
#
|
||
|
# This configuration file is auto-generated. You might use this config file
|
||
|
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
|
||
|
# However, before you try it, you should review the descriptions of the file
|
||
|
# to determine the necessity to modify to suitable for your real environment.
|
||
|
# If necessary, you have to modify a little adequately on the file.
|
||
|
# For example, the IP address or the hostname as a destination VPN Server
|
||
|
# should be confirmed.
|
||
|
#
|
||
|
# Note that to use OpenVPN 2.0, you have to put the certification file of
|
||
|
# the destination VPN Server on the OpenVPN Client computer when you use this
|
||
|
# config file. Please refer the below descriptions carefully.
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# Specify the type of the layer of the VPN connection.
|
||
|
#
|
||
|
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
|
||
|
# specify 'dev tun'. (Layer-3 IP Routing Mode)
|
||
|
#
|
||
|
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
|
||
|
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
|
||
|
|
||
|
dev $TAG_TUN_TAP$
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# Specify the underlying protocol beyond the Internet.
|
||
|
# Note that this setting must be correspond with the listening setting on
|
||
|
# the VPN Server.
|
||
|
#
|
||
|
# Specify either 'proto tcp' or 'proto udp'.
|
||
|
|
||
|
proto $TAG_PROTO$
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# The destination hostname / IP address, and port number of
|
||
|
# the target VPN Server.
|
||
|
#
|
||
|
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
|
||
|
# specify the IP address instead of the hostname.
|
||
|
#
|
||
|
# Note that the auto-generated below hostname are a "auto-detected
|
||
|
# IP address" of the VPN Server. You have to confirm the correctness
|
||
|
# beforehand.
|
||
|
#
|
||
|
# When you want to connect to the VPN Server by using TCP protocol,
|
||
|
# the port number of the destination TCP port should be same as one of
|
||
|
# the available TCP listeners on the VPN Server.
|
||
|
#
|
||
|
# When you use UDP protocol, the port number must same as the configuration
|
||
|
# setting of "OpenVPN Server Compatible Function" on the VPN Server.
|
||
|
|
||
|
$TAG_BEFORE_REMOTE$remote $TAG_HOSTNAME$ $TAG_PORT$
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# The HTTP/HTTPS proxy setting.
|
||
|
#
|
||
|
# Only if you have to use the Internet via a proxy, uncomment the below
|
||
|
# two lines and specify the proxy address and the port number.
|
||
|
# In the case of using proxy-authentication, refer the OpenVPN manual.
|
||
|
|
||
|
;http-proxy-retry
|
||
|
;http-proxy [proxy server] [proxy port]
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# The encryption and authentication algorithm.
|
||
|
#
|
||
|
# Default setting is good. Modify it as you prefer.
|
||
|
# When you specify an unsupported algorithm, the error will occur.
|
||
|
#
|
||
|
# The supported algorithms are as follows:
|
||
|
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
|
||
|
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
|
||
|
# RC2-40-CBC RC2-64-CBC RC2-CBC
|
||
|
# auth: SHA SHA1 MD5 MD4 RMD160
|
||
|
|
||
|
cipher AES-128-CBC
|
||
|
auth SHA1
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# Other parameters necessary to connect to the VPN Server.
|
||
|
#
|
||
|
# It is not recommended to modify it unless you have a particular need.
|
||
|
|
||
|
resolv-retry infinite
|
||
|
nobind
|
||
|
persist-key
|
||
|
persist-tun
|
||
|
client
|
||
|
verb 3
|
||
|
auth-user-pass
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# The certificate file of the destination VPN Server.
|
||
|
#
|
||
|
# The CA certificate file is embedded in the inline format.
|
||
|
# You can replace this CA contents if necessary.
|
||
|
# Please note that if the server certificate is not a self-signed, you have to
|
||
|
# specify the signer's root certificate (CA) here.
|
||
|
|
||
|
<ca>
|
||
|
$CA$
|
||
|
</ca>
|
||
|
|
||
|
|
||
|
###############################################################################
|
||
|
# The client certificate file (dummy).
|
||
|
#
|
||
|
# In some implementations of OpenVPN Client software
|
||
|
# (for example: OpenVPN Client for iOS),
|
||
|
# a pair of client certificate and private key must be included on the
|
||
|
# configuration file due to the limitation of the client.
|
||
|
# So this sample configuration file has a dummy pair of client certificate
|
||
|
# and private key as follows.
|
||
|
|
||
|
<cert>
|
||
|
$CERT$
|
||
|
</cert>
|
||
|
|
||
|
<key>
|
||
|
$KEY$
|
||
|
</key>
|
||
|
|
||
|
|