diff options
Diffstat (limited to 'src/bin/hamcore/openvpn_sample.ovpn')
-rw-r--r-- | src/bin/hamcore/openvpn_sample.ovpn | 274 |
1 files changed, 137 insertions, 137 deletions
diff --git a/src/bin/hamcore/openvpn_sample.ovpn b/src/bin/hamcore/openvpn_sample.ovpn index 0ae75863..83bc3df3 100644 --- a/src/bin/hamcore/openvpn_sample.ovpn +++ b/src/bin/hamcore/openvpn_sample.ovpn @@ -1,137 +1,137 @@ -###############################################################################
-# OpenVPN 2.0 Sample Configuration File
-# for PacketiX VPN / SoftEther VPN Server
-#
-# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
-#
-# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
-#
-# This configuration file is auto-generated. You might use this config file
-# in order to connect to the PacketiX VPN / SoftEther VPN Server.
-# However, before you try it, you should review the descriptions of the file
-# to determine the necessity to modify to suitable for your real environment.
-# If necessary, you have to modify a little adequately on the file.
-# For example, the IP address or the hostname as a destination VPN Server
-# should be confirmed.
-#
-# Note that to use OpenVPN 2.0, you have to put the certification file of
-# the destination VPN Server on the OpenVPN Client computer when you use this
-# config file. Please refer the below descriptions carefully.
-
-
-###############################################################################
-# Specify the type of the layer of the VPN connection.
-#
-# To connect to the VPN Server as a "Remote-Access VPN Client PC",
-# specify 'dev tun'. (Layer-3 IP Routing Mode)
-#
-# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
-# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
-
-dev $TAG_TUN_TAP$
-
-
-###############################################################################
-# Specify the underlying protocol beyond the Internet.
-# Note that this setting must be correspond with the listening setting on
-# the VPN Server.
-#
-# Specify either 'proto tcp' or 'proto udp'.
-
-proto $TAG_PROTO$
-
-
-###############################################################################
-# The destination hostname / IP address, and port number of
-# the target VPN Server.
-#
-# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
-# specify the IP address instead of the hostname.
-#
-# Note that the auto-generated below hostname are a "auto-detected
-# IP address" of the VPN Server. You have to confirm the correctness
-# beforehand.
-#
-# When you want to connect to the VPN Server by using TCP protocol,
-# the port number of the destination TCP port should be same as one of
-# the available TCP listeners on the VPN Server.
-#
-# When you use UDP protocol, the port number must same as the configuration
-# setting of "OpenVPN Server Compatible Function" on the VPN Server.
-
-$TAG_BEFORE_REMOTE$remote $TAG_HOSTNAME$ $TAG_PORT$
-
-
-###############################################################################
-# The HTTP/HTTPS proxy setting.
-#
-# Only if you have to use the Internet via a proxy, uncomment the below
-# two lines and specify the proxy address and the port number.
-# In the case of using proxy-authentication, refer the OpenVPN manual.
-
-;http-proxy-retry
-;http-proxy [proxy server] [proxy port]
-
-
-###############################################################################
-# The encryption and authentication algorithm.
-#
-# Default setting is good. Modify it as you prefer.
-# When you specify an unsupported algorithm, the error will occur.
-#
-# The supported algorithms are as follows:
-# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
-# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
-# RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC
-# auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160
-
-cipher AES-128-CBC
-auth SHA1
-
-
-###############################################################################
-# Other parameters necessary to connect to the VPN Server.
-#
-# It is not recommended to modify it unless you have a particular need.
-
-resolv-retry infinite
-nobind
-persist-key
-persist-tun
-client
-verb 3
-auth-user-pass
-
-
-###############################################################################
-# The certificate file of the destination VPN Server.
-#
-# The CA certificate file is embedded in the inline format.
-# You can replace this CA contents if necessary.
-# Please note that if the server certificate is not a self-signed, you have to
-# specify the signer's root certificate (CA) here.
-
-<ca>
-$CA$
-</ca>
-
-
-###############################################################################
-# The client certificate file (dummy).
-#
-# In some implementations of OpenVPN Client software
-# (for example: OpenVPN Client for iOS),
-# a pair of client certificate and private key must be included on the
-# configuration file due to the limitation of the client.
-# So this sample configuration file has a dummy pair of client certificate
-# and private key as follows.
-
-<cert>
-$CERT$
-</cert>
-
-<key>
-$KEY$
-</key>
-
-
+############################################################################### +# OpenVPN 2.0 Sample Configuration File +# for PacketiX VPN / SoftEther VPN Server +# +# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!! +# +# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!! +# +# This configuration file is auto-generated. You might use this config file +# in order to connect to the PacketiX VPN / SoftEther VPN Server. +# However, before you try it, you should review the descriptions of the file +# to determine the necessity to modify to suitable for your real environment. +# If necessary, you have to modify a little adequately on the file. +# For example, the IP address or the hostname as a destination VPN Server +# should be confirmed. +# +# Note that to use OpenVPN 2.0, you have to put the certification file of +# the destination VPN Server on the OpenVPN Client computer when you use this +# config file. Please refer the below descriptions carefully. + + +############################################################################### +# Specify the type of the layer of the VPN connection. +# +# To connect to the VPN Server as a "Remote-Access VPN Client PC", +# specify 'dev tun'. (Layer-3 IP Routing Mode) +# +# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN", +# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode) + +dev $TAG_TUN_TAP$ + + +############################################################################### +# Specify the underlying protocol beyond the Internet. +# Note that this setting must be correspond with the listening setting on +# the VPN Server. +# +# Specify either 'proto tcp' or 'proto udp'. + +proto $TAG_PROTO$ + + +############################################################################### +# The destination hostname / IP address, and port number of +# the target VPN Server. +# +# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also +# specify the IP address instead of the hostname. +# +# Note that the auto-generated below hostname are a "auto-detected +# IP address" of the VPN Server. You have to confirm the correctness +# beforehand. +# +# When you want to connect to the VPN Server by using TCP protocol, +# the port number of the destination TCP port should be same as one of +# the available TCP listeners on the VPN Server. +# +# When you use UDP protocol, the port number must same as the configuration +# setting of "OpenVPN Server Compatible Function" on the VPN Server. + +$TAG_BEFORE_REMOTE$remote $TAG_HOSTNAME$ $TAG_PORT$ + + +############################################################################### +# The HTTP/HTTPS proxy setting. +# +# Only if you have to use the Internet via a proxy, uncomment the below +# two lines and specify the proxy address and the port number. +# In the case of using proxy-authentication, refer the OpenVPN manual. + +;http-proxy-retry +;http-proxy [proxy server] [proxy port] + + +############################################################################### +# The encryption and authentication algorithm. +# +# Default setting is good. Modify it as you prefer. +# When you specify an unsupported algorithm, the error will occur. +# +# The supported algorithms are as follows: +# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC +# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC +# RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC +# auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160 + +cipher AES-128-CBC +auth SHA1 + + +############################################################################### +# Other parameters necessary to connect to the VPN Server. +# +# It is not recommended to modify it unless you have a particular need. + +resolv-retry infinite +nobind +persist-key +persist-tun +client +verb 3 +auth-user-pass + + +############################################################################### +# The certificate file of the destination VPN Server. +# +# The CA certificate file is embedded in the inline format. +# You can replace this CA contents if necessary. +# Please note that if the server certificate is not a self-signed, you have to +# specify the signer's root certificate (CA) here. + +<ca> +$CA$ +</ca> + + +############################################################################### +# The client certificate file (dummy). +# +# In some implementations of OpenVPN Client software +# (for example: OpenVPN Client for iOS), +# a pair of client certificate and private key must be included on the +# configuration file due to the limitation of the client. +# So this sample configuration file has a dummy pair of client certificate +# and private key as follows. + +<cert> +$CERT$ +</cert> + +<key> +$KEY$ +</key> + + |