############################################################################### # OpenVPN 2.0 Sample Configuration File # for PacketiX VPN / SoftEther VPN Server # # !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!! # # !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!! # # This configuration file is auto-generated. You might use this config file # in order to connect to the PacketiX VPN / SoftEther VPN Server. # However, before you try it, you should review the descriptions of the file # to determine the necessity to modify to suitable for your real environment. # If necessary, you have to modify a little adequately on the file. # For example, the IP address or the hostname as a destination VPN Server # should be confirmed. # # Note that to use OpenVPN 2.0, you have to put the certification file of # the destination VPN Server on the OpenVPN Client computer when you use this # config file. Please refer the below descriptions carefully. ############################################################################### # Specify the type of the layer of the VPN connection. # # To connect to the VPN Server as a "Remote-Access VPN Client PC", # specify 'dev tun'. (Layer-3 IP Routing Mode) # # To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN", # specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode) dev tun ############################################################################### # Specify the underlying protocol beyond the Internet. # Note that this setting must be correspond with the listening setting on # the VPN Server. # # Specify either 'proto tcp' or 'proto udp'. proto udp ############################################################################### # The destination hostname / IP address, and port number of # the target VPN Server. # # You have to specify as 'remote '. You can also # specify the IP address instead of the hostname. # # Note that the auto-generated below hostname are a "auto-detected # IP address" of the VPN Server. You have to confirm the correctness # beforehand. # # When you want to connect to the VPN Server by using TCP protocol, # the port number of the destination TCP port should be same as one of # the available TCP listeners on the VPN Server. # # When you use UDP protocol, the port number must same as the configuration # setting of "OpenVPN Server Compatible Function" on the VPN Server. # Note: The below hostname is came from the Dynamic DNS Client function # which is running on the VPN Server. If you don't want to use # the Dynamic DNS hostname, replace it to either IP address or # other domain's hostname. remote 133.18.196.64 1194 ############################################################################### # The HTTP/HTTPS proxy setting. # # Only if you have to use the Internet via a proxy, uncomment the below # two lines and specify the proxy address and the port number. # In the case of using proxy-authentication, refer the OpenVPN manual. ;http-proxy-retry ;http-proxy [proxy server] [proxy port] ############################################################################### # The encryption and authentication algorithm. # # Default setting is good. Modify it as you prefer. # When you specify an unsupported algorithm, the error will occur. # # The supported algorithms are as follows: # cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC # CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC # RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC # auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160 cipher AES-128-CBC auth SHA1 ############################################################################### # Other parameters necessary to connect to the VPN Server. # # It is not recommended to modify it unless you have a particular need. resolv-retry infinite nobind persist-key persist-tun client verb 3 ############################################################################### # Authentication with credentials. # # Comment the line out in case you want to use the certificate authentication. auth-user-pass ############################################################################### # The certificate file of the destination VPN Server. # # The CA certificate file is embedded in the inline format. # You can replace this CA contents if necessary. # Please note that if the server certificate is not a self-signed, you have to # specify the signer's root certificate (CA) here. -----BEGIN CERTIFICATE----- MIIEDjCCAvagAwIBAgIBADANBgkqhkiG9w0BAQsFADCBhTEmMCQGA1UEAwwddjEz My0xOC0yMDktNzUudmlyLmthZ295YS5uZXQxJjAkBgNVBAoMHXYxMzMtMTgtMjA5 LTc1LnZpci5rYWdveWEubmV0MSYwJAYDVQQLDB12MTMzLTE4LTIwOS03NS52aXIu a2Fnb3lhLm5ldDELMAkGA1UEBhMCVVMwHhcNMjAwOTMwMTAxMzIwWhcNMzcxMjMx MTAxMzIwWjCBhTEmMCQGA1UEAwwddjEzMy0xOC0yMDktNzUudmlyLmthZ295YS5u ZXQxJjAkBgNVBAoMHXYxMzMtMTgtMjA5LTc1LnZpci5rYWdveWEubmV0MSYwJAYD VQQLDB12MTMzLTE4LTIwOS03NS52aXIua2Fnb3lhLm5ldDELMAkGA1UEBhMCVVMw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCyA68bHo/lNH7b7lRlNrCe RwYUS+cmzgU5uav6LVyXVNLYD1IadYFtyXHMYUJPlW80MiXR011ROKKLqSaXsprg 9Dtdq5R+JwZ5Tb/KgUNj449nklJe23hnBN3ItqCa168cGJc6Am5jnR0CmDM9nDv7 HmdJfckbHMkq64En9wONcz+BH9hWb/SYqJ3SZdCGxo1sFxWpepdmiZIoZi5SorMy Xm2EFQaEJ6te7dYPttevEwNIqDR+ixE+dXO1bpadmwREmppkTkAIyqE/ViXUpj3P 7KzTNYChwWGQKkxQ1SbQPZmK0A3DVYCPhg1XKGo1oh2QZwv+fdzh/2FE08cITIcp AgMBAAGjgYYwgYMwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAfYwYwYDVR0l BFwwWgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDAwYIKwYBBQUHAwQGCCsG AQUFBwMFBggrBgEFBQcDBgYIKwYBBQUHAwcGCCsGAQUFBwMIBggrBgEFBQcDCTAN BgkqhkiG9w0BAQsFAAOCAQEAesZ1VXjC+gUzyEaboUMHf+ytwIEOq8QtibvmB6pp Mjocu2ieLd6+W/H2X8l0wpqECtNjmRGIT0/wUvtXFEHBYtXQGTad0d7hZDanllqA kqbcWOyWFSVaEWwMG2Rg3kfd673yI6rMdUb2Jn9ltPdMzNuLjL9CpWwoQhydwAHN dg33K7kSOBP8qqktbKESi7kzwPD5GUVvUZ4u5CRLbtJ+N4+0KPCCK/34IGyW2JJq dFR4ZknR1h0jNvTAr4th7ol7CZ/CW9eQ/4/jQThiqaFgBXgGNIy6GsoOTmKoqeom r4d0VeropcpnNCaWGaCgiven2TYx7TfKac20OSd2jWuVqA== -----END CERTIFICATE----- ############################################################################### # Client certificate and key. # # A pair of client certificate and private key is required in case you want to # use the certificate authentication. # # To enable it, uncomment the lines below. # Paste your certificate in the block and the key in the one. ; ;-----BEGIN CERTIFICATE----- ; ;-----END CERTIFICATE----- ; ; ;-----BEGIN RSA PRIVATE KEY----- ; ;-----END RSA PRIVATE KEY----- ;