Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save austonpramodh/a23e7bad339747da6b351f67bd30f744 to your computer and use it in GitHub Desktop.

Select an option

Save austonpramodh/a23e7bad339747da6b351f67bd30f744 to your computer and use it in GitHub Desktop.
###############################################################################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.
###############################################################################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
dev tun
###############################################################################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.
proto udp
###############################################################################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.
# Note: The below hostname is came from the Dynamic DNS Client function
# which is running on the VPN Server. If you don't want to use
# the Dynamic DNS hostname, replace it to either IP address or
# other domain's hostname.
remote softvpn-us2.v4.softether.net 1194
###############################################################################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.
;http-proxy-retry
;http-proxy [proxy server] [proxy port]
###############################################################################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC
# auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160
cipher AES-128-CBC
auth SHA1
###############################################################################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.
resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
###############################################################################
# Authentication with credentials.
#
# Comment the line out in case you want to use the certificate authentication.
auth-user-pass
###############################################################################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
###############################################################################
# Client certificate and key.
#
# A pair of client certificate and private key is required in case you want to
# use the certificate authentication.
#
# To enable it, uncomment the lines below.
# Paste your certificate in the <cert> block and the key in the <key> one.
;<cert>
;-----BEGIN CERTIFICATE-----
;
;-----END CERTIFICATE-----
;</cert>
;<key>
;-----BEGIN RSA PRIVATE KEY-----
;
;-----END RSA PRIVATE KEY-----
;</key>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment