1 ##############################################
2 # Sample client-side OpenVPN 2.0 config file #
3 # for connecting to multi-client server. #
5 # This configuration can be used by multiple #
6 # clients, however each client should have #
7 # its own cert and key files. #
9 # On Windows, you might want to rename this #
10 # file so it has a .ovpn extension #
11 ##############################################
13 # Specify that we are a client and that we
14 # will be pulling certain config file directives
18 # Use the same setting as you are using on
20 # On most systems, the VPN will not function
21 # unless you partially or fully disable
22 # the firewall for the TUN/TAP interface.
26 # Windows needs the TAP-Win32 adapter name
27 # from the Network Connections panel
28 # if you have more than one. On XP SP2,
29 # you may need to disable the firewall
30 # for the TAP adapter.
33 # Are we connecting to a TCP or
34 # UDP server? Use the same setting as
39 # The hostname/IP and port of the server.
40 # You can have multiple remote entries
41 # to load balance between the servers.
42 remote "{{ vpn_server_public_ip }}" 1194
43 ;remote my-server-2 1194
45 # Choose a random host from the remote
46 # list for load-balancing. Otherwise
47 # try hosts in the order specified.
50 # Keep trying indefinitely to resolve the
51 # host name of the OpenVPN server. Very useful
52 # on machines which are not permanently connected
53 # to the internet such as laptops.
56 # Most clients don't need to bind to
57 # a specific local port number.
60 # Downgrade privileges after initialization (non-Windows only)
64 # Try to preserve some state across restarts.
68 # If you are connecting through an
69 # HTTP proxy to reach the actual OpenVPN
70 # server, put the proxy server/IP and
71 # port number here. See the man page
72 # if your proxy server requires
74 ;http-proxy-retry # retry on connection failures
75 ;http-proxy [proxy server] [proxy port #]
77 # Wireless networks often produce a lot
78 # of duplicate packets. Set this flag
79 # to silence duplicate packet warnings.
83 # See the server config file for more
84 # description. It's best to use
85 # a separate .crt/.key file pair
86 # for each client. A single ca
87 # file can be used for all clients.
89 cert "{{ openvpn_server }}.crt"
90 key "{{ openvpn_server }}.key"
92 # Verify server certificate by checking that the
93 # certicate has the correct key usage set.
94 # This is an important precaution to protect against
95 # a potential attack discussed here:
96 # http://openvpn.net/howto.html#mitm
98 # To use this feature, you will need to generate
99 # your server certificates with the keyUsage set to
100 # digitalSignature, keyEncipherment
101 # and the extendedKeyUsage to
103 # EasyRSA can do this for you.
104 #remote-cert-tls server
106 # If a tls-auth key is used on the server
107 # then every client must also have the key.
110 # Select a cryptographic cipher.
111 # If the cipher option is used on the server
112 # then you must also specify it here.
113 # Note that v2.4 client/server will automatically
114 # negotiate AES-256-GCM in TLS mode.
115 # See also the ncp-cipher option in the manpage
120 # Enable compression on the VPN link.
121 # Don't enable this unless it is also
122 # enabled in the server config file.
125 # Set log file verbosity.
128 # Silence repeating messages