Seguridad wireless ( segunda parte )
Configurar cliente openvpn.
Cliente linux
dentro de /etc/openvpn/client.conf
client
port 1194
proto udp
dev tap
remote 192.168.10.1
resolv-retry infinite
nobind
user nobody
group nobody
persist-key
persist-tun
keepalive 15 60
mute-replay-warnings
up /etc/openvpn/client.up
up-restart
down /etc/openvpn/client.down
down-pre
ca /etc/openvpn/easy-rsa/keys/ca.crt
cert /etc/openvpn/easy-rsa/keys/client1.crt
key /etc/openvpn/easy-rsa/keys/client1.key
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1
comp-lzo no
verb 3
mute 5
copiar client.up y client.down de openvpn2.1
copiar los archivos ca.crt client1.crt client1.key.
ejecutamos:
ifconfig weth 192.168.10.x
route add default gw 192.168.10.1
openvpn --daemon --config /etc/openvpn/home.ovpn
Si hemos hecho todo correcto nos conectaromes por vpn dentro de una wifi insecura.
Comentarios
Publicar un comentario