Inline certificates
To ease the deployment of OpenVPN configuration, public and private key files, a new feature is available to include all of them in a single file. This is done by integrating the contents of the ca
, cert
, key
, and optionally the tls-auth
file into the client configuration file itself. So, in this recipe, we will set up such a configuration file and use it to connect to our standard OpenVPN server.
Getting ready
We use the following network layout:
Set up the client and server certificates using the first recipe from Chapter 2, Client-server IP-only Networks. For this recipe, the server computers were running CentOS 5 Linux and OpenVPN 2.1.3. The client was running Fedora 13 Linux and OpenVPN 2.1.1. Keep the configuration file basic-udp-server.conf
from the Chapter 2 recipe Server-side routing at hand.
How to do it...
First, start the server:
[root@server]# openvpn --config basic-udp-server.conf
Create the client configuration file:
client proto udp remote openvpnserver.example...