Basic production-level configuration files
We extend the previous client and server configuration files to use the newly created tls-auth
key. We do this by adding a line to the configuration file movpn-04-01-server.conf
, as well as the second security-enhancing option:
proto udp port 1194 dev tun server 10.200.0.0 255.255.255.0 topology subnet persist-key persist-tun keepalive 10 60 remote-cert-tls client tls-auth /etc/openvpn/movpn/ta.key 0 dh /etc/openvpn/movpn/dh2048.pem ca /etc/openvpn/movpn/movpn-ca.crt cert /etc/openvpn/movpn/server.crt key /etc/openvpn/movpn/server.key user nobody group nobody verb 3 daemon log-append /var/log/openvpn.log
Note
Note that the order of the statements in this configuration file is random. The remote-cert-tls
and tls-auth
lines could have been added at any point in the file.
This server configuration file is a basic server configuration file that we will reuse throughout this chapter and others. Save it as basic-udp-server.conf
so...