WTware is able to connect to OpenVPN.
If you have configuration file to connect to working OpenVPN, make sure it works on any Linux distributive. OpenVPN on Windows differs from OpenVPN on Linux. WTware techsupport won't be able to help with OpenVPN, if your configuration file is not tested on Linux.
This tested configuration file should be named openvpn.cfg
and placed into configs
directory
on boot disk of terminal. You may place this file into configs directory using terminal web-interface.
In configuration file must be such line:
daemon
To make OpenVPN on Linux accept addresses of DNS servers from OpenVPN servers specify in configuration file:
script-security 2 up /etc/openvpn/update-resolv-conf
To save login and password on disk and not to enter them at every boot create in configs
directory
on terminal boot disk pass.txt
file, containing two lines — specify login and password to OpenVPN:
OpenVPNUserName SomeComplexPassword
In configuration file specify that pass.txt
file should be used:
auth-user-pass /bootmedia/configs/pass.txt
If you need keys to connect to OpenVPN, they should be placed into configuration file. Example of openvpn.cfg configuration file, that contains keys.
If in your VPN tls-auth
key is used and there's such line in configuration file:
tls-auth ta.key 1then after embedding key into configuration file you should add one more option —
key-direction
— to specify key direction.
Something like that:key-direction 1 <tls-auth> -----BEGIN OpenVPN Static key V1----- 073b0025464cdeaa6189247397d0f2f6 ... 9a9a92359aa0574a95715a1df0e51484 -----END OpenVPN Static key V1----- </tls-auth>
Easy example of configuration files for client and server: openvpn.zip. For tests: don't change
server configuration files, in client configuration file specify server IP-address instead of 10.1.1.32 in line:
remote 10.1.1.32