OpenVPN configuration

WTware is able to connect to OpenVPN.

Connection to working OpenVPN

If you have configuration file to connect to working OpenVPN, make sure it works on any Linux distributive. OpenVPN on Windows differs from OpenVPN on Linux. WTware techsupport won't be able to help with OpenVPN, if your configuration file is not tested on Linux.

Name this tested configuration file as openvpn.cfg and write to USB-flash. Reboot terminal, press Del to enter WTware Setup. In menu VPN => OpenVPN upload file to terminal. Also you may place this file into configs directory on terminal boot disk or into configs directory using terminal web-interface.

If OpenVPN configuration doesn't require to enter password, in configuration file must be such line:

daemon

With this line OpenVPN won't write anything on terminal screen. OpenVPN log you may see in WTware terminal log.

If OpenVPN configuration requires private key password, then daemon line must not be in configuration file. Also remove daemon line to test OpenVPN. Without daemon line WTware will show OpenVPN log on terminal screen and, if needed, will ask user for key password.

To make OpenVPN on Linux accept addresses of DNS servers from OpenVPN servers specify in configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf

To save login and password on disk and not to enter them at every boot create in configs directory on terminal boot disk pass.txt file, containing two lines — specify login and password to OpenVPN:

OpenVPNUserName
SomeComplexPassword

In configuration file specify that pass.txt file should be used:

auth-user-pass /bootmedia/configs/pass.txt

If you need keys to connect to OpenVPN, they should be placed into configuration file. Example of openvpn.cfg configuration file, that contains keys.

If in your VPN tls-auth key is used and there's such line in configuration file:

tls-auth ta.key 1
then after embedding key into configuration file you should add one more option — key-direction — to specify key direction. Something like that:
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
073b0025464cdeaa6189247397d0f2f6
...
9a9a92359aa0574a95715a1df0e51484
-----END OpenVPN Static key V1-----
</tls-auth>

New OpenVPN

Easy example of configuration files for client and server: openvpn.zip. For tests: don't change server configuration files, in client configuration file specify server IP-address instead of 10.1.1.32 in line:

remote 10.1.1.32