WTware is able to connect to OpenVPN.
If you have configuration file to connect to working OpenVPN, make sure it works on any Linux distributive. OpenVPN on Windows differs from OpenVPN on Linux. WTware techsupport won't be able to help with OpenVPN, if your configuration file is not tested on Linux.
Name this tested configuration file as openvpn.cfg
and write to USB-flash. Reboot terminal,
press Del to enter WTware Setup. In menu VPN => OpenVPN upload file to terminal. Also you may place this file into configs
directory
on terminal boot disk or into configs directory using terminal web-interface.
If OpenVPN configuration doesn't require to enter password, in configuration file must be such line:
daemon
With this line OpenVPN won't write anything on terminal screen. OpenVPN log you may see in WTware terminal log.
If OpenVPN configuration requires private key password, then daemon
line must not be in configuration file.
Also remove daemon
line to test OpenVPN. Without daemon
line WTware will show OpenVPN log on terminal screen and, if needed,
will ask user for key password.
To make OpenVPN on Linux accept addresses of DNS servers from OpenVPN servers specify in configuration file:
script-security 2 up /etc/openvpn/update-resolv-conf
To save login and password on disk and not to enter them at every boot create in configs
directory
on terminal boot disk pass.txt
file, containing two lines — specify login and password to OpenVPN:
OpenVPNUserName SomeComplexPassword
In configuration file specify that pass.txt
file should be used:
auth-user-pass /bootmedia/configs/pass.txt
If you need keys to connect to OpenVPN, they should be placed into configuration file. Example of openvpn.cfg configuration file, that contains keys.
If in your VPN tls-auth
key is used and there's such line in configuration file:
tls-auth ta.key 1then after embedding key into configuration file you should add one more option —
key-direction
— to specify key direction.
Something like that:key-direction 1 <tls-auth> -----BEGIN OpenVPN Static key V1----- 073b0025464cdeaa6189247397d0f2f6 ... 9a9a92359aa0574a95715a1df0e51484 -----END OpenVPN Static key V1----- </tls-auth>
Easy example of configuration files for client and server: openvpn.zip. For tests: don't change
server configuration files, in client configuration file specify server IP-address instead of 10.1.1.32 in line:
remote 10.1.1.32