How-To
Services
Internal
Historical
External Tools
<PEER_NAME>
with a self chosen name to identify this peer<PROTO>
with either udp
or udp6
, depending if you reach your remote peer with ipv4 o ipv6<REMOTE_HOST>
with the public ip address of your peer<REMOTE_PORT>
with the port number, where your peer's openvpn daemon listen for traffic<LOCAL_HOST>
with your public ip<INTERFACE_NAME>
with a self chosen name, this will be the name of your network interface (tun device) for this peering<LOCAL_GATEWAY_IP>
with your own dn42 ip address<REMOTE_GATEWAY_IP>
with dn42 ip address of your peer#/etc/openvpn/<PEER_NAME>
daemon
proto <PROTO>
mode p2p
remote <REMOTE_HOST>
rport <REMOTE_PORT>
local <LOCAL_HOST>
lport <LOCAL_PORT>
dev-type tun
dev <INTERFACE_NAME>
comp-lzo
persist-key
persist-tun
ifconfig <LOCAL_GATEWAY_IP> <REMOTE_GATEWAY_IP>
secret /etc/openvpn/<PEER_NAME>.key
then create a new key and share it with your peer
$ openvpn --genkey --secret /etc/openvpn/<PEER_NAME>.key
daemon
proto <PROTO>
mode p2p
dev-type tun
comp-lzo
dev <INTERFACE_NAME>
persist-key
persist-tun
float
port <LOCAL_PORT>
ifconfig <LOCAL_GATEWAY_IP> <REMOTE_GATEWAY_IP>
secret /etc/openvpn/<PEER_NAME>.key
<REMOTE_HOST>
is the ip address of your peer<REMOTE_PORT>
is openvpn port, where your peer listen for trafficdaemon
proto <PROTO>
mode p2p
remote <REMOTE_HOST>
rport <REMOTE_PORT>
lport float
dev-type tun
dev <INTERFACE_NAME>
comp-lzo
persist-key
persist-tun
ifconfig <LOCAL_GATEWAY_IP> <REMOTE_GATEWAY_IP>
secret /etc/openvpn/<PEER_NAME>.key
Hosted by: BURBLE-MNT, GRMML-MNT, XUU-MNT, JAN-MNT, LARE-MNT, SARU-MNT, ANDROW-MNT, MARK22K-MNT | Accessible via: dn42, dn42.dev, dn42.eu, wiki.dn42.us, dn42.de (IPv6-only), dn42.cc (wiki-ng), dn42.wiki, dn42.pp.ua, dn42.obl.ong
Last edited by lare, 2023-04-08 22:08:13