Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Security How To

Configuring the Client Side OpenVPN Machine

Setting up the client OpenVPN machine is Just like the server: create the directories for the certificates and keys; copy them over; and secure them appropriately. The client side OpenVPN configuration is a bit more sparse than the server's, since the server will be responsible for "pushing" the proper configuration settings to the client after connection.

#
# SmallNetBuilder OpenVPN Client Configuration
#

# Instructs OpenVPN to run in client mode, requests IP address and
# special instructions (like routes) from the server. 
client

# Interface for tunnel
dev tun0

# Remote server to connect to. Can be domain name or IP address.
remote smallnetbuilder.com

# Certificates and keys required for connection
ca /etc/openvpn/certs/ca.crt
cert /etc/openvpn/certs/remote_office.crt
key /etc/openvpn/keys/remote_office.key

# Symmetric cipher - Must be the same as the server's
cipher BF-CBC

# Protocol and Port - Must be the same on both server and client.
proto udp
port 1194

# Log to file instead of syslog
log-append /var/log/openvpn.log
verb 4

# Since the OpenVPN client is acting as a gateway for other machines
# on the client-side network, run as a daemon and downgrade user
# priviledges.
user nobody
group nobody
daemon

# Use a persistent key and tunnel interface.
persist-tun
persist-key

Configuring the Client Side Router

Just like the server-side setup, all the machines on the OpenVPN client's network also need to know how to reach the server's network (10.1.1.0/24). Add a route that directs all traffic destined for the server's network to the OpenVPN client machine (192.168.1.2). On the WRT54G it's under Setup > Advanced Routing (Figure 4).

Adding a Route to the Client-side Router
Click to enlarge image

Figure 4: Adding a Route to the Client-side Router

Finally, connect the client up to the OpenVPN server with:

 ~ # openvpn --config /etc/openvpn/client.conf

More Stuff

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Hello guys, is there any way to block Youtube ads from router with Skynet or Diversion? I do have Ublock on my pc but on my Tv can not get rid of this...
I am a bit out of my depth setting up my 4G modem to integrate with my wireless router and would really appreciate some advice.The equipment I am repl...
Will changing the mode of my Asus from wireless router to AP change the IP address? To log in the Asus right now it is 192.168.2.1. I don't want to ha...
Hello,My AC5300 started acting up a few days ago, noticed when the google home mini said it couldn't connect to WiFi. Next day more devices had proble...
I have an Orbi system. It is on the latest update. I use fibre with no username/password or anything, it just works.I did drop my router before having...

Don't Miss These

  • 1
  • 2
  • 3