<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>服务器安全维护工作室 &#187; OpenVPN安装配置教程</title>
	<atom:link href="https://www.fuwuqiok.com/tag/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.fuwuqiok.com</link>
	<description></description>
	<lastBuildDate>Sun, 01 Mar 2020 07:28:40 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.26</generator>
	<item>
		<title>OpenVPN安装配置教程</title>
		<link>https://www.fuwuqiok.com/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/</link>
		<comments>https://www.fuwuqiok.com/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/#comments</comments>
		<pubDate>Tue, 08 Dec 2015 14:50:57 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[系统安全代维]]></category>
		<category><![CDATA[网站代维]]></category>
		<category><![CDATA[OpenVPN安装配置教程]]></category>
		<category><![CDATA[系统安全]]></category>

		<guid isPermaLink="false">https://www.fuwuqiok.com/?p=2816</guid>
		<description><![CDATA[<p>1、什么是 VPN ？ VPN （Virtual Private Network） 即虚拟专用网络，是一种常用 [&#8230;]</p>
<p><a rel="nofollow" href="https://www.fuwuqiok.com/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/">OpenVPN安装配置教程</a>，首发于<a rel="nofollow" href="https://www.fuwuqiok.com">服务器安全维护工作室</a>。</p>
]]></description>
				<content:encoded><![CDATA[<div class="entry-content">
<h1>1、什么是 VPN ？</h1>
<p>VPN （Virtual Private Network） 即虚拟专用网络，是一种常用于连接中、大型企业或团体与团体间的私人网络的通讯方法。虚拟私人网络的讯息透过公用的网络架构（例如：互联网）来传送内联网的网络讯息。它利用已加密的通道协议（Tunneling Protocol）来达到保密、发送端认证、消息准确性等私人消息安全效果。这种技术可以用不安全的网络（例如：互联网）来发送可靠、安全的消息。需要注意的是，加密消息与否是可以控制的。没有加密的虚拟专用网消息依然有被窃取的危险。【摘自<a href="http://zh.wikipedia.org/wiki/VPN">维基百科</a>】</p>
<p><a href="https://www.fuwuqiok.com/wp-content/uploads/2015/12/a2ed3c22f3aec44fb1f39525b59adf8b.png"><img class="attachment-medium" src="https://www.fuwuqiok.com/wp-content/uploads/2015/12/a2ed3c22f3aec44fb1f39525b59adf8b.png" alt="a2ed3c22f3aec44fb1f39525b59adf8b" width="1280" height="905" /></a></p>
<h3><span id=".E5.AE.89.E5.85.A8.E6.80.A7" class="mw-headline">2、安全性</span></h3>
<p>安全的虚拟私人网络使用<strong><a title="加密" href="http://zh.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86">加密</a><a class="mw-redirect" title="穿隧协议" href="http://zh.wikipedia.org/wiki/%E7%A9%BF%E9%9A%A7%E5%8D%94%E8%AD%B0">穿隧协议</a></strong>，通过阻止截听与<strong><a title="嗅探" href="http://zh.wikipedia.org/wiki/%E5%97%85%E6%8E%A2">嗅探</a></strong>来提供<strong><a class="mw-redirect" title="机密性" href="http://zh.wikipedia.org/wiki/%E6%9C%BA%E5%AF%86%E6%80%A7">机密性</a></strong>，还允许发送者身份验证，以阻止身份伪造，同时通过防止信息被修改提供消息<strong><a title="完整性" href="http://zh.wikipedia.org/wiki/%E5%AE%8C%E6%95%B4%E6%80%A7">完整性</a></strong>。</p>
<p>某些虚拟私人网络不使用加密保护数据。虽然虚拟私人网络通常都会提供安全性，但<strong>未加密</strong>的虚拟私人网络严格来说是不“<strong><a title="信息安全" href="http://zh.wikipedia.org/wiki/%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8">安全</a></strong>”或“<strong><a title="可信计算" href="http://zh.wikipedia.org/wiki/%E5%8F%AF%E4%BF%A1%E8%AE%A1%E7%AE%97">可信</a></strong>”的。例如，一条通过<a title="通用路由封装" href="http://zh.wikipedia.org/wiki/%E9%80%9A%E7%94%A8%E8%B7%AF%E7%94%B1%E5%B0%81%E8%A3%85">GRE</a>协议在两台主机间创建的隧道属于虚拟私人网络，但既不安全也不可信。 除以上的GRE协议例子外，本地的明文穿隧协议包括<strong><a class="mw-redirect" title="L2TP" href="http://zh.wikipedia.org/wiki/L2TP">L2TP</a></strong>（不带IPsec时）和<strong>PPTP</strong>（不使用微软点对点加密(MPPE)时）。</p>
<h3>3、协议</h3>
<p>常用的虚拟专用网协议有：</p>
<ul>
<li><a title="L2F" href="http://zh.wikipedia.org/wiki/L2F">L2F</a></li>
<li><a title="第二层隧道协议" href="http://zh.wikipedia.org/wiki/%E7%AC%AC%E4%BA%8C%E5%B1%82%E9%9A%A7%E9%81%93%E5%8D%8F%E8%AE%AE">L2TP</a></li>
<li><strong><a title="点对点隧道协议" href="http://zh.wikipedia.org/wiki/%E9%BB%9E%E5%B0%8D%E9%BB%9E%E9%9A%A7%E9%81%93%E5%8D%94%E8%AD%B0">PPTP</a></strong></li>
<li><strong><a title="IPsec" href="http://zh.wikipedia.org/wiki/IPsec">IPsec</a></strong></li>
<li><a class="new" title="SSL VPN（页面不存在）" href="http://zh.wikipedia.org/w/index.php?title=SSL_VPN&amp;action=edit&amp;redlink=1">SSL VPN</a></li>
<li><a class="new" title="Cisco VPN（页面不存在）" href="http://zh.wikipedia.org/w/index.php?title=Cisco_VPN&amp;action=edit&amp;redlink=1">Cisco VPN</a></li>
<li><strong><a title="OpenVPN" href="http://zh.wikipedia.org/wiki/OpenVPN">OpenVPN</a></strong></li>
</ul>
<h3>4、<span id=".E7.89.B9.E6.AE.8A.E4.BD.BF.E7.94.A8" class="mw-headline">特殊使用</span></h3>
<p>由于<a class="mw-redirect" title="中华人民共和国网络审查" href="http://zh.wikipedia.org/wiki/%E4%B8%AD%E8%8F%AF%E4%BA%BA%E6%B0%91%E5%85%B1%E5%92%8C%E5%9C%8B%E7%B6%B2%E7%B5%A1%E5%AF%A9%E6%9F%A5">中国大陆境内对于海外网络的限制及封锁</a>，所以中国大陆兴盛起以采用免费或付费的虚拟专用网（VPN）进行海外网络连接服务的方法进行<a title="突破网络审查" href="http://zh.wikipedia.org/wiki/%E7%AA%81%E7%A0%B4%E7%BD%91%E7%BB%9C%E5%AE%A1%E6%9F%A5">翻墙</a>， 或许多外商公司欲连接回海外网站也多自行架设VPN或采用付费的VPN服务。2015年1月起，中国开始加强对外国VPN服务的封锁。VPN 供应商 Astrill 通知用户，因防火长城升级，使用 IPSec、L2TP/IPSec 和 PPTP 协议的设备无法访问它的服务，受影响的主要是iOS设备。中国工信部曾规定，在中国提供VPN服务的公司必须登记注册，否则将“不受中国法律的保护”。</p>
<h3 class="desc ">5、OpenVPN 的特点</h3>
<h3><strong>简介</strong></h3>
<p>OpenVPN 允许参与创建 VPN 的单点使用<strong>公开密钥、电子证书、</strong>或者<strong>用户名／密码</strong>来进行<strong>身份验证</strong>。 它大量使用了 OpenSSL 加密库中的 SSLv3/TLSv1 协议函数库。目前 OpenVPN 能在 Solaris、Linux、OpenBSD、FreeBSD、NetBSD、Mac OS X 和 Windows 上运行，并包含了许多安全性的功能。它并不是一个基于 Web 的 VPN 软件，也不与 IPsec 及其他 VPN 软件兼容。</p>
<h3><strong>加密</strong></h3>
<p>OpenVPN 使用 OpenSSL 库加密数据与控制信息：它使用了 OpenSSL 的加密以及验证功能，意味着，它能够使用任何 OpenSSL 支持的算法。它提供了可选的数据包 <strong><a href="http://zh.wikipedia.org/wiki/%E9%87%91%E9%91%B0%E9%9B%9C%E6%B9%8A%E8%A8%8A%E6%81%AF%E9%91%91%E5%88%A5%E7%A2%BC">HMAC</a> </strong>功能以提高连接的安全性。此外，OpenSSL 的硬件加速也能提高它的性能。</p>
<h3><strong>验证</strong></h3>
<p>OpenVPN 提供了多种身份验证方式，用以确认参与连接双方的身份，包括：<strong>预享私钥</strong>，<strong>第三方证书</strong>以及<strong>用户名／密码</strong>组 合。预享密钥最为简单，但同时它只能用于创建点对点的 VPN；基于 PKI 的第三方证书提供了最完善的功能，但是需要额外的精力去维护一个 PKI 证书体系。OpenVPN 2.0 后引入了用户名／口令组合的身份验证方式，它可以省略客户端证书，但是仍有一份服务器证书需要被用作加密。</p>
<h3><strong>网络</strong></h3>
<p><strong>OpenVPN 所有的通信都基于一个单一的 IP 端口</strong>，默认且推荐使用 <strong>UDP</strong> 协议通讯，同时 TCP 也被支持。OpenVPN 连接能通过大多数的代理服务器，并且能够在 NAT 的环境中很好地工作。服务端具有向客户端“推送”某些网络配置信息的功能，这些信息包括：<strong>IP地址、路由设置</strong>等。OpenVPN 提供了两种虚拟网络接口：通用 Tun/Tap 驱动，通过它们，可以创建三层 IP 隧道，或者虚拟二层以太网，后者可以传送任何类型的二层以太网络数据。传送的数据可通过<strong> LZO</strong> 算法压缩。IANA（Internet Assigned Numbers Authority）指定给 OpenVPN 的官方端口为 1194。OpenVPN 2.0 以后版本每个进程可以同时管理数个并发的隧道。 <strong>OpenVPN 使用通用网络协议（TCP与UDP）的特点使它成为IPsec 等协议的理想替代，尤其是在 ISP（Internet service provider）过滤某些特定VPN协议的情况下，如无视GFW。</strong></p>
<h3><strong>安全</strong></h3>
<p>OpenVPN 与生俱来便具备了许多安全特性：它在用户空间运行，<strong>无须对内核</strong>及<strong>网络协议栈</strong>作修改；初始完毕后以chroot方式运行，放弃root权限；使用 mlockall 以防止敏感数据交换到磁盘。<br />
OpenVPN 通过 PKCS#11支持硬件加密标识，如智能卡。</p>
<h3><strong>对比</strong></h3>
<table cellspacing="10">
<tbody>
<tr bgcolor="#808080">
<td></td>
<td>
<div><strong>PPTP</strong></div>
</td>
<td>
<div><strong>L2TP/IPSEC</strong></div>
</td>
<td>
<div><strong>OpenVPN</strong></div>
</td>
</tr>
<tr>
<td><strong>简介</strong></td>
<td>微软推出的第一个VPN协议。占用资源少，应用最为广泛。</td>
<td>更高级的VPN协议，支持各种平台。安全性更高，但是不太灵活，容易被封锁。</td>
<td>开源的 vpn 协议，加密性和适应性都比较好，也比较灵活，不容易被封锁。通过 udp 端口可以获得较好的速度。</td>
</tr>
<tr>
<td><strong>加密</strong></td>
<td>支持40位、56位和128位加密</td>
<td>256位加密</td>
<td>可自定义160位-256位</td>
</tr>
<tr>
<td><strong>平台支持</strong></td>
<td>
<ul>
<li>Windows</li>
<li>Mac</li>
<li>Linux</li>
<li>iOS</li>
<li>Android</li>
<li>DDWRT</li>
</ul>
</td>
<td>
<ul>
<li>Windows</li>
<li>Mac</li>
<li>Linux</li>
<li>iOS</li>
<li>Android</li>
</ul>
</td>
<td>
<ul>
<li>Windows（第三方软件）</li>
<li>Mac（第三方软件）</li>
<li>Linux</li>
<li>iOS（第三方软件）</li>
<li>Android（第三方软件）</li>
<li>DDWRT</li>
</ul>
</td>
</tr>
<tr>
<td><strong>连接速度</strong></td>
<td>很快</td>
<td>快</td>
<td>快</td>
</tr>
<tr>
<td><strong>端口</strong></td>
<td>1723 TCP</td>
<td>500 UDP<br />
1701 UDP<br />
5500 UDP</td>
<td>可根据需要自定义 和 更换，即 UDP/TCP的任何端口</td>
</tr>
<tr>
<td><strong>防封锁</strong></td>
<td>通过协议和端口很容易被封锁</td>
<td>通过协议和端口很容易被封锁</td>
<td>比较难封锁（基于标准的TCP/IP协议），其 UDP 模式是官方推荐的，速度很快，效率很高。</td>
</tr>
</tbody>
</table>
</div>
<footer class="entry-footer"></footer>
<footer class="entry-footer">
<h3 class="title-post">OpenVPN 的安装和配置（Windows 和 Linux 客户端连接 OpenVPN 服务器）</h3>
<div class="entry-content">
<h3>1、OpenVPN 官网</h3>
<p><a href="http://openvpn.net/">http://openvpn.net/</a> ，非常不幸，已被墙。</p>
<p>Windows 客户端<a href="https://community.openvpn.net/openvpn/wiki/OpenVPN-GUI"> https://community.openvpn.net/openvpn/wiki/OpenVPN-GUI</a> ，<a href="http://sourceforge.net/projects/openvpn-gui/">下载地址</a>。</p>
<h3>2、OpenVPN 安装</h3>
<h3>源码（安装包）</h3>
<p>下载地址： <a href="http://openvpn.net/index.php/open-source/downloads.html">http://openvpn.net/index.php/open-source/downloads.html</a></p>
<h3>RPM 安装(CentOS)：</h3>
<p>下面以 CentOS 5 的证书模式为例：</p>
<h4><strong>1）安装</strong>（客户端与服务器端安装方式一致）</h4>
<p>&nbsp;</p>
<p>a)  rpm 包方式</p>
<p><span class="pln">                   rpm </span><span class="pun">–</span><span class="pln">ivh lzo</span><span class="pun">–</span><span class="lit">2.03</span><span class="pun">–</span><span class="lit">3.1</span><span class="pun">.</span><span class="pln">el6_5</span><span class="pun">.</span><span class="lit">1.x86</span><span class="pln">_64</span><span class="pun">.</span><span class="pln">rpm openvpn</span><span class="pun">–</span><span class="lit">2.3</span><span class="pun">.</span><span class="lit">2</span><span class="pun">–</span><span class="lit">2.el6.x86</span><span class="pln">_64</span><span class="pun">.</span><span class="pln">rpm pkcs11</span><span class="pun">–</span><span class="pln">helper</span><span class="pun">–</span><span class="lit">1.08</span><span class="pun">–</span><span class="lit">1.el6.rf</span><span class="pun">.</span><span class="pln">x86_64</span><span class="pun">.</span><span class="pln">rpm</span></p>
<p>&nbsp;</p>
<p>b)  yum 方式（需要 rpmforge 源）</p>
<p><span class="pln">                   rpm </span><span class="pun">–</span><span class="pln">ivh http</span><span class="pun">:</span><span class="com">//apt.sw.be/redhat/el5/en/i386/rpmforge/RPMS/rpmforge-release-0.5.3-1.el5.rf.i386.rpm</span></p>
<p><span class="pln">                   yum makecache</span></p>
<p><span class="pln">                   yum install openvpn </span><span class="pun">–</span><span class="pln">y</span></p>
<p>&nbsp;</p>
<p><span class="pun"><span class="pln">                   </span>安装了以下</span><span class="lit">3</span><span class="pun">个包（可能由于更新，版本号会高一些）：</span></p>
<p><span class="pun"><span class="pln">                   </span>(</span><span class="lit">1</span><span class="pun">/</span><span class="lit">3</span><span class="pun">):</span><span class="pln"> lzo</span><span class="pun">–</span><span class="lit">2.03</span><span class="pun">–</span><span class="lit">3.1</span><span class="pun">.</span><span class="pln">el6</span><span class="pun">.</span><span class="pln">x86_64</span><span class="pun">.</span><span class="pln">rpm</span></p>
<p><span class="pun"><span class="pln">                   </span>(</span><span class="lit">2</span><span class="pun">/</span><span class="lit">3</span><span class="pun">):</span><span class="pln"> openvpn</span><span class="pun">–</span><span class="lit">2.2</span><span class="pun">.</span><span class="lit">2</span><span class="pun">–</span><span class="lit">1.el6.rf</span><span class="pun">.</span><span class="pln">x86_64</span><span class="pun">.</span><span class="pln">rpm</span></p>
<p><span class="pun"><span class="pln">                   </span>(</span><span class="lit">3</span><span class="pun">/</span><span class="lit">3</span><span class="pun">):</span><span class="pln"> pkcs11</span><span class="pun">–</span><span class="pln">helper</span><span class="pun">–</span><span class="lit">1.08</span><span class="pun">–</span><span class="lit">1.el6.rf</span><span class="pun">.</span><span class="pln">x86_64</span><span class="pun">.</span><span class="pln">rpm</span></p>
<p>&nbsp;</p>
<h4><strong>2）服务器配置</strong></h4>
<p>a)  证书制作，上传制作 key 的工具 （easy-rsa.zip）（至<strong>OpenVPN 的默认工作目录是 /etc/openvpn/</strong>），并解压 easy-rsa.zip：</p>
<p><span class="pln">                   cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span><span class="pun">/</span></p>
<p><span class="pln">                   unzip easy</span><span class="pun">–</span><span class="pln">rsa</span><span class="pun">.</span><span class="pln">zip</span></p>
<p><span class="pln">                   cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span><span class="pun">/</span><span class="pln">easy</span><span class="pun">–</span><span class="pln">rsa</span><span class="pun">/</span><span class="lit">2.0</span></p>
<p><span class="pln">                   chmod </span><span class="pun">+</span><span class="pln">x </span><span class="pun">*</span></p>
<p>&nbsp;</p>
<p>或者使用 yum 安装</p>
<p>yum install easy-rsa -y</p>
<p>cd /usr/share/</p>
<p>cp -a easy-rsa/ /etc/openvpn/</p>
<p>cd easy-rsa/2.0/</p>
<p>接下来的操作与上面类似。</p>
<p>&nbsp;</p>
<p>b)  配置服务器端证书：</p>
<p><span class="pln">                   cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span><span class="pun">/easy-rsa/2.0</span></p>
<p><span class="pln">                   source </span><span class="pun">./</span><span class="pln">vars                                </span><span class="com">// 初始化环境变量</span></p>
<p><span class="pun"><span class="pln">                   </span>./</span><span class="pln">clean</span><span class="pun">-all</span><span class="pln">                                     </span><span class="com">// 清空keys目录</span></p>
<p><span class="pun"><span class="pln">                   ./build-ca server</span></span><span class="pln">                        </span><span class="com">// 创建CA</span></p>
<p><span class="pun"><span class="pln">                   </span>./</span><span class="pln">build</span><span class="pln"><span class="pun">-k</span>ey</span><span class="pun">-s</span><span class="pln">erver server       </span><span class="com">// 生成服务器证书,都是默认回车，最后2次是按y</span></p>
<p><span class="pun"><span class="pln">                   </span>./</span><span class="pln">build</span><span class="pun">-k</span><span class="pln">ey client1                   </span><span class="com">// 生成客户端证书,都是默认回车，最后2次是按y</span></p>
<p><span class="pun"><span class="pln">                   </span>./</span><span class="pln">build</span><span class="pun">-d</span><span class="pln">h                                   </span><span class="com">// 最后生成Diffie Hellman参数</span></p>
<p>c)  新增客户端证书：</p>
<p>cd /etc/openvpn/easy-rsa/2.0</p>
<p><span class="pln">                   source </span><span class="pun">./</span><span class="pln">vars                           </span><span class="com">// 初始化环境变量</span></p>
<p><span class="pun"><span class="pln">                   ./build-key client2</span></span><span class="pln">               </span><span class="com">// 生成客户端证书,都是默认回车，最后2次是按y</span></p>
<p>d)  Server 端配置文件，到 <code>/etc/openvpn/</code> 目录下新建 server.conf 文件（OpenVPN 默认会识别 .conf 结尾的文件，所以可以创建多个 .conf 以监听多个端口，即实例）</p>
<p>port 1194</p>
<p>proto udp</p>
<p>dev tun</p>
<p>ca /etc/openvpn/easy-rsa/2.0/keys/ca.crt</p>
<p>cert /etc/openvpn/easy-rsa/2.0/keys/server.crt</p>
<p>key /etc/openvpn/easy-rsa/2.0/keys/server.key</p>
<p>dh /etc/openvpn/easy-rsa/2.0/keys/dh2048.pem</p>
<p>server 10.10.0.0 255.255.0.0</p>
<p>ifconfig-pool-persist ipp.txt</p>
<p>client-config-dir ccd</p>
<p>client-to-client</p>
<p>keepalive 10 120</p>
<p>comp-lzo</p>
<p>user nobody</p>
<p>group nobody</p>
<p>persist-key</p>
<p>persist-tun</p>
<p>status openvpn-status.log</p>
<p>log         openvpn.log</p>
<p>verb 3</p>
<p>script-security 2</p>
<p>d)  启动 OpenVPN 服务器</p>
<p><span class="com"><span class="pln"><span class="pun">                   </span></span># 创建 ccd 目录</span></p>
<p><span class="pln"><span class="pun">                   </span>cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span><span class="pun">/</span></p>
<p><span class="pln"><span class="pun">                   </span>mkdir ccd</span></p>
<p><span class="com"><span class="pln"><span class="pun">                   </span></span># 启动 OpenVPN 服务</span></p>
<p><span class="pln"><span class="pun">                   </span>service openvpn start</span></p>
<p><span class="com"><span class="pln"><span class="pun">                   </span></span># 查看监听端口</span></p>
<p><span class="pln"><span class="pun">                   </span>netstat </span><span class="pun">–</span><span class="pln">tunlp </span><span class="pun">|</span><span class="pln"> grep openvpn</span></p>
<p><span class="com"><span class="pln"><span class="pun">                   </span></span># 可能看到如下</span></p>
<p><span class="pun"><span class="pln">                   </span>[</span><span class="pln">root@node </span><span class="pun">~]#</span><span class="pln"> netstat </span><span class="pun">–</span><span class="pln">tunlp </span><span class="pun">|</span><span class="pln"> grep openvpn</span></p>
<p><span class="pln"><span class="pun">                   </span>udp      </span><span class="lit">0</span><span class="pln"> </span><span class="lit">0</span><span class="pln"> </span><span class="lit">0.0</span><span class="pun">.</span><span class="lit">0.0</span><span class="pun">:</span><span class="lit">1194</span><span class="pln">        </span><span class="lit">0.0</span><span class="pun">.</span><span class="lit">0.0</span><span class="pun">:*</span><span class="pln">      </span><span class="lit">1625</span><span class="pun">/</span><span class="pln">openvpn</span></p>
<p><span class="com"><span class="pln"><span class="pun">                   </span></span># 设置开机启动</span></p>
<p><span class="pln"><span class="pun">                   </span>chkconfig openvpn on</span></p>
<p>到此，服务器端配置完毕。</p>
<h4><strong>3）客户端配置</strong></h4>
<p>Windows 客户端下载</p>
<p>a) 创建客户端配置文件</p>
<p>Linux 配置文件样例：</p>
<p>cd /etc/openvpn</p>
<p>cat &gt;&gt; client1.ovpn &lt;&lt; EOF</p>
<p>client</p>
<p>dev tun</p>
<p>proto udp</p>
<p>remote vpn.openvpnserver.com 1194</p>
<p>resolv-retry infinite</p>
<p>nobind</p>
<p>persist-key</p>
<p>persist-tun</p>
<p>ca  ca.crt</p>
<p>cert client1.crt</p>
<p>key client1.key</p>
<p>log openvpn-client.log</p>
<p>comp-lzo</p>
<p>script-security 2</p>
<p>verb 3</p>
<p>EOF</p>
<p>Windows 配置文件样例：</p>
<p>client<br />
dev tun<br />
proto tcp-client<br />
remote vpn.openvpnserver.com 1194<br />
resolv-retry infinite<br />
nobind<br />
persist-key<br />
persist-tun<br />
ca ca.crt<br />
cert client1.crt<br />
key client1.key<br />
comp-lzo<br />
script-security 2<br />
verb 3</p>
<p>b) 上传证书</p>
<p>由客户端配置文件可知，涉及3个文件 ca.crt、client1.crt 和 client1.key，这3个文件都是生成服务器的 <code>/etc/openvpn/easy-rsa/2.0/keys/</code> 目录下 。</p>
<p>将服务器端的 /etc/openvpn/easy-rsa/2.0/keys/ 下的3个文件：<br />
<code>ca.crt</code><br />
<code> client1.crt</code><br />
<code> client1.key</code><br />
和上面的client1.ovpn共四个文件放入：<code>/etc/openvpn/</code></p>
<p>所以在客户端（Linux）的 <code>/etc/openvpn/</code> 目录下应该有<strong> ca.crt、client1.crt、client1.key</strong> 和 <strong>client1.ovpn</strong> 共 4 个文件。</p>
<p>Win64 系统目录：<br />
C:\Program Files (x86)\OpenVPN\config<br />
Win32 系统目录：<br />
C:\Program Files\OpenVPN\config</p>
<p>c) 启动客户端</p>
<p><strong>Linux:</strong></p>
<p><span class="com"># 启动</span></p>
<p><span class="pln">cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span></p>
<p><span class="pln">openvpn client1</span><span class="pun">.</span><span class="pln">ovpn </span><span class="pun">&amp;</span></p>
<p><span class="pln"> </span></p>
<p><span class="com"># 启动后，正常情况下将看到类似以下显示：</span></p>
<p><span class="pun">[</span><span class="pln">root@node home</span><span class="pun">]#</span><span class="pln"> ifconfig tun0</span></p>
<p><span class="pln">tun0      </span><span class="typ">Link</span><span class="pln"> encap</span><span class="pun">:</span><span class="pln">UNSPEC  </span><span class="typ">HWaddr</span><span class="pln"> </span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pun">–</span><span class="lit">00</span><span class="pln">  </span></p>
<p><span class="pln">          inet addr</span><span class="pun">:</span><span class="lit">10.18</span><span class="pun">.</span><span class="lit">1.98</span><span class="pln">  P</span><span class="pun">–</span><span class="pln">t</span><span class="pun">–</span><span class="pln">P</span><span class="pun">:</span><span class="lit">10.10</span><span class="pun">.</span><span class="lit">1.97</span><span class="pln">  </span><span class="typ">Mask</span><span class="pun">:</span><span class="lit">255.255</span><span class="pun">.</span><span class="lit">255.255</span></p>
<p><span class="pln">          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU</span><span class="pun">:</span><span class="lit">1500</span><span class="pln">  </span><span class="typ">Metric</span><span class="pun">:</span><span class="lit">1</span></p>
<p><span class="pln">          RX packets</span><span class="pun">:</span><span class="lit">2848</span><span class="pln"> errors</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> dropped</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> overruns</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> frame</span><span class="pun">:</span><span class="lit">0</span></p>
<p><span class="pln">          TX packets</span><span class="pun">:</span><span class="lit">2842</span><span class="pln"> errors</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> dropped</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> overruns</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> carrier</span><span class="pun">:</span><span class="lit">0</span></p>
<p><span class="pln">          collisions</span><span class="pun">:</span><span class="lit">0</span><span class="pln"> txqueuelen</span><span class="pun">:</span><span class="lit">100</span><span class="pln"> </span></p>
<p><span class="pln">          RX bytes</span><span class="pun">:</span><span class="lit">881475</span><span class="pln"> </span><span class="pun">(</span><span class="lit">860.8</span><span class="pln"> </span><span class="typ">KiB</span><span class="pun">)</span><span class="pln">  TX bytes</span><span class="pun">:</span><span class="lit">924210</span><span class="pln"> </span><span class="pun">(</span><span class="lit">902.5</span><span class="pln"> </span><span class="typ">KiB</span><span class="pun">)</span></p>
<p><span class="pln"> </span></p>
<p><span class="com"># 开机启动</span></p>
<p><span class="pln">cat </span><span class="pun">&gt;&gt;</span><span class="pln"> </span><span class="str">/etc/</span><span class="pln">rc</span><span class="pun">.</span><span class="kwd">local</span><span class="pln"> </span><span class="pun">&lt;&lt;</span><span class="pln"> EOF</span></p>
<p><span class="pln">cd </span><span class="pun">/</span><span class="pln">etc</span><span class="pun">/</span><span class="pln">openvpn</span></p>
<p><span class="pln">openvpn client1</span><span class="pun">.</span><span class="pln">ovpn </span><span class="pun">&amp;</span></p>
<p><span class="pln">EOF</span></p>
<p><strong>Windows:</strong></p>
<p>Windows 7 和 8.1 需要以管理员权限运行</p>
<p>双击图标 <img src="http://www.linux-mac.com/wp-content/uploads/2015/05/openvpn2.jpg" alt="" /> 运行；</p>
<p>红色<a href="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn3-1.jpg"><img class="attachment-medium" src="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn3-1.jpg" alt="openvpn3-1" width="198" height="40" /></a>表示未连接服务器；</p>
<p>黄色<a href="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn3-2.jpg"><img class="attachment-medium" src="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn3-2.jpg" alt="openvpn3-2" width="195" height="40" /></a>表示正在连接 OpenVPN服务器；</p>
<p>绿色<a href="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn5.jpg"><img class="attachment-medium" src="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn5.jpg" alt="openvpn5" width="196" height="40" /></a>表示已经连上OpenVPN服务器；</p>
<p><a href="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn4.png"><img class="attachment-medium" src="https://www.fuwuqiok.com/wp-content/uploads/2015/12/openvpn4.png" alt="openvpn4" width="586" height="379" /></a></p>
<p>上图中的日 <code>Wed May 13 14:44:19 2015 Successful ARP Flush on interface [23] {CACC8C9F-1609-484A-8606-2A2748A7A868}</code> 表示连接成功，图标也会变绿色。</p>
</div>
</footer>
<p><a rel="nofollow" href="https://www.fuwuqiok.com/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/">OpenVPN安装配置教程</a>，首发于<a rel="nofollow" href="https://www.fuwuqiok.com">服务器安全维护工作室</a>。</p>
]]></content:encoded>
			<wfw:commentRss>https://www.fuwuqiok.com/openvpn%e5%ae%89%e8%a3%85%e9%85%8d%e7%bd%ae%e6%95%99%e7%a8%8b/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
