
Now that we’ve finished modifying the configuration file, we’ll generate the required keys and certificates. Push "dhcp-option DNS 8.8.4.4" Generating Keys and Certificates Using easy-rsa push "redirect-gateway def1 bypass-dhcp"Īlso uncoment following line: user nobody Uncomment the “push” parameter which causes traffic on our client systems to be routed through OpenVPN.
INSTALL OPENVPN ACCESS SERVER CENTOS 6 INSTALL
Install the OpenVPN package from EPEL: # yum install openvpn -y Configure OpenVPN on CentOS 5.x/6.0/6.1/6.2/6.3/6.4/6.5Ĭopy sample openVPN configuration file to /etc/opnvpn # cp /usr/share/doc/openvpn-2.3.2/sample/sample-config-files/nf /etc/openvpn/Įdit /etc/openvpn/nf file # nano /etc/openvpn/nf Should return a similar line: cat: /dev/net/tun: File descriptor in bad state

Verify Tun/Tap Is Installed: # cat /dev/net/tun
INSTALL OPENVPN ACCESS SERVER CENTOS 6 UPDATE
Enable Epel repository on CentOS 5.x/6.x # yum update More info about OpenVPN Install OpenVPN on CentOS 5.x/6.0/6.1/6.2/6.3/6.4/6.5īefore we begin, you’ll need to have the Extra Packages for Enterprise Linux ( EPEL) Repository enabled on your server.

It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol, and contains many security and control features. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. It is capable of traversing network address translators (NATs) and firewalls. It uses a custom security protocol that utilizes SSL/TLS for key exchange.

OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point connections in routed or bridged configurations and remote access facilities.
