Today I created VPN to my home network. I need an access to my local resources and lab at home server from Internet. Here is how to enable OpenVPN server at ASUS router and how to configure сlient side at Windows.
First of all enable OpenVPN at ASUS router.
Step 2. In VPN Server - select OpenVPN section and enable OpenVPN Server
Step 3. In Basic OpenVPN configuration change VPN details from General to Advanced Settings
Here is a very useful recommendation:
By default ASUS enable VPN for user admin. So be careful and set a strong password for the administrator. You can create your own VPN account, and I highly recommend it, and never use the administrator account but you can not removing it from the list of VPN users.
For access to VPN I'm using OpenVPN client from https://openvpn.net/index.php/open-source/downloads.html
OpenVPN has clients for Windows, Mac OS X, Linux OS as well as Mobile Clients for iOS/Android.
After finishing the setting at ASUS Router, change VPN details from Advanced Settings to General and press Export button. Router will automaticaly generate a .opvn file with the Certification Authority key. You can download this file and import it to the local client. Don't forget to generate a strong password to the VPN account.
For the purpose of this example, we will assume that the server-side LAN uses a subnet of 192.168.122.0/24 and the VPN IP address pool uses 10.8.0.0/24 as cited in the server directive in the OpenVPN server configuration file.
First, you must advertise the 192.168.122.0/24 subnet to VPN clients as being accessible through the VPN. This can easily be done with the following server-side config file directive:
push "route 192.168.122.0 255.255.255.0"
This command should be added to the Custom Configuration
Do not forget to apply these changes!
First of all enable OpenVPN at ASUS router.
Step 1. Open VPN Tab in Advanced Settings Menu
Step 3. In Basic OpenVPN configuration change VPN details from General to Advanced Settings
Here is a very useful recommendation:
You can change the default settings of the OpenVPN server to provide a custom OPVN file for a specific connection type.
To use your own key, click the yellow link to modify settings.
Refer to the System Log for any error messages related to OpenVPN.
Before configuring the advanced settings of the OpenVPN server, ensure that these advanced settings options are compatible with the OpenVPN software in the client devices.
After checking System Log at client and server sides I've found a lot of option I have to change. To avoid errors and warnings settings on both sides must be identical.By default ASUS enable VPN for user admin. So be careful and set a strong password for the administrator. You can create your own VPN account, and I highly recommend it, and never use the administrator account but you can not removing it from the list of VPN users.
For access to VPN I'm using OpenVPN client from https://openvpn.net/index.php/open-source/downloads.html
OpenVPN has clients for Windows, Mac OS X, Linux OS as well as Mobile Clients for iOS/Android.
After finishing the setting at ASUS Router, change VPN details from Advanced Settings to General and press Export button. Router will automaticaly generate a .opvn file with the Certification Authority key. You can download this file and import it to the local client. Don't forget to generate a strong password to the VPN account.
Including multiple machines on the server side when using a routed VPN
Once the VPN is operational in a point-to-point capacity between client and server, it may be desirable to expand the scope of the VPN so that clients can reach multiple machines on the server network, rather than only the server machine itself.For the purpose of this example, we will assume that the server-side LAN uses a subnet of 192.168.122.0/24 and the VPN IP address pool uses 10.8.0.0/24 as cited in the server directive in the OpenVPN server configuration file.
First, you must advertise the 192.168.122.0/24 subnet to VPN clients as being accessible through the VPN. This can easily be done with the following server-side config file directive:
push "route 192.168.122.0 255.255.255.0"
This command should be added to the Custom Configuration
Do not forget to apply these changes!
Comments
Post a Comment