Now that you have the required certificates, you can configure an OpenVPN client on site 2 (Paris).
To do this, go to: VPN -> OpenVPN.
On the page that appears, go to the "Clients" tab and click on: Add.
For OpenVPN client configuration, specify this:
In the "Endpoint Configuration" section, indicate:
In the "Cryptographic Settings" section:
To find the TLS key of your OpenVPN server, go to site 1 (Brussels) where you installed your OpenVPN server and go to: VPN -> OpenVPN.
Next, go to the "Servers" tab and modify your OpenVPN server configuration.
In the "Cryptographic Settings" section, you will see the TLS key used by your OpenVPN server.
This TLS key looks like this:
Plain Text
# # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- xxxxxxxxxxxxxxxxxxxxxxxxx.... -----END OpenVPN Static key V1-----
Copy this TLS key from your OpenVPN server configuration.
Paste this TLS key into the "TLS Key" box in your OpenVPN client configuration.
In this "Cryptographic Settings" section, also configure these settings:
Important : if you do not see the name of your internal certificate authority and/or the name of the client certificate for your OpenVPN client, check in "System -> Certificate Manager" that you have imported the certificate of your internal certificate authority and the certificate + private key of the client certificate intended for your OpenVPN client.
In the "Tunnel Settings" section, you do not need to enter anything when OpenVPN operates in SSL/TLS mode.
Indeed, it is the OpenVPN server which manages the configuration and which sends the appropriate configurations to the various connected OpenVPN clients by identifying them using their certificate.
Note: these settings are only useful when you configure OpenVPN in "shared key" (PSK) mode. This is not the case here.
At the bottom of the page, click Save.
Your OpenVPN client has been added to your site 2 (Paris).
So that computers or servers can access the resources of site 2 (Paris), you must add a rule to this site's firewall.
To do this, go to: Firewall -> Rules.
Next, go to the "OpenVPN" tab and click: Add.
Note: as you can see, by default, all incoming connections (in this case for the OpenVPN tunnel) are blocked until there is a rule that allows the desired network traffic.
Allow all IPv4 network traffic for all protocols (TCP, UDP, ICMP, ...) in the OpenVPN tunnel.
Allow all network traffic in the OpenVPN tunnel regardless of source and destination.
To do this, select "Any" for the source and destination.
Next, provide a description (for guidance) and click Save.
In our case, we indicated this as a description: Allow all traffic from other sites through the OpenVPN tunnel.
Click: Apply Changes.
Inbound and outbound traffic for the OpenVPN tunnel on this site is allowed.
Firewall 7/25/2025
Firewall 7/2/2025
Firewall 6/20/2025
Firewall 7/23/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment