Managing Communication |
4.Create a configuration file named
#point to the peer remote 192.168.8.174 dev tap0
secret /etc/openvpn/secrouter.key cipher
auth MD5
#!/bin/sh |
|
#value after
end |
Create a configuration file named
#point to the peer remote 192.168.8.173 dev tap0
secret /etc/openvpn/secrouter.key cipher
auth MD5
#!/bin/sh |
|
#value after
end |
Note: Select cipher and authentication algorithms by specifying “cipher” and “auth”. To see with algorithms are available, type:
# openvpn
# openvpn
5.Start both of OpenVPN peers,
# openvpn
# openvpn
If you see the line “Peer Connection Initiated with 192.168.8.173:5000” on each machine, the connection between OpenVPN machines has been established successfully on UDP port 5000.
6.On each OpenVPN machine, check the routing table by typing the command:
# route
Destination | Gateway | Genmsk | Flags | Metric | Ref | Use | Iface |
192.168.4.0 | * | 255.255.255.0 | U | 0 | 0 | 0 | br0 |
192.168.2.0 | * | 255.255.255.0 | U | 0 | 0 | 0 | br0 |
192.168.8.0 | * | 255.255.255.0 | U | 0 | 0 | 0 | ixp0 |
Interface ixp1 is connected to the bridging interface br0, to which device tap0 also connects, whereas the virtual device tun sits on top of tap0. This ensures that all traffic from internal networks connected to interface ixp1 that come to this bridge write to the TAP/TUN device that the OpenVPN program monitors. Once the OpenVPN program detects traffic on the