Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A VPN requires a client and server. The “client” is the remote device (BATM, computer, or cell phone) that connects to the “server”. The OpenVPN server runs on the same server as your CAS installation.

This configuration is divided into 2 two parts: 1) the server configuration and 2) the client configuration. The server-side is done completed first, and the resulting OVPN files (from the server setup) are then sent to your “clients”: the users that will want to connect to the CAS GUI/server/front end.

Quick jump:

Table of Contents
minLevel2
maxLevel2
include
outlinefalse
indent
styledefault
exclude
typelist
class
printabletrue

...

OpenVPN Server

Your CAS host runs an OpenVPN server. Other devices (clients) may then connect to your server to enjoy secure, protected access to CAS. This section described the first step: installing and configuring the server.

Install the required software.

...

Your CAS host runs an OpenVPN server. You connect to that server from a client. Every major OS (Windows, Linux, Mac, Android) supports a native OpenVPN client. This section described the second phase of OpenVPN setup: installing and configuring the client.

The OpenVPN settings required to connect to the server are contained in an OVPN file. That file is manually sent to each user, as explained above: Generate a OVPN file for CAS users

...

  • Only one client/OVPN file may be created for each CAS user.

  • You may use the same OVPN file on multiple devices,

  • as long as there is only one active connection per , only one device connected.

    • e.g you may use the same OVPN on your phone and laptop, but

    • you cannot use connect your phone and laptop at the same time.

...

  • the source is: root@10.11.12.13/batm/vpngen/cli-adminusers/vpnUjdoe.ovpn

  • the target is: . (a period represents “here”: the current directory).

Finally, using the above examples, this command would copy the OVPN source file to the current directory:

Code Block
scp root@10.11.12.13:/batm/vpngen/cli-adminusers/vpnUjdoe.ovpn ./
  • this example assumed assumes password authentication is currently enabled (default configuration).

  • WE URGE YOU TO Afterwards: AVOID USING PASSWORDS FOR SSH.

    Implementing public keys are recommended

    Convert to Public Key Authentication as soon as practical, and disable password-based SSH logins from that point forward.

  • You may be asked to confirm the “authenticity of host”. If this is the first time you’ve connected to that server, then do soconfirm it. You should not encounter that obstacle again for that server (unless the server has been rebuilt or compromised). It is a security checkpoint.

Modified (if you have heeded our warnings and implemented public key SSH access):

...