mirror of
https://github.com/LCTT/TranslateProject.git
synced 2024-12-26 21:30:55 +08:00
72ae9d79a3
sources/tech/20210806 Access OpenVPN from a client computer.md
144 lines
6.9 KiB
Markdown
144 lines
6.9 KiB
Markdown
[#]: subject: "Access OpenVPN from a client computer"
|
||
[#]: via: "https://opensource.com/article/21/7/openvpn-client"
|
||
[#]: author: "D. Greg Scott https://opensource.com/users/greg-scott"
|
||
[#]: collector: "lujun9972"
|
||
[#]: translator: " "
|
||
[#]: reviewer: " "
|
||
[#]: publisher: " "
|
||
[#]: url: " "
|
||
|
||
Access OpenVPN from a client computer
|
||
======
|
||
After building your own VPN on Linux, it's time to finally use it.
|
||
![Woman programming][1]
|
||
|
||
OpenVPN creates an encrypted tunnel between two points, preventing a third party from accessing your network traffic. By setting up your virtual private network (VPN) server, you become your own VPN provider. Many popular VPN services already use [OpenVPN][2], so why tie your connection to a specific provider when you can have complete control yourself?
|
||
|
||
The [first article][3] in this series set up a server for your VPN, the [second article][4] demonstrated how to install and configure the OpenVPN server software, while the [third article][5] explained how to configure your firewall and start the OpenVPN server software. This fourth and final article demonstrates how to use your OpenVPN server from client computers. This is the reason you did all the work in the previous three articles!
|
||
|
||
### Create client certificates
|
||
|
||
Remember that the method of authentication for OpenVPN requires both the server and the client to _have_ something (certificates) and to _know_ something (a password). It's time to set that up.
|
||
|
||
First, create a client certificate and a private key for your client computer. On your OpenVPN server, generate a certificate request. It asks for a passphrase; make sure you remember it:
|
||
|
||
|
||
```
|
||
$ cd /etc/openvpn/ca
|
||
$ sudo /etc/openvpn/easy-rsa/easyrsa \
|
||
gen-req greglaptop
|
||
```
|
||
|
||
In this example, `greglaptop` is the client computer for which this certificate is being created.
|
||
|
||
There's no need to import the request into the certificate authority (CA) because it's already there. Review it to make sure:
|
||
|
||
|
||
```
|
||
$ cd /etc/openvpn/ca
|
||
$ /etc/openvpn/easy-rsa/easyrsa \
|
||
show-req greglaptop
|
||
```
|
||
|
||
You can sign as the client, too:
|
||
|
||
|
||
```
|
||
$ /etc/openvpn/easy-rsa/easyrsa \
|
||
sign-req client greglaptop
|
||
```
|
||
|
||
### Install the OpenVPN client software
|
||
|
||
On Linux, Network Manager may already have an OpenVPN client included. If not, you can install the plugin:
|
||
|
||
|
||
```
|
||
`$ sudo dnf install NetworkManager-openvpn`
|
||
```
|
||
|
||
On Windows, you must download and install the OpenVPN client from the OpenVPN download site. Launch the installer and follow the prompts.
|
||
|
||
### Copy certificates and private keys to the client
|
||
|
||
Now your client needs the authentication credentials you generated for it. You generated these on the server, so you must transport them over to your client. I tend to use SSH for this. On Linux, that's the `scp` command. On Windows, you can use [WinSCP][6] as administrator to pull the certificates and keys.
|
||
|
||
Assuming the client is named `greglaptop`, here are the file names and server locations:
|
||
|
||
|
||
```
|
||
/etc/openvpn/ca/pki/issued/greglaptop.crt
|
||
/etc/openvpn/ca/pki/private/greglaptop.key
|
||
/etc/openvpn/ca/pki/issued/ca.crt
|
||
```
|
||
|
||
On Linux, copy these to the `/etc/pki/tls/certs/` directory. On Windows, copy them to the `C:\Program Files\OpenVPN\config` directory.
|
||
|
||
### Copy and customize the client configuration file
|
||
|
||
On Linux, you can either copy the `/etc/openvpn/client/OVPNclient2020.ovpn` file on the server to `/etc/NetworkManager/system-connections/`, or you can navigate to Network Manager in System Settings and add a VPN connection.
|
||
|
||
For the connection type, select **Certificates**. Point Network Manager to the certificates and keys you copied from the server.
|
||
|
||
![VPN displayed in Network Manager][7]
|
||
|
||
(Seth Kenlon, [CC BY-SA 4.0][8])
|
||
|
||
On Windows, run WinSCP as administrator to copy the client configuration template `/etc/openvpn/client/OVPNclient2020.ovpn` on the server to `C:\Program Files\OpenVPN\config` on the client. Then:
|
||
|
||
* Rename it to match the certificate above.
|
||
* Change the names of the CA certificate, client certificate, and key to match the names copied above from the server.
|
||
* Edit the IP information to match your network.
|
||
|
||
|
||
|
||
You need super administrative permissions to edit the client config files. The easiest way to get this might be to launch a CMD window as administrator and then launch Notepad from the administrator CMD window to edit the files.
|
||
|
||
### Connect your client to the server
|
||
|
||
On Linux, Network manager displays your VPN. Select it to connect.
|
||
|
||
|
||
|
||
![Add a VPN connection in Network Manager][9]
|
||
|
||
(Seth Kenlon, [CC BY-SA 4.0][8])
|
||
|
||
On Windows, start the OpenVPN graphical user interface (GUI). It produces a graphic in the Windows System Tray on the right side of the taskbar, usually in the lower-right corner of your Windows desktop. Right-click the graphic to connect, disconnect, or view the status.
|
||
|
||
For the first connection, edit the "remote" line of your client config file to use the _inside IP address_ of your OpenVPN server. Connect to the server from inside your office network by right-clicking on the OpenVPN GUI in the Windows System Tray and clicking **Connect**. Debug this connection. This should find and fix problems without any firewall issues getting in the way because both the client and server are on the same side of the firewall.
|
||
|
||
Next, edit the "remote" line of your client config file to use the _public IP address_ for your OpenVPN server. Bring the Windows client to an outside network and connect. Debug any issues.
|
||
|
||
### Connect securely
|
||
|
||
Congratulations! You have an OpenVPN network ready for your other client systems. Repeat the setup steps for the rest of your clients. You might even use Ansible to distribute certs and keys and keep them up to date.
|
||
|
||
* * *
|
||
|
||
_This article is based on D. Greg Scott's [blog][10] and is reused with permission._
|
||
|
||
--------------------------------------------------------------------------------
|
||
|
||
via: https://opensource.com/article/21/7/openvpn-client
|
||
|
||
作者:[D. Greg Scott][a]
|
||
选题:[lujun9972][b]
|
||
译者:[译者ID](https://github.com/译者ID)
|
||
校对:[校对者ID](https://github.com/校对者ID)
|
||
|
||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||
|
||
[a]: https://opensource.com/users/greg-scott
|
||
[b]: https://github.com/lujun9972
|
||
[1]: https://opensource.com/sites/default/files/styles/image-full-size/public/lead-images/programming-code-keyboard-laptop-music-headphones.png?itok=EQZ2WKzy (Woman programming)
|
||
[2]: https://openvpn.net/
|
||
[3]: https://opensource.com/article/21/7/vpn-openvpn-part-1
|
||
[4]: https://opensource.com/article/21/7/vpn-openvpn-part-2
|
||
[5]: https://opensource.com/article/21/7/vpn-openvpn-part-3
|
||
[6]: https://winscp.net/eng/index.php
|
||
[7]: https://opensource.com/sites/default/files/uploads/network-manager-profile.jpg (VPN displayed in Network Manager)
|
||
[8]: https://creativecommons.org/licenses/by-sa/4.0/
|
||
[9]: https://opensource.com/sites/default/files/uploads/network-manager-connect.jpg (Add a VPN connection in Network Manager)
|
||
[10]: https://www.dgregscott.com/how-to-build-a-vpn-in-four-easy-steps-without-spending-one-penny/
|