<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to support-requests</title><link href="https://sourceforge.net/p/openvpn-admin/support-requests/" rel="alternate"/><link href="https://sourceforge.net/p/openvpn-admin/support-requests/feed.atom" rel="self"/><id>https://sourceforge.net/p/openvpn-admin/support-requests/</id><updated>2006-11-03T03:16:09Z</updated><subtitle>Recent changes to support-requests</subtitle><entry><title>[ 1587665 ] Install Help and Instructions Please!</title><link href="https://sourceforge.net/p/openvpn-admin/support-requests/4/" rel="alternate"/><published>2006-11-03T03:16:09Z</published><updated>2006-11-03T03:16:09Z</updated><author><name>techman555</name><uri>https://sourceforge.net/u/guyte/</uri></author><id>https://sourceforge.netf1aa4f987d76908ca4f95462a20f6e970b623431</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Below is the server and client config file you&lt;br /&gt;
requested for my OpenVPN config folder.&lt;/p&gt;
&lt;p&gt;I want to give clients access to the internet through&lt;br /&gt;
WinProxy and have the be required to go through the&lt;br /&gt;
OpenVPN proxy tunnel to authenticate with encryption in&lt;br /&gt;
order to have access to the internet through the proxy.&lt;/p&gt;
&lt;p&gt;Please advise what I am to do from here to get&lt;br /&gt;
OpenVPN-Admin running for the server and client through&lt;br /&gt;
WInproxy proxy server or a proxy server in general.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;
&lt;p&gt;In Christ&lt;/p&gt;
&lt;p&gt;Guy Te&lt;/p&gt;
&lt;p&gt;#################################################&lt;br /&gt;
# Sample OpenVPN 2.0 config file for            #&lt;br /&gt;
# multi-client server.                          #&lt;br /&gt;
#                                               #&lt;br /&gt;
# This file is for the server side              #&lt;br /&gt;
# of a many-clients &amp;lt;-&amp;gt; one-server              #&lt;br /&gt;
# OpenVPN configuration.                        #&lt;br /&gt;
#                                               #&lt;br /&gt;
# OpenVPN also supports                         #&lt;br /&gt;
# single-machine &amp;lt;-&amp;gt; single-machine             #&lt;br /&gt;
# configurations (See the Examples page         #&lt;br /&gt;
# on the web site for more info).               #&lt;br /&gt;
#                                               #&lt;br /&gt;
# This config should work on Windows            #&lt;br /&gt;
# or Linux/BSD systems.  Remember on            #&lt;br /&gt;
# Windows to quote pathnames and use            #&lt;br /&gt;
# double backslashes, e.g.:                     #&lt;br /&gt;
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #&lt;br /&gt;
#                                               #&lt;br /&gt;
# Comments are preceded with '#' or ';'         #&lt;br /&gt;
#################################################&lt;/p&gt;
&lt;p&gt;# Which local IP address should OpenVPN&lt;br /&gt;
# listen on? (optional)&lt;br /&gt;
;local a.b.c.d&lt;/p&gt;
&lt;p&gt;# Which TCP/UDP port should OpenVPN listen on?&lt;br /&gt;
# If you want to run multiple OpenVPN instances&lt;br /&gt;
# on the same machine, use a different port&lt;br /&gt;
# number for each one.  You will need to&lt;br /&gt;
# open up this port on your firewall.&lt;br /&gt;
port 1194&lt;/p&gt;
&lt;p&gt;# TCP or UDP server?&lt;br /&gt;
;proto tcp&lt;br /&gt;
proto udp&lt;/p&gt;
&lt;p&gt;# "dev tun" will create a routed IP tunnel,&lt;br /&gt;
# "dev tap" will create an ethernet tunnel.&lt;br /&gt;
# Use "dev tap" if you are ethernet bridging.&lt;br /&gt;
# If you want to control access policies&lt;br /&gt;
# over the VPN, you must create firewall&lt;br /&gt;
# rules for the the TUN/TAP interface.&lt;br /&gt;
# On non-Windows systems, you can give&lt;br /&gt;
# an explicit unit number, such as tun0.&lt;br /&gt;
# On Windows, use "dev-node" for this.&lt;br /&gt;
# On most systems, the VPN will not function&lt;br /&gt;
# unless you partially or fully disable&lt;br /&gt;
# the firewall for the TUN/TAP interface.&lt;br /&gt;
;dev tap&lt;br /&gt;
dev tun&lt;/p&gt;
&lt;p&gt;# Windows needs the TAP-Win32 adapter name&lt;br /&gt;
# from the Network Connections panel if you&lt;br /&gt;
# have more than one.  On XP SP2 or higher,&lt;br /&gt;
# you may need to selectively disable the&lt;br /&gt;
# Windows firewall for the TAP adapter.&lt;br /&gt;
# Non-Windows systems usually don't need this.&lt;br /&gt;
;dev-node MyTap&lt;/p&gt;
&lt;p&gt;# SSL/TLS root certificate (ca), certificate&lt;br /&gt;
# (cert), and private key (key).  Each client&lt;br /&gt;
# and the server must have their own cert and&lt;br /&gt;
# key file.  The server and all clients will&lt;br /&gt;
# use the same ca file.&lt;br /&gt;
#&lt;br /&gt;
# See the "easy-rsa" directory for a series&lt;br /&gt;
# of scripts for generating RSA certificates&lt;br /&gt;
# and private keys.  Remember to use&lt;br /&gt;
# a unique Common Name for the server&lt;br /&gt;
# and each of the client certificates.&lt;br /&gt;
#&lt;br /&gt;
# Any X509 key management system can be used.&lt;br /&gt;
# OpenVPN can also use a PKCS #12 formatted key file&lt;br /&gt;
# (see "pkcs12" directive in man page).&lt;br /&gt;
ca ca.crt&lt;br /&gt;
cert server.crt&lt;br /&gt;
key server.key  # This file should be kept secret&lt;/p&gt;
&lt;p&gt;# Diffie hellman parameters.&lt;br /&gt;
# Generate your own with:&lt;br /&gt;
#   openssl dhparam -out dh1024.pem 1024&lt;br /&gt;
# Substitute 2048 for 1024 if you are using&lt;br /&gt;
# 2048 bit keys. &lt;br /&gt;
dh dh1024.pem&lt;/p&gt;
&lt;p&gt;# Configure server mode and supply a VPN subnet&lt;br /&gt;
# for OpenVPN to draw client addresses from.&lt;br /&gt;
# The server will take 10.8.0.1 for itself,&lt;br /&gt;
# the rest will be made available to clients.&lt;br /&gt;
# Each client will be able to reach the server&lt;br /&gt;
# on 10.8.0.1. Comment this line out if you are&lt;br /&gt;
# ethernet bridging. See the man page for more info.&lt;br /&gt;
server 10.8.0.0 255.255.255.0&lt;/p&gt;
&lt;p&gt;# Maintain a record of client &amp;lt;-&amp;gt; virtual IP address&lt;br /&gt;
# associations in this file.  If OpenVPN goes down or&lt;br /&gt;
# is restarted, reconnecting clients can be assigned&lt;br /&gt;
# the same virtual IP address from the pool that was&lt;br /&gt;
# previously assigned.&lt;br /&gt;
ifconfig-pool-persist ipp.txt&lt;/p&gt;
&lt;p&gt;# Configure server mode for ethernet bridging.&lt;br /&gt;
# You must first use your OS's bridging capability&lt;br /&gt;
# to bridge the TAP interface with the ethernet&lt;br /&gt;
# NIC interface.  Then you must manually set the&lt;br /&gt;
# IP/netmask on the bridge interface, here we&lt;br /&gt;
# assume 10.8.0.4/255.255.255.0.  Finally we&lt;br /&gt;
# must set aside an IP range in this subnet&lt;br /&gt;
# (start=10.8.0.50 end=10.8.0.100) to allocate&lt;br /&gt;
# to connecting clients.  Leave this line commented&lt;br /&gt;
# out unless you are ethernet bridging.&lt;br /&gt;
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100&lt;/p&gt;
&lt;p&gt;# Push routes to the client to allow it&lt;br /&gt;
# to reach other private subnets behind&lt;br /&gt;
# the server.  Remember that these&lt;br /&gt;
# private subnets will also need&lt;br /&gt;
# to know to route the OpenVPN client&lt;br /&gt;
# address pool (10.8.0.0/255.255.255.0)&lt;br /&gt;
# back to the OpenVPN server.&lt;br /&gt;
;push "route 192.168.10.0 255.255.255.0"&lt;br /&gt;
;push "route 192.168.20.0 255.255.255.0"&lt;/p&gt;
&lt;p&gt;# To assign specific IP addresses to specific&lt;br /&gt;
# clients or if a connecting client has a private&lt;br /&gt;
# subnet behind it that should also have VPN access,&lt;br /&gt;
# use the subdirectory "ccd" for client-specific&lt;br /&gt;
# configuration files (see man page for more info).&lt;/p&gt;
&lt;p&gt;# EXAMPLE: Suppose the client&lt;br /&gt;
# having the certificate common name "Thelonious"&lt;br /&gt;
# also has a small subnet behind his connecting&lt;br /&gt;
# machine, such as 192.168.40.128/255.255.255.248.&lt;br /&gt;
# First, uncomment out these lines:&lt;br /&gt;
;client-config-dir ccd&lt;br /&gt;
;route 192.168.40.128 255.255.255.248&lt;br /&gt;
# Then create a file ccd/Thelonious with this line:&lt;br /&gt;
#   iroute 192.168.40.128 255.255.255.248&lt;br /&gt;
# This will allow Thelonious' private subnet to&lt;br /&gt;
# access the VPN.  This example will only work&lt;br /&gt;
# if you are routing, not bridging, i.e. you are&lt;br /&gt;
# using "dev tun" and "server" directives.&lt;/p&gt;
&lt;p&gt;# EXAMPLE: Suppose you want to give&lt;br /&gt;
# Thelonious a fixed VPN IP address of 10.9.0.1.&lt;br /&gt;
# First uncomment out these lines:&lt;br /&gt;
;client-config-dir ccd&lt;br /&gt;
;route 10.9.0.0 255.255.255.252&lt;br /&gt;
# Then add this line to ccd/Thelonious:&lt;br /&gt;
#   ifconfig-push 10.9.0.1 10.9.0.2&lt;/p&gt;
&lt;p&gt;# Suppose that you want to enable different&lt;br /&gt;
# firewall access policies for different groups&lt;br /&gt;
# of clients.  There are two methods:&lt;br /&gt;
# (1) Run multiple OpenVPN daemons, one for each&lt;br /&gt;
#     group, and firewall the TUN/TAP interface&lt;br /&gt;
#     for each group/daemon appropriately.&lt;br /&gt;
# (2) (Advanced) Create a script to dynamically&lt;br /&gt;
#     modify the firewall in response to access&lt;br /&gt;
#     from different clients.  See man&lt;br /&gt;
#     page for more info on learn-address script.&lt;br /&gt;
;learn-address ./script&lt;/p&gt;
&lt;p&gt;# If enabled, this directive will configure&lt;br /&gt;
# all clients to redirect their default&lt;br /&gt;
# network gateway through the VPN, causing&lt;br /&gt;
# all IP traffic such as web browsing and&lt;br /&gt;
# and DNS lookups to go through the VPN&lt;br /&gt;
# (The OpenVPN server machine may need to NAT&lt;br /&gt;
# the TUN/TAP interface to the internet in&lt;br /&gt;
# order for this to work properly).&lt;br /&gt;
# CAVEAT: May break client's network config if&lt;br /&gt;
# client's local DHCP server packets get routed&lt;br /&gt;
# through the tunnel.  Solution: make sure&lt;br /&gt;
# client's local DHCP server is reachable via&lt;br /&gt;
# a more specific route than the default route&lt;br /&gt;
# of 0.0.0.0/0.0.0.0.&lt;br /&gt;
;push "redirect-gateway"&lt;/p&gt;
&lt;p&gt;# Certain Windows-specific network settings&lt;br /&gt;
# can be pushed to clients, such as DNS&lt;br /&gt;
# or WINS server addresses.  CAVEAT:&lt;br /&gt;
# &lt;a href="http://openvpn.net/faq.html#dhcpcaveats" rel="nofollow"&gt;http://openvpn.net/faq.html#dhcpcaveats&lt;/a&gt;&lt;br /&gt;
;push "dhcp-option DNS 10.8.0.1"&lt;br /&gt;
;push "dhcp-option WINS 10.8.0.1"&lt;/p&gt;
&lt;p&gt;# Uncomment this directive to allow different&lt;br /&gt;
# clients to be able to "see" each other.&lt;br /&gt;
# By default, clients will only see the server.&lt;br /&gt;
# To force clients to only see the server, you&lt;br /&gt;
# will also need to appropriately firewall the&lt;br /&gt;
# server's TUN/TAP interface.&lt;br /&gt;
;client-to-client&lt;/p&gt;
&lt;p&gt;# Uncomment this directive if multiple clients&lt;br /&gt;
# might connect with the same certificate/key&lt;br /&gt;
# files or common names.  This is recommended&lt;br /&gt;
# only for testing purposes.  For production use,&lt;br /&gt;
# each client should have its own certificate/key&lt;br /&gt;
# pair.&lt;br /&gt;
#&lt;br /&gt;
# IF YOU HAVE NOT GENERATED INDIVIDUAL&lt;br /&gt;
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,&lt;br /&gt;
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",&lt;br /&gt;
# UNCOMMENT THIS LINE OUT.&lt;br /&gt;
;duplicate-cn&lt;/p&gt;
&lt;p&gt;# The keepalive directive causes ping-like&lt;br /&gt;
# messages to be sent back and forth over&lt;br /&gt;
# the link so that each side knows when&lt;br /&gt;
# the other side has gone down.&lt;br /&gt;
# Ping every 10 seconds, assume that remote&lt;br /&gt;
# peer is down if no ping received during&lt;br /&gt;
# a 120 second time period.&lt;br /&gt;
keepalive 10 120&lt;/p&gt;
&lt;p&gt;# For extra security beyond that provided&lt;br /&gt;
# by SSL/TLS, create an "HMAC firewall"&lt;br /&gt;
# to help block DoS attacks and UDP port flooding.&lt;br /&gt;
#&lt;br /&gt;
# Generate with:&lt;br /&gt;
#   openvpn --genkey --secret ta.key&lt;br /&gt;
#&lt;br /&gt;
# The server and each client must have&lt;br /&gt;
# a copy of this key.&lt;br /&gt;
# The second parameter should be '0'&lt;br /&gt;
# on the server and '1' on the clients.&lt;br /&gt;
;tls-auth ta.key 0 # This file is secret&lt;/p&gt;
&lt;p&gt;# Select a cryptographic cipher.&lt;br /&gt;
# This config item must be copied to&lt;br /&gt;
# the client config file as well.&lt;br /&gt;
;cipher BF-CBC        # Blowfish (default)&lt;br /&gt;
;cipher AES-128-CBC   # AES&lt;br /&gt;
;cipher DES-EDE3-CBC  # Triple-DES&lt;/p&gt;
&lt;p&gt;# Enable compression on the VPN link.&lt;br /&gt;
# If you enable it here, you must also&lt;br /&gt;
# enable it in the client config file.&lt;br /&gt;
comp-lzo&lt;/p&gt;
&lt;p&gt;# The maximum number of concurrently connected&lt;br /&gt;
# clients we want to allow.&lt;br /&gt;
;max-clients 100&lt;/p&gt;
&lt;p&gt;# It's a good idea to reduce the OpenVPN&lt;br /&gt;
# daemon's privileges after initialization.&lt;br /&gt;
#&lt;br /&gt;
# You can uncomment this out on&lt;br /&gt;
# non-Windows systems.&lt;br /&gt;
;user nobody&lt;br /&gt;
;group nobody&lt;/p&gt;
&lt;p&gt;# The persist options will try to avoid&lt;br /&gt;
# accessing certain resources on restart&lt;br /&gt;
# that may no longer be accessible because&lt;br /&gt;
# of the privilege downgrade.&lt;br /&gt;
persist-key&lt;br /&gt;
persist-tun&lt;/p&gt;
&lt;p&gt;# Output a short status file showing&lt;br /&gt;
# current connections, truncated&lt;br /&gt;
# and rewritten every minute.&lt;br /&gt;
status openvpn-status.log&lt;/p&gt;
&lt;p&gt;# By default, log messages will go to the syslog (or&lt;br /&gt;
# on Windows, if running as a service, they will go to&lt;br /&gt;
# the "\Program Files\OpenVPN\log" directory).&lt;br /&gt;
# Use log or log-append to override this default.&lt;br /&gt;
# "log" will truncate the log file on OpenVPN startup,&lt;br /&gt;
# while "log-append" will append to it.  Use one&lt;br /&gt;
# or the other (but not both).&lt;br /&gt;
;log         openvpn.log&lt;br /&gt;
;log-append  openvpn.log&lt;/p&gt;
&lt;p&gt;# Set the appropriate level of log&lt;br /&gt;
# file verbosity.&lt;br /&gt;
#&lt;br /&gt;
# 0 is silent, except for fatal errors&lt;br /&gt;
# 4 is reasonable for general usage&lt;br /&gt;
# 5 and 6 can help to debug connection problems&lt;br /&gt;
# 9 is extremely verbose&lt;br /&gt;
verb 3&lt;/p&gt;
&lt;p&gt;# Silence repeating messages.  At most 20&lt;br /&gt;
# sequential messages of the same message&lt;br /&gt;
# category will be output to the log.&lt;br /&gt;
;mute 20&lt;/p&gt;
&lt;p&gt;##############################################&lt;br /&gt;
# Sample client-side OpenVPN 2.0 config file #&lt;br /&gt;
# for connecting to multi-client server.     #&lt;br /&gt;
#                                            #&lt;br /&gt;
# This configuration can be used by multiple #&lt;br /&gt;
# clients, however each client should have   #&lt;br /&gt;
# its own cert and key files.                #&lt;br /&gt;
#                                            #&lt;br /&gt;
# On Windows, you might want to rename this  #&lt;br /&gt;
# file so it has a .ovpn extension           #&lt;br /&gt;
##############################################&lt;/p&gt;
&lt;p&gt;# Specify that we are a client and that we&lt;br /&gt;
# will be pulling certain config file directives&lt;br /&gt;
# from the server.&lt;br /&gt;
client&lt;/p&gt;
&lt;p&gt;# Use the same setting as you are using on&lt;br /&gt;
# the server.&lt;br /&gt;
# On most systems, the VPN will not function&lt;br /&gt;
# unless you partially or fully disable&lt;br /&gt;
# the firewall for the TUN/TAP interface.&lt;br /&gt;
;dev tap&lt;br /&gt;
dev tun&lt;/p&gt;
&lt;p&gt;# Windows needs the TAP-Win32 adapter name&lt;br /&gt;
# from the Network Connections panel&lt;br /&gt;
# if you have more than one.  On XP SP2,&lt;br /&gt;
# you may need to disable the firewall&lt;br /&gt;
# for the TAP adapter.&lt;br /&gt;
;dev-node MyTap&lt;/p&gt;
&lt;p&gt;# Are we connecting to a TCP or&lt;br /&gt;
# UDP server?  Use the same setting as&lt;br /&gt;
# on the server.&lt;br /&gt;
;proto tcp&lt;br /&gt;
proto udp&lt;/p&gt;
&lt;p&gt;# The hostname/IP and port of the server.&lt;br /&gt;
# You can have multiple remote entries&lt;br /&gt;
# to load balance between the servers.&lt;br /&gt;
remote my-server-1 1194&lt;br /&gt;
;remote my-server-2 1194&lt;/p&gt;
&lt;p&gt;# Choose a random host from the remote&lt;br /&gt;
# list for load-balancing.  Otherwise&lt;br /&gt;
# try hosts in the order specified.&lt;br /&gt;
;remote-random&lt;/p&gt;
&lt;p&gt;# Keep trying indefinitely to resolve the&lt;br /&gt;
# host name of the OpenVPN server.  Very useful&lt;br /&gt;
# on machines which are not permanently connected&lt;br /&gt;
# to the internet such as laptops.&lt;br /&gt;
resolv-retry infinite&lt;/p&gt;
&lt;p&gt;# Most clients don't need to bind to&lt;br /&gt;
# a specific local port number.&lt;br /&gt;
nobind&lt;/p&gt;
&lt;p&gt;# Downgrade privileges after initialization&lt;br /&gt;
(non-Windows only)&lt;br /&gt;
;user nobody&lt;br /&gt;
;group nobody&lt;/p&gt;
&lt;p&gt;# Try to preserve some state across restarts.&lt;br /&gt;
persist-key&lt;br /&gt;
persist-tun&lt;/p&gt;
&lt;p&gt;# If you are connecting through an&lt;br /&gt;
# HTTP proxy to reach the actual OpenVPN&lt;br /&gt;
# server, put the proxy server/IP and&lt;br /&gt;
# port number here.  See the man page&lt;br /&gt;
# if your proxy server requires&lt;br /&gt;
# authentication.&lt;br /&gt;
;http-proxy-retry # retry on connection failures&lt;br /&gt;
;http-proxy [proxy server] [proxy port #]&lt;/p&gt;
&lt;p&gt;# Wireless networks often produce a lot&lt;br /&gt;
# of duplicate packets.  Set this flag&lt;br /&gt;
# to silence duplicate packet warnings.&lt;br /&gt;
;mute-replay-warnings&lt;/p&gt;
&lt;p&gt;# SSL/TLS parms.&lt;br /&gt;
# See the server config file for more&lt;br /&gt;
# description.  It's best to use&lt;br /&gt;
# a separate .crt/.key file pair&lt;br /&gt;
# for each client.  A single ca&lt;br /&gt;
# file can be used for all clients.&lt;br /&gt;
ca ca.crt&lt;br /&gt;
cert client.crt&lt;br /&gt;
key client.key&lt;/p&gt;
&lt;p&gt;# Verify server certificate by checking&lt;br /&gt;
# that the certicate has the nsCertType&lt;br /&gt;
# field set to "server".  This is an&lt;br /&gt;
# important precaution to protect against&lt;br /&gt;
# a potential attack discussed here:&lt;br /&gt;
#  &lt;a href="http://openvpn.net/howto.html#mitm" rel="nofollow"&gt;http://openvpn.net/howto.html#mitm&lt;/a&gt;&lt;br /&gt;
#&lt;br /&gt;
# To use this feature, you will need to generate&lt;br /&gt;
# your server certificates with the nsCertType&lt;br /&gt;
# field set to "server".  The build-key-server&lt;br /&gt;
# script in the easy-rsa folder will do this.&lt;br /&gt;
;ns-cert-type server&lt;/p&gt;
&lt;p&gt;# If a tls-auth key is used on the server&lt;br /&gt;
# then every client must also have the key.&lt;br /&gt;
;tls-auth ta.key 1&lt;/p&gt;
&lt;p&gt;# Select a cryptographic cipher.&lt;br /&gt;
# If the cipher option is used on the server&lt;br /&gt;
# then you must also specify it here.&lt;br /&gt;
;cipher x&lt;/p&gt;
&lt;p&gt;# Enable compression on the VPN link.&lt;br /&gt;
# Don't enable this unless it is also&lt;br /&gt;
# enabled in the server config file.&lt;br /&gt;
comp-lzo&lt;/p&gt;
&lt;p&gt;# Set log file verbosity.&lt;br /&gt;
verb 3&lt;/p&gt;
&lt;p&gt;# Silence repeating messages&lt;br /&gt;
;mute 20&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Install Help and Instructions Please!</title><link href="https://sourceforge.net/p/openvpn-admin/support-requests/3/" rel="alternate"/><published>2006-10-31T04:15:06Z</published><updated>2006-10-31T04:15:06Z</updated><author><name>techman555</name><uri>https://sourceforge.net/u/guyte/</uri></author><id>https://sourceforge.netb59c45cfafd25ae25a12e3e4b71229dd10888c15</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I have installed OpenVPN-Admin to get OpenVPN running &lt;br /&gt;
on my computer.  I &lt;/p&gt;
&lt;p&gt;have know Idea where to go from here.  I will describe &lt;br /&gt;
my system and &lt;/p&gt;
&lt;p&gt;network below and can you answer some questions so I &lt;br /&gt;
can learn how to get &lt;/p&gt;
&lt;p&gt;this thing working?&lt;/p&gt;
&lt;p&gt;1.&lt;br /&gt;
I don't see a install/users manual with the software, &lt;br /&gt;
is there one that has &lt;/p&gt;
&lt;p&gt;easy step by step instruction?&lt;/p&gt;
&lt;p&gt;I have seen nothing easy and step by step on you site.&lt;/p&gt;
&lt;p&gt;2.&lt;br /&gt;
I don't know if I still have to go through the manual &lt;br /&gt;
configuration steps &lt;/p&gt;
&lt;p&gt;for OpenVPN and if so how that effects my current &lt;br /&gt;
install, do I or not?&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;3.&lt;br /&gt;
I am not sure how to get the configuration working on &lt;br /&gt;
My system, how can I?&lt;/p&gt;
&lt;p&gt;4.&lt;br /&gt;
Where are the step by step instructions on who to &lt;br /&gt;
install OpenVPN by &lt;/p&gt;
&lt;p&gt;installing OpenVPN-Admin?&lt;/p&gt;
&lt;p&gt;5.&lt;br /&gt;
Can I install a client by installing OpenVPN-ADmin as &lt;br /&gt;
a client and how?&lt;/p&gt;
&lt;p&gt;6.&lt;br /&gt;
I will describe my sytem and network and please give &lt;br /&gt;
me instructions on &lt;/p&gt;
&lt;p&gt;what to do from here to get OpenVPN working with my &lt;br /&gt;
OpenVPN-Admin install.&lt;/p&gt;
&lt;p&gt;I have setup Mono and GTK on my server.&lt;/p&gt;
&lt;p&gt;I have Winproxy running on a 90.XX.XX.XX nework. I &lt;br /&gt;
have a client computer &lt;/p&gt;
&lt;p&gt;accessing the internet through Winproxy, soon to be &lt;br /&gt;
more clients.&lt;/p&gt;
&lt;p&gt;I have my internet connection through a 192.XX.XX.XX &lt;br /&gt;
network.&lt;/p&gt;
&lt;p&gt;I have setup the Tap-Win32 Adapter V8 to have a &lt;br /&gt;
10.XX.XX.XX IP/network and &lt;/p&gt;
&lt;p&gt;255.XX.XX.XX subnet.&lt;/p&gt;
&lt;p&gt;My 90.XX.XX.XX nework subnet mask is different from my&lt;br /&gt;
192.XX.XX.XX network subnet mask for security reasons.&lt;/p&gt;
&lt;p&gt;My operating system is Windows 2000.&lt;/p&gt;
&lt;p&gt;7.&lt;br /&gt;
In Network Connections the Tap-Win32 Adapter V* &lt;br /&gt;
says "Network Cable &lt;/p&gt;
&lt;p&gt;Unpluggged." Is this normal since there is not &lt;br /&gt;
hardware for this adapter?&lt;/p&gt;
&lt;p&gt;8.&lt;br /&gt;
I have gone through none the manual config steps that &lt;br /&gt;
go with a regular &lt;/p&gt;
&lt;p&gt;install of OpenVPN itseld.  I though install with &lt;br /&gt;
OpenVPN-Admin I would be &lt;/p&gt;
&lt;p&gt;able to avoid manual setup. I this true or not? &lt;/p&gt;
&lt;p&gt;9.&lt;br /&gt;
If not what manual steps do I need to go through to &lt;br /&gt;
get it setup with &lt;/p&gt;
&lt;p&gt;OpenVPN-Admin already installed?&lt;br /&gt;
------&lt;/p&gt;
&lt;p&gt;10.&lt;br /&gt;
This is what I get when I right click on the system &lt;br /&gt;
tray icon &lt;/p&gt;
&lt;p&gt;client/connect menu option:&lt;br /&gt;
***"Mon Oct 30 22:37:43 2006 OpenVPN 2.0.7 Win32-MinGW &lt;br /&gt;
[SSL] [LZO] built on &lt;/p&gt;
&lt;p&gt;Apr 12 2006&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:37:43 2006 IMPORTANT: OpenVPN's default &lt;br /&gt;
port number is now &lt;/p&gt;
&lt;p&gt;1194, based on an official port number assignment by &lt;br /&gt;
IANA.  OpenVPN &lt;/p&gt;
&lt;p&gt;2.0-beta16 and earlier used 5000 as the default port.&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:37:43 2006 WARNING: No server &lt;br /&gt;
certificate verification method &lt;/p&gt;
&lt;p&gt;has been enabled.  See &lt;br /&gt;
&lt;a href="http://openvpn.net/howto.html#mitm" rel="nofollow"&gt;http://openvpn.net/howto.html#mitm&lt;/a&gt; for more info.&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:37:43 2006 Cannot load certificate file &lt;br /&gt;
client.crt: &lt;/p&gt;
&lt;p&gt;error:02001002:system library:fopen:No such file or &lt;br /&gt;
directory: &lt;/p&gt;
&lt;p&gt;error:20074002:BIO routines:FILE_CTRL:system lib: &lt;br /&gt;
error:140AD002:SSL &lt;/p&gt;
&lt;p&gt;routines:SSL_CTX_use_certificate_file:system lib&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:37:43 2006 Exiting"***&lt;br /&gt;
------&lt;/p&gt;
&lt;p&gt;This is what I get when I click on the system tray icon&lt;br /&gt;
sample/connect menu option:&lt;br /&gt;
***"Mon Oct 30 22:41:00 2006 us=55315 Current &lt;br /&gt;
Parameter Settings:&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55460   config &lt;br /&gt;
= 'C:\Program &lt;/p&gt;
&lt;p&gt;Files\OpenVPN\config\sample.ovpn'&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55482   mode = 0&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55498   show_ciphers = &lt;br /&gt;
DISABLED&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55514   show_digests = &lt;br /&gt;
DISABLED&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55557   show_engines = &lt;br /&gt;
DISABLED&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55572   genkey = DISABLED&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55588   key_pass_file &lt;br /&gt;
= '[UNDEF]'&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55603   show_tls_ciphers = &lt;br /&gt;
DISABLED&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55618   proto = 0&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55633 NOTE: --mute &lt;br /&gt;
triggered...&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55665 178 variation(s) on &lt;br /&gt;
previous 10 &lt;/p&gt;
&lt;p&gt;message(s) suppressed by --mute&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55685 OpenVPN 2.0.7 Win32-&lt;br /&gt;
MinGW [SSL] [LZO] &lt;/p&gt;
&lt;p&gt;built on Apr 12 2006&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55796 IMPORTANT: OpenVPN's &lt;br /&gt;
default port number &lt;/p&gt;
&lt;p&gt;is now 1194, based on an official port number &lt;br /&gt;
assignment by IANA.  OpenVPN &lt;/p&gt;
&lt;p&gt;2.0-beta16 and earlier used 5000 as the default port.&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=55817 WARNING: --ping &lt;br /&gt;
should normally be used &lt;/p&gt;
&lt;p&gt;with --ping-restart or --ping-exit&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=77868 Cannot open file key &lt;br /&gt;
file 'key.txt': The &lt;/p&gt;
&lt;p&gt;system cannot find the file specified.   (errno=2)&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:41:00 2006 us=77903 Exiting"***&lt;br /&gt;
-------&lt;/p&gt;
&lt;p&gt;This is what I get when I click on the sstem tray icon&lt;br /&gt;
server connect menu option:&lt;br /&gt;
***"Mon Oct 30 22:43:22 2006 OpenVPN 2.0.7 Win32-MinGW &lt;br /&gt;
[SSL] [LZO] built on &lt;/p&gt;
&lt;p&gt;Apr 12 2006&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:43:22 2006 Cannot open dh1024.pem for DH &lt;br /&gt;
parameters: &lt;/p&gt;
&lt;p&gt;error:02001002:system library:fopen:No such file or &lt;br /&gt;
directory: &lt;/p&gt;
&lt;p&gt;error:2006D080:BIO routines:BIO_new_file:no such file&lt;/p&gt;
&lt;p&gt;Mon Oct 30 22:43:22 2006 Exiting"***&lt;br /&gt;
------&lt;/p&gt;
&lt;p&gt;I know I must open Winproy port 1194 OpenVPN default &lt;br /&gt;
port.&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;Does OpenVPN have to be on the same 90.XX.XX.XX &lt;br /&gt;
network to work at all or &lt;/p&gt;
&lt;p&gt;just to work through Winproxy or both?&lt;/p&gt;
&lt;p&gt;Can you answer the above questions and what ever else &lt;br /&gt;
you think I need to &lt;/p&gt;
&lt;p&gt;know to get myself up and running with a server and &lt;br /&gt;
client.&lt;/p&gt;
&lt;p&gt;Thank you!&lt;/p&gt;
&lt;p&gt;In Christ&lt;/p&gt;
&lt;p&gt;Guy Te&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>gtk-sharp problem in make.</title><link href="https://sourceforge.net/p/openvpn-admin/support-requests/2/" rel="alternate"/><published>2006-03-09T19:03:56Z</published><updated>2006-03-09T19:03:56Z</updated><author><name>Anonymous</name><uri>https://sourceforge.net/u/userid-None/</uri></author><id>https://sourceforge.net0cdc6040c2c39c6975909e090382f198c4e4fc5a</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I use ./configure PKG_CONFIG_PATH=/path/to/gtk-sharp-&lt;br /&gt;
2.0/ it compiles finds C#.  I then run make, and I &lt;br /&gt;
get an error after about 5 seconds saying it can not &lt;br /&gt;
find GTK-Sharp.&lt;/p&gt;
&lt;p&gt;Why does the configure option not remember the path &lt;br /&gt;
to gtk-sharp-2.0.pc?  Am I doing something wrong?&lt;br /&gt;
This is on a fedora core 4 fresh install.  I have &lt;br /&gt;
mono installed also.&lt;/p&gt;
&lt;p&gt;thanks!&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>OpenVPN-Admin for RHEL?</title><link href="https://sourceforge.net/p/openvpn-admin/support-requests/1/" rel="alternate"/><published>2005-11-18T13:58:14Z</published><updated>2005-11-18T13:58:14Z</updated><author><name>Anonymous</name><uri>https://sourceforge.net/u/userid-None/</uri></author><id>https://sourceforge.neta0d937dbf2ca031b5e8aa374ea61a80f626d832d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I (and probably others) would love to use&lt;br /&gt;
OpenVPN_Admin, but can't install it on our Redhat&lt;br /&gt;
Enterprise Linux 3 and 4 servers because of a lack of&lt;br /&gt;
gtk-sharp2 for those environments.  Is a version&lt;br /&gt;
planned for RHEL?&lt;/p&gt;
&lt;p&gt;Thank you.&lt;/p&gt;
&lt;p&gt;Dimitri Yioulos&lt;br /&gt;
dyioulos@firstbhph.com&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>