ssh username@ipaddressEnter the password when you're asked to, and you're ready to start setting up OpenVPN.
sudo apt-get updateThis should have apt, Debian's package manager. Download all the updates for any packages that have them.
sudo apt-get upgradeAfter our system has downloaded all its updates, we can finally install OpenVPN.
sudo apt-get install openvpn udevOnce the installation is done, you are ready to begin configuring OpenVPN. To begin, you should copy all the files for encryption from their default directory into the directory they should be in for the cloud server to read them.
sudo cp -r /usr/share/doc/openvpn/examples/easy-rsa /etc/openvpnNow that you've done that, you can begin generating the RSA algorithm files for your VPN. You will be asked to provide various values when you're generating these keys. You can set these to whatever you would like to, but bear in mind that they will be included in the certificates you generate.
cd /etc/openvpn/easy-rsa/2.0/Then generate the RSA files:
sudo ./varsAfter the certificate is generated, you can make the private key for the server. To do this, type the following command, and change 'server' to what you'd like the name of your OpenVPN server to be. This script will also ask you for information.
sudo ./clean-all
sudo ./build-ca
sudo . /etc/openvpn/easy-rsa/2.0/build-key-server serverGenerate the Diffie Hellman key exchange parameters.
sudo . /etc/openvpn/easy-rsa/2.0/build-dhNow generate the keys for each client this installation of OpenVPN will host. You should do this step for each client this installation will host, making sure each client's key identifier is unique.
sudo . /etc/openvpn/easy-rsa/2.0/build-key clientMove the files for the server certificates and keys to the /etc/openvpn directory now. Replace server.crt and server.key with the file names that you used.
sudo cp /etc/openvpn/easy-rsa/2.0/keys/ca.crt /etc/openvpnIf you need to remove someone's access to the VPN, just send the following two commands. Replacing 'client' with the name of the client to be removed.
sudo cp /etc/openvpn/easy-rsa/2.0/keys/ca.key /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/server.crt /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/server.key /etc/openvpn
sudo . /etc/openvpn/easy-rsa/2.0/vars sudo . /etc/openvpn/easy-rsa/2.0/revoke-full client1
sudo gunzip -d /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gzYou should modify the client configuration file to match what you'd like it to do. You can also modify several values in the following file to match what you'd like. In order to do this, you first change the 'remote' option so it can connect to your cloud server's IP address on whichever port you configured your OpenVPN to run on. Then change the 'cert' and 'key' values to reflect the names of your own certificate and key. After these values have been edited you can save the file by typing in Ctrl+X, type 'y', then hit Enter.
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf /etc/openvpn
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf ~/
cd
nano ~/client.confAfter you've done this, you just need to make a few changes to your server configuration file before we finalize. Change the files that the 'cert' and 'key' options point to in the following file to match the certificate and key that your server is using.
sudo nano /etc/openvpn/server.confAfter that's finished, you're ready to go! Just restart OpenVPN and you've got a working OpenVPN installation on Debian 6!
sudo /etc/init.d/openvpn restart
Article ID: 191
Created On: Thu, Dec 26, 2013 at 11:27 PM
Last Updated On: Sun, Jan 5, 2014 at 8:25 PM
Authored by: ASPHostServer Administrator [asphostserver@gmail.com]
Online URL: http://faq.asphosthelpdesk.com/article.php?id=191