Openvpn; Openvpn Server - Billion BiPAC 8900X R3 User Manual

3g/4g lte vdsl2/adsl2+ vpn firewall router
Table of Contents

Advertisement

OpenVPN

OpenVPN is an open source software application that implements
techniques for creating secure point-to-point or site-to-site connections in routed or bridged
configurations and remote access facilities. It uses a custom security protocol that utilizes
for key exchange. It is capable of traversing network address translation (NAT) and
OpenVPN allows
p eers to
2 4 0 H 2 4 8 H 2 4 8 H 2 4 8 H
u sername/
p assword. When used in a multiclient-server configuration, it allows the server to release
2 4 4 H 2 5 2 H 2 5 2 H 2 5 2 H
2 4 5 H 2 5 3 H 2 5 3 H 2 5 3 H
an
a uthentication certificate for every client, using
2 4 6 H 2 5 4 H 2 5 4 H 2 5 4 H
O penSSL encryption
2 4 9 H 2 5 7 H 2 5 7 H 2 5 7 H
security and control features.
OpenVPN is good at portability. OpenVPN has been ported and embedded to several systems.

OpenVPN Server

Users can set the bassic parameters(source/destination address, protocl/port, authentication,
encyption, etc) for OpenVPN Server.
OpenVPN Server: Select Enable to activate OpenVPN Server.
WAN Interface: Select the exact WAN interface configured as source for the tunnel. Select Default
to use the now-working WAN interface for the tunnel.
Protocol: OpenVPN can run over
(TCP) transports. Select the protocol.
Port Number: Port 1194 is the official assigned port number for OpenVPN
Tunnel Virtual Subnet: Set the tunnel virtual subnet IP for OpenVPN server.
Tunnel Network: Set the tunnel virtual subnet mask.
Cipher Encryption: OpenVPN uses all the ciphers available in the OpenSSL package to encrypt
both the data and channels. Select the encryption method.
a uthenticate each other using a
2 4 1 H 2 4 9 H 2 4 9 H 2 4 9 H
l ibrary extensively, as well as the
2 5 0 H 2 5 8 H 2 5 8 H 2 5 8 H
U ser Datagram Protocol (UDP) or
2 5 3 H 2 6 1 H 2 6 1 H 2 6 1 H
p re-shared secret key,
2 4 2 H 2 5 0 H 2 5 0 H 2 5 0 H
s ignature and
C ertificate authority. It uses the
2 4 7 H 2 5 5 H 2 5 5 H 2 5 5 H
2 4 8 H 2 5 6 H 2 5 6 H 2 5 6 H
S SLv3/TLSv1
2 5 1 H 2 5 9 H 2 5 9 H 2 5 9 H
197
v irtual private network (VPN)
2 3 7 H 2 4 5 H 2 4 5 H 2 4 5 H
f irewalls.
2 3 9 H 2 4 7 H 2 4 7 H 2 4 7 H
c ertificates, or
2 4 3 H 2 5 1 H 2 5 1 H 2 5 1 H
p rotocol, and contains many
2 5 2 H 2 6 0 H 2 6 0 H 2 6 0 H
T ransmission Control Protocol
2 5 4 H 2 6 2 H 2 6 2 H 2 6 2 H
S SL/TLS
2 3 8 H 2 4 6 H 2 4 6 H 2 4 6 H

Advertisement

Table of Contents
loading

Table of Contents