- Viscosity 1 5 4 – Graphical User Interface For Openvpn Download
- Viscosity 1 5 4 – Graphical User Interface For Openvpn Configuration
- Viscosity 1 5 4 – Graphical User Interface For Openvpn Ubuntu
- Viscosity 1 5 4 – Graphical User Interface For Openvpn Server
Introduction To VPNs
Viscosity 1.7 MAC OS X Graphical user interface for OpenVPN. Size: 11.39 MB Viscosity is an OpenVPN client for Mac, providing a rich Cocoa user interface for creating, editing, and controlling VPN connections. Viscosity provides a complete OpenVPN solution for Download Now. Viscosity has a clear and intuitive interface for controlling VPN connections, allowing users new to VPNs and Viscosity to easily use OpenVPN on both macOS and Windows. Viscosity's Details window provides a simple interface for obtaining connection statistics and diagnostic information to pass on to support staff. Get Viscosity Mac Setup Instructions for VyprVPN; Viscosity is an OpenVPN client for Mac, featuring a rich Cocoa graphical user interface for creating, editing, and controlling VPN connections. Use Viscosity to easily manage your VyprVPN connections.
This guide is designed to act as an introduction to those new to VPNs. If you haven't used a VPN connection before and wonder what they are, or unfamiliar with what a VPN lets you do, then this guide is for you.
If you're already familiar with VPN connections, we recommend instead visiting the Viscosity page, which provides more information on the features Viscosity offers.
A VPN (Virtual Private Network) provides a secure way of connecting through a public network (such as the Internet) to a remote network/location. This remote network is typically a private network, such as a workplace or home network, or one provided by a commercial VPN service.
A VPN can be thought to create a 'tunnel' through the public network to your private network at the other end. All network traffic through this tunnel is encrypted to ensure it is kept secure and private.
What Does A VPN Let Me Do?
A VPN allows you to do a number of things you wouldn't otherwise be able to do connected to a standard network. This includes:
- Network Security & Privacy: All network traffic through your VPN connection is kept secure. This allows you to use public networks (such as at hotels, conferences, coffee shops, etc.) and wireless networks knowing your network traffic is kept safe and secure. Otherwise it is relatively easy for other people to view your network traffic, such as see what you are viewing, steal your information and login details, etc.
- Access Your Workplace Remotely: You can connect to your workplace's VPN and have access as if you were physically in the office. You can then do things like access file servers, computers, databases, email, internal webpages, and other services you might not have access to outside of your work network.
Viscosity 1 5 4 – Graphical User Interface For Openvpn Download
This package will allow us to import the config file(s) via the graphical user interface (GUI) very easily. Installation of the package can be achieved by providing the following command: sudo apt-get install -y openvpn network-manager-openvpn network-manager-openvpn-gnome. Hit the Enter key and continue to the next step. The OpenVPN Connect Client is able to remember multiple different servers, but only one can be active at a time. To obtain the OpenVPN Connect Client, log on to your Access Server’s web interface (not the /admin portion) and log on with valid credentials. The OpenVPN Connect Client will be offered for download automatically.
- Access Your Home Network: Connecting back home using a VPN allows you to access your computers remotely. Access files on your computer, view iTunes shares, take remote control of your computer, and access other services.
- Access Location Restricted Content: By connecting to a VPN server in another location you can make it appear to websites using geolocation that you are physically in the correct location for access. So when you're travelling overseas you can still view websites you would normally use at home, such as television, movie and music streaming websites.
- Bypass Restrictive Networks: Some networks may restrict access to the web services that can be accessed, meaning that many applications like VOIP, instant messaging, video chat, and games will not work. However using a VPN you can tunnel through such restrictions and allow all of your network applications to work. Viscosity even allows you to tunnel through a HTTP or SOCKS proxies to establish your VPN connection.
- Escape Censorship: VPNs allow you to bypass restrictive censorship and access websites and services that would otherwise be blocked. Some countries impose censorship on Internet access while in that country, and a VPN provides a way to still maintain access to the services you would normally use.
Why Should I Use A VPN?
Even if you have no desire to be able to access a private network remotely, a VPN is vital to ensure the security and privacy of your network traffic.
Public networks, and in particular public wireless networks, provide an easy way for hackers and malicious users to listen in ('sniff') on your network usage. This may allow them to see what web pages you are viewing, steal username and passwords, steal session information to be able to log into sites as you, and extract other private data. In addition, skilled hackers may perform a 'man in the middle' attack. This allows them to not only monitor in depth your network traffic, but also alter your traffic or inject their own in an attempt to fool a user into revealing important data.
Using a VPN protects you from such attacks, as your network traffic is authenticated and encrypted, making it secure and private.
How Does A VPN Work?
A typical VPN consists of two components: the VPN client and the VPN server.
A VPN client is the software that allows a user to connect their computer to the VPN server and establish the VPN connection. It is installed on the user's computer and communicates with the VPN server to create a secure link for the user's network traffic. The VPN Client is what the end user uses to control their VPN connection. Viscosity performs the duties of a VPN client.
A VPN server is setup at the location users want to connect to, such as at a workplace or at home. A VPN Server usually configured and maintained by IT staff, however home users often set up their own VPN personal VPN server at home or at a remote location as well. End users rarely have to interact with the VPN Server. A VPN server will also perform authentication to ensure only registered users can connect to the VPN.
All network traffic through the tunnel created between the VPN client and the VPN server is encrypted to keep it private and secure.
Viscosity is a VPN client for macOS and Windows. As discussed above, it allows a user to connect to a VPN server and establish a VPN connection. Viscosity provides a clear and intuitive user interface for creating, editing, and controlling VPN connections, and makes it easy for users new to VPN to get started.
Viscosity supports the OpenVPN protocol (see below). Viscosity can connect to any VPN server supporting OpenVPN, including almost all popular free and commercial VPN providers. Viscosity allows connections to be completely configured through a GUI, without any need to know how to use the command-line or OpenVPN's configuration file syntax. Advanced users still have full manual control over configuration options if desired.
With Viscosity and OpenVPN you can securely connect to your home or company network from a remote location, protect your network traffic when using public or wireless networks, access websites with country restrictions, and tunnel through restrictive firewalls and proxy servers to give your computer full Internet access.
Why Should I Use Viscosity?
Viscosity is no ordinary VPN client. It has been designed to be simple and intuitive for new users, however customizable and powerful for VPN experts. We encourage you to visit Viscosity's Features page for a full overview. However, some notable features for new users include:
- Viscosity allows connections to be fully created and edited through a graphical user interface, without any need to manually edit configuration files or use the command line.
- Viscosity can easily import connection configuration files supplied by your VPN provider, giving you a ready-to-use VPN connection in a snap.
- Viscosity has been designed to keep you secure in almost any network environment. It will automatically adjust to varying network conditions to keep your VPN connection active, warn you about changes, and automatically reconnect when network dropouts occur.
- Viscosity makes it simple to monitor your VPN connection and network. Its global menu gives quick access to connections, and its attractive Details window allows you view traffic graphs and view other connection information.
- Viscosity is cross-platform, meaning you can run it on any computer running macOS or Windows.
![Viscosity 1 5 4 – Graphical User Interface For Openvpn Viscosity 1 5 4 – Graphical User Interface For Openvpn](https://i1.wp.com/www.macbed.com/wp-content/uploads/2017/02/50716.png?resize=256%2C256&ssl=1)
What Is OpenVPN?
OpenVPN is a popular VPN protocol that is based on SSL/TLS encryption. Like IPSec and L2TP, OpenVPN handles the connection between the VPN client and server. OpenVPN is a popular VPN protocol thanks to its high level of security, customizability, and compatibility with most network environments.
Viscosity supports the OpenVPN protocol. Viscosity can connect to any VPN server that supports OpenVPN connections.
Viscosity makes it easy to get started using a VPN. However as we looked at previously, Viscosity is only one end of the VPN connection. A VPN consists of two components: the VPN client and the VPN server. To get started you will first need to determine who your 'VPN Provider' is. Your VPN Provider is the company or person who provides the VPN server for you to connect you. You may already know who your VPN Provider is, you may want to be your own VPN Provider, you may want to subscribe with a professional VPN Service Provider, or you may still be unsure who your VPN Provider should be.
Your VPN Provider
Your VPN Provider is the company or person that is responsible for providing you with a VPN server for Viscosity to connect to. You may already have a VPN Provider that you want to connect to, you may be looking at setting up your own VPN server and becoming your own provider, or you may be looking at using Viscosity with a commercial VPN Service Provider.
It is important to identify who your VPN provider is and obtain the details you need to setup your connection. Your VPN provider may provide you with the settings and files you need to manually enter into Viscosity, or a configuration file Viscosity can automatically import. Typically your VPN provider falls into one of the following categories:
- Workplace VPN Provider: Your workplace may provide a VPN server so you can remotely and securely access the work network and Internet. In most cases the person to contact for more information or connection details would be your IT/System Administrator.
Viscosity 1 5 4 – Graphical User Interface For Openvpn Configuration
- VPN Service Provider: Many third party companies specialize in offering both free and paid VPN services to users. There are a number of reasons why you may want to subscribe to a VPN Service, including protecting your privacy and security while on public networks, accessing location restricted websites, and accessing blocked content due to restrictive censorship. Most VPN Service providers provide a webpage or support site where you can obtain connection details.
- Personal VPN Provider: If you are familiar with VPNs you may have setup your own VPN server so you can access your home network, and/or to have the same benefits as using a VPN Service Provider.
We discuss these VPN Provider categories in greater detail in the following sections.
Connecting to Your Workplace
Most workplaces offer a VPN server so you can securely connect back to the office, allowing you to work securely while on the road or from home. If this VPN server supports the OpenVPN protocol you will be able to use Viscosity as your VPN client. Many workplaces provide customized versions of Viscosity that are bundled with all of your settings and VPN connections.
To determine whether you are able to connect to your workplace using Viscosity, along with the information and/or files you need to setup Viscosity, you will need to get in touch with your workplace IT staff or VPN administrator.
VPN Service Providers
There are many companies that specialize in providing a commercial VPN service. These companies are known as 'VPN Service Providers'. VPN Service Providers often have servers in multiple countries, allowing you to not only get the security and privacy benefits on a VPN, but also making it easy to access websites that restrict access to certain counties. Most VPN Service Providers charge a small monthly or yearly fee for access to their servers, however there are also a number of free service providers.
If you are looking for a VPN Service Provider please see our list of VPN Service Providers that provide setup documentation and support for Viscosity. Viscosity will be able to connect to any VPN Service Provider that supports the OpenVPN protocol (which is almost all of them).
Setting Up Your Own VPN Server
If you setup a VPN server at home you'll be able to establish a VPN connection back to your home network and access your resources while on the road. This is particularly handy for accessing home file and media servers, viewing security cameras, controlling home devices, or as simple way to act as your own VPN Service Provider. Many consumer routers and file/media servers have inbuilt support for acting as an OpenVPN server, making getting started easier than ever (please see the guides linked below).
You can also setup an OpenVPN server on a Virtual Private Server (VPS) or dedicated server in a data center. Popular VPS providers include Amazon EC2, Digital Ocean, Linode, OVH and Vultr. This approach lets you act as your own VPN Service Provider, but with a server completely under your control. By running your own VPN server in a datacenter (as opposed to at home), you're also not limited by the VPN server's Internet connection when it comes to the maximum possible download and upload speeds.
We have put together a detailed Introduction to Running an OpenVPN Server guide, that covers everything from the basics to actually getting started. We recommend that as a starting point for anyone considering running their own OpenVPN server.
We have also written a large number of guides that cover the process of setting up your own OpenVPN server. These guides cover popular home routers and media servers (such as Netgear and Synology devices), enterprise grade firewalls (such as Sophos UTM, Ubiquiti EdgeRouter, and pfSense devices), and popular operating systems (such as Ubuntu and Red Hat). Please view the full list of guides by visiting the VPN Server Setup Guides section.
Once you have a VPN server you want to connect to you are ready to begin using Viscosity.
Viscosity enables this to be as simple as possible making it easy to import connections or create them from scratch. Please see the Getting Started Guide (for Mac) or the Getting Started Guide (for Windows) for a detailed setup guide and overview of Viscosity's features.
Many workplaces and VPN Service Providers who support Viscosity provide custom versions of Viscosity that are already bundled with everything you need to connect to your VPN. If you have been supplied with a copy of Viscosity by your workplace it may be ready to go as soon as you install it.
The purpose of this document is to lead the users to configure theirs OpenVPN clients to access to a VPN server. We will see how to install and configure the most used OpenVPN’s GUI for Microsoft Windows, Linux, Mac OS X and Windows Mobile for Pocket PC. At the end of the document we will learn to use the OpenVPN’s command line interface. This last possibility is useful, because the openvpn command, which you can execute by using the prompt (Unix Shell or Windows Prompt) accepts the same parameters and has the same behavior regardless from which Operating System you use. In addition, you could use the openvpn command in a script to automatically start the VPN connection.
More precisely, we will see how to access to a VPN server builded with ZeroShell and configured with the default parameters. To obtain an OpenVPN server with the default behavior, you only need, after you have activated Zeroshell on your network, to enable the OpenVPN service by clicking on the Enabled flag in the [VPN]->[OpenVPN] section of the Zeroshell’s web interface. By default, the OpenVPN server of Zeroshell listens on the port 1194/TCP with TLS/SSL encryption and LZO compression enabled. The user authentication well be checked by using username and password credentials, but we will try the X.509 authentication as well.
For further details about the configuration of an OpenVPN server builded with ZeroShell, you can read the “An OpenVPN server using Zeroshell” how-to.
More precisely, we will see how to access to a VPN server builded with ZeroShell and configured with the default parameters. To obtain an OpenVPN server with the default behavior, you only need, after you have activated Zeroshell on your network, to enable the OpenVPN service by clicking on the Enabled flag in the [VPN]->[OpenVPN] section of the Zeroshell’s web interface. By default, the OpenVPN server of Zeroshell listens on the port 1194/TCP with TLS/SSL encryption and LZO compression enabled. The user authentication well be checked by using username and password credentials, but we will try the X.509 authentication as well.
For further details about the configuration of an OpenVPN server builded with ZeroShell, you can read the “An OpenVPN server using Zeroshell” how-to.
The sections in which this how-to is divided are as follows below. Keep in mind that the first section, which is related to the configuration file of OpenVPN, it is common to the other ones, because the configuration file do not depend on the GUI or Operating System that you use.
The configuration file of OpenVPN
Because the large number of parameters you can define either in the configuration file or in the command line, you could configure OpenVPN in many different manners. In any case, to obtain a connection with a Zeroshell VPN server, you only need to define a small number of them in your client’s configuration file. In order to further simplify the configuration of the OpenVPN client, you could download an example of configuration file by clicking on the link OpenVPN Client configuration.The file has comments that explain the meaning of the parameters, but only 2 of them you surely need to change to obtain a VPN connection with Zeroshell:
- remote zeroshell.example.com 1194You have to replace zeroshell.example.com with the hostname or the IP address of the OpenVPN server. The Zeroshell’s default configuration requires that the OpenVPN service listens on the port 1194/TCP and therefore you must not modify the second parameter (1194).
- ca CA.pemThe ca parameter specify a file (in PEM format), that contains the X.509 Certification Authority with which the server certificate has been signed. To get the CA’s X.509 certificate, you only need to click on the CA hyperlink in the Zeroshell’s login page. If you save the CA’s certificate with the name CA.pem in the same directory of the configuration file, the you do not need to change the parameter. Otherwise, you must specify the absolute path of the file.
Keep in mind that certificate of the Certification Authority is required also if you do not use the X.509 client authentication but the “Only Password” authentication (Default in Zeroshell).
Notice, that you will always have to manually edit the configuration file. This is because the Graphical User Interfaces that we are going to learn do not assist you in the creation and maintenance of the OpenVPN’s configuration. They only help you to connect and disconnect the VPN, and ask for the username and password if they are required.
OpenVPN GUI for Windows
To install OpenVPN GUI for Windows on a Microsoft Windows XP 32/64 bits, follow the steps below: Icalamus 2 15 download free.
- Download the installer from the URL https://openvpn.net/index.php/open-source/downloads.html. Choose he file that contains the GUI and the OpenVPN software already included;
- Start with the installation. Select the default options and confirm the installation of the TAP-Win32 Adapter V8 device (it is a Virtual Ethernet interface used by OpenVPN).
When the Installer has finished to work, the TrayBar contains the VPN icon with two red terminals and the Earth Globe symbol. Such terminals are yellow when OpenVPN is trying to establish the connection and they are green when you are finally connected with the VPN; - In the Windows Start Menu, click on [Start]->[All Programs]->[OpenVPN]->[OpenVPN configuration file directory]. You will be able to explore the folder:
C:Program FilesOpenVPNconfig
in which you must copy the files zeroshell.ovpn that contains the OpenVPN configuration and CA.pem that is the X.509 Certification Authority certificate. You can look at the previous section for details on how to obtain these files;
By right-clicking on the OpenVPN icon in the Traybar appears a contextual menu with several useful options: Connect, Disconnect, Show Status, View Log, Edit Config, Proxy Settings. Particularly useful to solve connection problems is the item View Log that allows to know the reason of the failures.
If instead the VPN is connected (the two terminals are green), but you are not able to reach the remote LAN or Internet using the Virtual Private Network, then you should use the ipconfig /all command from the Windows Prompt. Here there is an example of the lines of output about the virtual Ethernet interface:
To be sure that the IP traffic is actually routed across the VPN and hence encrypted, you must check that the IP Address and the Default Gateway assigned to the TAP Virtual Interface belong to the remote LAN you are connected. To better check this condition, you could also use the tracert /d <Remote IP Address> command: if the first hop that is printed belongs to a subnet of the remote LAN then your VPN works fine and the traffic that reaches the remote site is encrypted across Internet.
Tunnelblick for Mac OS X
A Graphical User Interface for OpenVPN on Mac OS X is a package called Tunnelblick. To install this GUI, follow the steps below:
- Download the package from the site https://tunnelblick.net. It is a disk image file which contains the GUI, the OpenVPN software, and some documentation;
- Double-click on the .dmg file;
- A Finder window appears on the desktop. The window contains Tunnelblick.app. Double-click it;
- A dialog box will ask you to confirm that you wish to install Tunnelblick.app to Applications. Click the Install button;
- A dialog box will ask if you wish to launch Tunnelblick. Click the Launch button;
- A dialog box will ask for an administrator username/password to secure Tunnelblick. Type administrator credentials and click the OK button;
- A dialog box will appear welcoming you to Tunnelblick. Click the Create and open configuration folder button;
- A Finder window will open with the configuration folder. The window will contain only an alias to Tunnelblick.app. Drag the files zeroshell.ovpn and CA.pem to the window. If you don’t know how to obtain these two files, please read the section The configuration file of OpenVPN
- Double-click on the Launch Tunnelblick alias;
- A dialog box will appear asking if you wish to check for updates to Tunnelblick automatically. Click Check Automatically or Don’t Check, as you prefer;
- Tunnelblick is now installed. Its icon appears near the clock. Click on the Tunnelblick icon, then select the [Details…] item;
- Click on the Edit Configuration button in the dialog box which appears. Replace zeroshell.example.com with the hostname or the IP address of the VPN server. Save the configuration file and quit;
- Start the VPN connection by clicking on the Tunnelblick icon near the clock and selecting the Connect ‘Zeroshell’ item;
- A dialog box will appear asking for an administrator username/password to secure the configuration file. Type administrator credentials and click OK;
- A dialog box will appear asking for the VPN username and password. Type the VPN username and password and click “OK” (look at the Note *). You may save them in the Keychain by putting a check in the check box.
In the case in which there are connection problems, select the item [Details…] to check the OpenVPN’s log messages.
If you want to verify that the IP address that the VPN server has assigned to you, actually belongs to the remote LAN with which you are connected, you have to open a Mac OS X Terminal and at the prompt of the shell type the command:
If you want to verify that the IP address that the VPN server has assigned to you, actually belongs to the remote LAN with which you are connected, you have to open a Mac OS X Terminal and at the prompt of the shell type the command:
ifconfig tap0
the result looks like this:
The line that starts with inet show you that the VPN IP address assigned to you is 192.168.250.1 (by default Zeroshell issues IP addresses which belong to the subnet 192.168.250.0/24 with 192.168.250.254 as Default Gateway). To be sure that the IP traffic is actually routed across the VPN and hence encrypted, you must check that the IP Address and the Default Gateway assigned to the TAP Virtual Interface belong to the remote LAN you are connected. To better check this condition, you could also use the traceroute -n <Remote IP Address> command: if the first hop that is printed belongs to a subnet of the remote LAN (192.168.250.254 by default) then your VPN works fine and the traffic that reaches the remote site is encrypted across Internet.
KVpnc for Linux
KVpnc is a Linux frontend that is able to manage many type of VPN clients such as: Cisco VPN, IPSec, PPTP, OpenVPN, L2TP. It has also the SmartCard support. Obviously, in this document we will see only the installation and configuration of KVpnc related to OpenVPN. Binary packages of KVpnc exist for many Linux distributions such as the RPM for Suse and Fedora. For Ubuntu and Kubuntu (and other Debian derived distributions), you can easily install KVpnc with OpenVPN by using the commands:
sudo apt-get install openvpn
sudo apt-get install kvpnc
sudo apt-get install kvpnc
Notice that, unlike the other GUIs, the packages of KVpnc do not include OpenVPN, but you must install it alone. In order to make this document regardless of the Linux Distribution used, we will build and install KVpnc by compiling the source code, but if a binary package exists for your Linux distribution, you should prefer to use it without waste your time in the building process.
Because KVpnc uses the QT libraries, their presence and their include files are required in the build process. In the next steps, we will assume that the OpenVPN package is already installed. If you are not in this situation, you should read the section Build and install OpenVPN to learn to install OpenVPN.
Now we are ready to install and configure KVpnc by following the steps given bellow:
Because KVpnc uses the QT libraries, their presence and their include files are required in the build process. In the next steps, we will assume that the OpenVPN package is already installed. If you are not in this situation, you should read the section Build and install OpenVPN to learn to install OpenVPN.
Now we are ready to install and configure KVpnc by following the steps given bellow:
- Download the KVpnc’s source code package from the web page https://userbase.kde.org/KVpnc. We’ll use the release 0.8.9 of KVpnc, but you should get the latest one;
- Extract the source code by using the command:
tar xvfj kvpnc-0.8.9.tar.bz2 - Build and install KVpnc by following this steps:
cd kvpnc-0.8.9
./configure
make
sudo make installFor some Linux distributions, the ./configure command could be unable to locate the QT libraries. In this case, you must find out where the include files and the libraries are located and specify the paths by adding the parameters –with-qt-includes=/usr/lib64/qt-3.3/include/ –with-qt-libraries=/usr/lib64/qt-3.3/lib/ to the ./configure. Of course, you should replace the path /usr/lib64/qt-3.3/ with the one in which the QT libraries are located in your Linux system; - Make the directory /etc/openvpn/ with the command sudo mkdir /etc/openvpn and copy in the new directory the files zeroshell.ovpn and CA.pem. How to obtain such files is described in the section The configuration file of OpenVPN;
- To use KVpnc with unprivileged users the sudo command is required and the line
ALL ALL=NOPASSWD:/usr/bin/kvpncmust be added at the end of the file /etc/sudoers (notice that you need to have administrator privileges to change this file). After that, you are able to launch the kvpnc process by using the command:
sudo /usr/bin/kvpnc
In this manner, the kvpnc will have the root‘s privileges needed to create the tap0 Virtual Ethernet Interface and add the static routes in the Kernel routing table;
- Import the profile that allow you to create a VPN with Zeroshell by using the following command:kvpnc –openvpnimport=/etc/openvpn/zeroshell.ovpnBy using the Profile Manager that appears, make the following configuration changes:
- From the General options, insert in the VPN gateway field the IP address or the hostname of the VPN server;
- From the OpenVPN options, check that the Authentication method is the SHA1 hash function and not MD5 one;
Press [Apply] and then [Ok] on the Profile Manager. After that, save the Zeroshell profile using the [Profile]->[Save Profile…] menu item and close kvpnc interface with [File]->[Quit] menu item; - Start the KVpnc GUI with the command sudo /usr/bin/kvpnc and click the [Connect] button to establish the VPN connection. At this point, you are requested for the username and the password to use to authenticate your identity against the VPN server (look at the Note *).
If you want to verify that the IP address that the VPN server has assigned to you, actually belongs to the remote LAN with which you are connected, you have to open a terminal and at the prompt of the shell type the command:
ifconfig tap0
the result looks like this:
The line that starts with inet show you that the VPN IP address assigned to you is 192.168.250.50 (by default Zeroshell issues IP addresses which belong to the subnet 192.168.250.0/24 with 192.168.250.254 as Default Gateway). To be sure that the IP traffic is actually routed across the VPN and hence encrypted, you must check that the IP Address and the Default Gateway assigned to the TAP Virtual Interface belong to the remote LAN you are connected. To better check this condition, you could also use the traceroute -n <Remote IP Address> command: if the first hop that is printed belongs to a subnet of the remote LAN (192.168.250.254 by default) then your VPN works fine and the traffic that reaches the remote site is encrypted across Internet.
OpenVPN for Windows Mobile on Pocket PC
OpenVPN for Pocket PC is still an Alpha release, but it worked fine during the test on Microsoft Windows Mobile v5.0 installed on a PDA i-Mate JASJAR (equivalent to a HTC Universal Qtek 9000). Before seeing how to install and configure this software, notice that you will have to manually modify the OpenVPN configuration file and therefore you should use Microsoft ActiveSync for editing from your Personal Computer. Another solution could be to install on your PPC the Total Commander CE that is a Freeware File Manager for Pocket PC, available at the URL http://www.ghisler.com/pocketpc.htm. This filemanager includes an Editor which allows you to edit the OpenVPN configuration file directly from your Palm Device.
Now, follow the steps below to install OpenVPN for Windows Mobile on your Pocket PC:
Now, follow the steps below to install OpenVPN for Windows Mobile on your Pocket PC:
- Download the OpenVPN for Pocket PC from the site http://ovpnppc.ziggurat29.com/ovpnppc-main.htm. There are two type of file: the .exe format that you can install from your Personal Computer connected to the PPC with ActiveSync; the .cab format that you can directly install on your Pocket PC. Pick the package in the format that you prefer and install it.
- Supposing that you have installed OpenVPN for Pocket PC in the directory Program FilesOpenVPN of the device’s memory, copy the files zeroshell.ovpn and CA.pem in the folder Program FilesOpenVPNconfig. To know how to obtain these two files, read the section The configuration file of OpenVPN;
- Edit the configuration file Program FilesOpenVPNconfigzeroshell.ovpn to connect to your OpenVPN server:
- Replace zeroshell.example.com with the IP address or the hostname of the OpenVPN server;
- Replace CA.pem with the path of the file that contains the Certification Authority. In your case the path is:ca “Program FilesOpenVPNconfigCA.pem”Notice the double quotes and the double backslashes that are requested by the syntax of this parameter;
- Click on the icon of OpenVPN and from the submenu [Start from Config.] select zeroshell. At this point you are requested for the Username and Password (look at the Note *). If the client is authenticated against the server, the VPN connection is established.
Transfer files from macbook pro to imac. If you have connection problems, check the log file Program FilesOpenVPNlogzeroshell.log. Finally, to verify that the traffic is actually routed and encrypted in the VPN you need to perform a traceroute operation at a remote host: if the first hop that is reported belongs to the remote LAN (by default the VPN box has the IP 192.168.250.254), you are sure that the VPN works as you expect. Windows Mobile has not a traceroute utility and therefore you need to install one. A free software to make network debugging is ceNetTools with which you are able to make the traceroute, the ping and whois operations.
The command line of OpenVPN
If the system you are using has not a Graphical User Interface for OpenVPN, you have to use the OpenVPN’s command line. This can also be used in the case in which you want to automatically start the VPN by using the startup scripts. By typing the command man openvpn from a Unix shell, the OpenVPN’s manual page will be displayed. A great number of parameters are available to directly use in the command line prefixed by two consecutive hyphens (–). The same parameters (not prefixed by –) can also be specified in the configuration file. Except for a few cases, it is better to specify the parameters in a configuration file rather than having them in a too long and heavy to read command line.
This section does not examine the parameters because they are already listed and described in the manual page of OpenVPN, but it only describe how to establish a VPN with a Zeroshell OpenVPN server by using the command line:
This section does not examine the parameters because they are already listed and described in the manual page of OpenVPN, but it only describe how to establish a VPN with a Zeroshell OpenVPN server by using the command line:
- Put the files zeroshell.ovpn and CA.pem in a same directory (suppose /etc/openvpn/). For details about how to obtain these files, read the section The configuration file of OpenVPN;
- Edit the configuration file zeroshell.ovpn replacing zeroshell.example.com with the IP address or hostname of the VPN server;
- Change the current directory to /etc/openvpn/ and exec (with root privileges) the command:openvpn –config zeroshell.ovpnAt this point, you are requested for the Username and the Password (look at the Note *). If the client is authenticated against the server, the VPN connection is established.
Build and install OpenVPN
Viscosity 1 5 4 – Graphical User Interface For Openvpn Ubuntu
For the most operating system in which OpenVPN works, binary packages already compiled exist. Omnigraffle pro 6 2 download free. Anyway, sometimes, above all for some Linux Distributions, you could need to build OpenVPN by starting with the source code. Below, it is described how to build OpenVPN:
- Download the OpenVPN’s source code from the site http://openvpn.net. Pick the latest stable release that is available (suppose the release 2.0.9 in the rest of this document);
- Extract the files which are stored in the zipped archive that you have downloaded by using the tar command in the following manner:
tar xvfz openvpn-2.0.9.tar.gz - Change the current directory to openvpn-2.0.9 with the command:
cd openvpn-2.0.9 - Check the system and produce the Makefiles by using the following command:
./configure –prefix=/usrIf the ./configure procedure claims that the lzo libraries and headers are not found in the system, install the lzo compression software as follows below:
- Download the source package of LZO from the site http://www.oberhumer.com/ and extract its content with the command:
tar xvfz lzo-2.02.tar.gz - Change the current directory to lzo-2.02 and install the LZO software with the commands:
- ./configure
- make
- make install (This command needs to be executed with root privileges to write in /usr)
Once installed the lzo libraries and headers, came back to the directory openvpn-2.0.9 and launch again the command
./configure –prefix=/usr - Compile the source code with the Makefiles you have just created by using the command:
make - Install the binary program openvpn and its manual pages with the command:
make installBecause the files will be written below the system directory /usr, the last command must be executed with root privileges.
Notes
Viscosity 1 5 4 – Graphical User Interface For Openvpn Server
(*) The manner in which the users are authenticated depend on the OpenVPN server configuration. Zeroshell supports a multi-domain authentication system in which you have to configure the authentication source which can be a Kerberos 5 KDC (local, external and trusted) or an external RADIUS server. One of these authentication domains is set to be the default domain. The users of the default domain do not need to specify the username in the form of username@domain (ex. [email protected]). Notice that the domain name is not case sensitive, because if the domain is configured to be a Kerberos V realm, it is automatically converted to uppercase.