# Server TCP/443 mode server proto tcp-server port ${port} dev ${dev} client-to-client # Keys and certificates ca /etc/openvpn/${name}/ca.crt cert /etc/openvpn/${name}/server.crt key /etc/openvpn/${name}/server.key dh /etc/openvpn/${name}/dh1024.pem tls-auth /etc/openvpn/${name}/ta.key 1 key-direction 0 cipher AES-256-CBC crl-verify /etc/openvpn/${name}/easy-rsa/keys/crl.pem client-config-dir /etc/openvpn/${name}/clientsconf # Network server ${net} ${mask} keepalive 10 120 # Uncomment this to redirect client internet traffic trough VPN # You'll also need to add iptables rules like: # iptables -t nat -s $internal_subnet/24 -A POSTROUTING -j SNAT --to $out_ip #push "redirect-gateway def1 bypass-dhcp" # Security user www-data group ovpn-manager persist-key persist-tun comp-lzo # Log verb 1 mute 20 status /var/vpn/status-${name} log-append /var/log/openvpn-${name}.log