summaryrefslogtreecommitdiff
path: root/etc/uanytun/client2/config
blob: 0a62e0763509d7dbaf4da8ed4074d07f073249d6 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
#############################
## Main options             #
#############################

role client

## Client ID
##  (has to be unique for each client)
mux 2

## device type tun = ip/ipv6, tap = ethernet
type tun

## payload encryption algorithm
#cipher null
#cipher aes-ctr-128
#cipher aes-ctr-192
#cipher aes-ctr-256
cipher aes-ctr

## message authentication algorithm
#auth-algo null
auth-algo sha1

## Passphrase
## this is used to generate the crypto-key and salt
## this should be al least 30 characters
passphrase Creating_VPN_Tunnels_With_Anytun_Is_Easy

## The remote host and port
remote-host example.com
remote-port 4444

#############################
## Debug options            #
#############################

## don't run in background
#nodaemonize

## additional log to standard output with a level of 5
#log stdout:5


#############################
## Expert options           #
#############################

## log to syslog with a level of 3
log syslog:3,uanytun-client2,daemon

## change user and group after init
username uanytun
groupname uanytun

## chroot to users home directory
#chroot /var/run/uanytun

## key derivation pseudo random function
#kd-prf null
#kd-prf aes-ctr
#kd-prf aes-ctr-128
#kd-prf aes-ctr-192
#kd-prf aes-ctr-256

## local ip address to bind to (for tunnel data)
## (if you run an anycast cluster this has to be the anycast ip address)
#interface <ip-address>

## local port to bind to (for tunnel data)
## make sure to use a different port for every server and client!
port 4444

## Device name
#dev uanytun0

## Automaticaly configure the interface
##
## We highly recommend the use of the post up script to do this
##
## the address hast to be supplied in CIDR notation
#ifconfig <local>/<prefix length>

## Manually set encryption key and salt
## (this replaces the passphrase)
#key 2123456789ABCDEF0123456789ABCDEF
#salt 2123456789ABCD0123456789ABCD

## Setting a window size > 0 will enable replay protection
## This most likely will only work with external rekeying
#window-size 0