Server sub-tab
    • 14 Apr 2023
    • 1 Minute to read
    • Dark
      Light
    • PDF

    Server sub-tab

    • Dark
      Light
    • PDF

    Article summary

    Nodegrid can be configured as a VPN server. By default, this is disabled. Depending on the configuration, multiple files are required and must be available in the /etc/openvpn/CA folder. 

    Configure SSL VPN Server Details

    1. Go to Network :: VPN drop-down :: VPN :: Server.
    2. On Status drop-down, select one (after configuration as a VPN server, must be enabled).
      • Enabled
      • Disabled (default)
    3. Enter details:
      1. Listen IP address (if defined, server only responds to client requests coming in this interface)
      2. Listen Port number (listening port for incoming connections - default: 1194)
      3. Protocol drop-down, select one (UDP, TCP, UDP IPv6, TCP IPv6)
      4. Tunnel MTU (default: 1500)
      5. Number of Concurrent Tunnels (default: 256)
    4. On Authentication Method menu, enter details (different fields are displayed according to selection).
      1. TLSselection:
        • CA Certificate drop-down, select one
        • Server Certificate drop-down, select one
        • Server Key drop-down, select one
        • Diffie Hellman drop-down, select one
      2. Static Keyselection:
        • Secret drop-down, select one
        • Diffie Hellman drop-down, select one
      3. Passwordselection:
        • CA Certificate drop-down, select one
        • Server Certificate drop-down, select one
        • Server Key drop-down, select one
        • Diffie Hellman drop-down, select one
      4. Password plus TLSselection:
        • CA Certificate drop-down, select one
        • Server Certificate drop-down, select one
        • Server Key drop-down, select one
        • Diffie Hellman drop-down, select one
    5. On IP Address menu (display changes based on selection) this configures IP address settings for the tunnel:
      1. Networkradio button:
        • IPv4 Tunnel (NetAddr/Netmask)
        • IPv6 Tunnel (NetAddr/Netmask)
      2. Point to Pointradio button:
        • Local Endpoint (Local IP)
        • Remote Endpoint (Remote IP)
      3. Point To Point IPv6radio button:
        • Local Endpoint (Local IPv6)
        • Remote Endpoint (Remote IPv6)
    6. Enter details:
      1. HMAC/Message Digest drop-down (select HMAC connection algorithm)
      2. Cipher drop-down (select connection cipher algorithm)
      3. Min TLS version drop-down, select one (None, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3)
      4. Use LZO data compress Algorithm checkbox (all tunnel traffic is compressed)
      5. Redirect Gateway (Force all client generated traffic through the tunnel) checkbox (all traffic from client is forced through the tunnel).
    7. Click Save.

    Edit VPN Server Details

    1. Go to Network :: VPN drop-down :: VPN :: Server.
    2. Make modifications, as needed.
    3. Click Save.



    Was this article helpful?

    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence