When you launch the OpenVPN GUI application, it will automatically connect to any configured server. You can also use the tray icon menu to connect/disconnect from your servers, as well as view the log window and current server status.
If you need more detailed control over your connection, you can open the “Settings” dialog from the File menu. Here you can modify your client settings, add/remove server entries, and configure advanced options such as port forwarding and static key encryption.
OpenVPN allows peers to authenticate each other using pre-shared secret keys, certificates or username/password. When used in a multi-client server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate Authority. It uses the OpenSSL library extensively for many cryptographic operations.
OpenVPN has been ported to multiple platforms, including Linux, FreeBSD, OS X, Android,[10] iOS,[11][12] Windows XP/Vista/7/8,[13][14] Solaris 10,[15] and DD-WRT Routers.[16][17][18] A number of vendors provide hardware support for OpenVPN in commercialgrade routers.[19][20][21][22] Notable users of OpenVPN include Wikipedia,[23]anonimity networks such as Tor,[24]:95 Perfect Privacy[25]:152 Private Internet Access,[26]:153 IPredator,[27]:154 Ozericard.[28]:155 Air VPN[29],among others.[30]-Wikipedia
Worth knowing
This tutorial will assume that you have already set up your FreeNAS server with a basic configuration. If you need help with this, please see our tutorials on setting up a FreeNAS server and adding storage to FreeNAS.
1) On your FreeNAS server, go to Storage > Volumes > Volume Manager and create a new volume for your OpenVPN data. I named my volume “openvpn”.
2) Go to Services > VPN > OpenVPN and click the Enable Server radio button.
3) Enter the following settings:
Minimum TLS Version: 1.0 (This ensures compatibility with some older clients)
Peer Certificate Authority: Select the CA certificate that you generated earlier in this tutorial
Server Certificate: Select the server certificate that you generated earlier in this tutorial
cipher ECDHE-RSA-AES256-GCM-SHA384TLSv1+HIGH:!MD5:!aNULL:!RC4 Supported TLS Ciphers (This gives you better encryption than the default settings)
Export Client Configuration: Enabled (This allows us to generate client configuration files later on)
Worth knowing
First, you’ll need to download the OpenVPN package from your chosen repository. For Ubuntu users, this can be done by running:
sudo apt install openvpn network-manager-openvpn network-manager-openvpn-gnome
Once the installation is complete, restart your computer. You should now see the “Network Manager” icon in your system tray. If not, launch it from the Applications menu.
Click on the “Network Manager” icon and select “Edit Connections” from the drop-down menu. This will bring up the Network Connection Editor window. Click on the “Add” button and select “VPN” from the list of available connection types.
In the resulting dialog box, select “OpenVPN” as the VPN type and click “Create”
Worth knowing
Thank your for reading!