User`s manual
UC-8410/8416/8418-LX User’s Manual Managing Communication
4-22
3. On machine OpenVPN A, modify the remote address in the configuration file,
/etc/openvpn/tap0-br.conf.
# /etc/openvpn/tap0-br.conf
# point to the peer
remote 192.168.8.174
dev tap0
secret /etc/openvpn/secrouter.key
cipher DES-EDE3-CBC
auth MD5
tun-mtu 1500
tun-mtu-extra 64
ping 40
up /etc/openvpn/tap0-br.sh
Next, modify the routing table in the /etc/openvpn/tap0-br.sh script file.
#----------------------------------Start------------------------------
#!/bin/sh
# /etc/openvpn/tap0-br.sh
# value after “-net” is the subnet behind the remote peer
route add -net 192.168.4.0 netmask 255.255.255.0 dev br0
#---------------------------------- end ------------------------------
On machine OpenVPN B, modify the remote address in the configuration file,
/etc/openvpn/tap0-br.conf.
# /etc/openvpn/tap0-br.conf
# point to the peer
remote 192.168.8.173
dev tap0
secret /etc/openvpn/secrouter.key
cipher DES-EDE3-CBC
auth MD5
tun-mtu 1500
tun-mtu-extra 64
ping 40
up /etc/openvpn/tap0-br.sh
Next, modify the routing table in the /etc/openvpn/tap0-br.sh script file.
#---------------------------------- Start----------------------------
#!/bin/sh
# /etc/openvpn/tap0-br.sh
# value after “-net” is the subnet behind the remote peer
route add -net 192.168.2.0 netmask 255.255.255.0 dev br0
#---------------------------------- end -----------------------------
Note: Select cipher and authentication algorithms by specifying “cipher” and “auth”. To see
with algorithms are available, type:
# openvpn --show-ciphers
# openvpn --show—auths
4. After configuring the remote peer, we can load the bridge into kernel, reconfigure eth1, and
enable IP forwarding on both OpenVPN machine.
# /etc/openvpn/openvpn-bridge start
Next, start both OpenVPN peers,
# openvpn --config /etc/openvpn/tap0-br.conf &