User Manual
Table Of Contents
- Access Server
- Table of Contents
- List of Tables
- Chapter 1. Introduction to Access Server
- Chapter 2. Getting Started with Access Server
- Chapter 3. Using the System
- 3.1. Network Interfaces
- 3.2. Bluetooth
- 3.3. Compact Flash Cards
- 3.4. USB Memory Dongles and Compact Flash Memory Cards
- 3.5. Servers
- 3.5.1. Finder
- 3.5.2. ObexSender
- 3.5.3. SMS Gateway Server
- 3.5.4. User Level Watchdog
- 3.5.5. Remote Management
- 3.5.5.1. Overview
- 3.5.5.2. Management Packet Format
- 3.5.5.3. Management Packet Information File Format
- 3.5.5.4. Management Operation Example: Hello World
- 3.5.5.5. Management Operation Example: Software Update
- 3.5.5.6. Management Operation Example: IPQUERY
- 3.5.5.7. Management with USB Memory Dongle or Compact Flash Memory Card
- 3.5.6. FTP
- 3.5.7. Web Server
- 3.5.8. SNMP
- 3.5.9. OpenVPN
- 3.5.10. SSH
- 3.5.11. Telnet
- 3.5.12. NTP
- 3.6. Utilities
- 3.7. Real Time Clock
- 3.8. Time Zone
- 3.9. System ReInstall and Upgrade
- Chapter 4. SPPoverIP
- Chapter 5. Obexsender
- Chapter 6. Software Development Kit
- 6.1. Introduction to SDK
- 6.2. Installing SDK
- 6.3. Creating Applications
- Chapter 7. iWRAP Bluetooth Interface
- 7.1. Terms
- 7.2. Starting the iWRAP Servers
- 7.3. Writing iWRAP Applications
- 7.4. Commands Controlling iWRAP
- INFO
- QUIT
- SET
- SAVE
- LOAD
- PING
- PONG
- ECHO
- LOCK
- UNLOCK
- SHUTDOWN
- SLEEP
- 7.5. Finding Bluetooth Devices
- INQUIRY
- NAME
- 7.6. Making a Bluetooth Connection
- CALL
- CONNECT
- NO CARRIER
- RING
- RINGING
- CLOSE
- LIST
- STATUS
- 7.7. Service Discovery
- SDPSEARCH
- SDPATTR
- SDPQUERY
- SDP bdaddr
- SDP ADD
- SDP DEL
- SDP LIST
- 7.8. Example Sessions
- 7.9. Error Codes
- Chapter 8. I/O API
- Chapter 9. Advanced Use Cases for Access Server
- Chapter 10. Certification Information and WEEE Compliance
- Appendix A. Directory Structure
- Appendix B. Setup Options
- Appendix C. Open Source Software Licenses
- Appendix D. Supported Hardware
Chapter 9. Advanced Use Cases for Access Server
build-dh
The output is as follows:
ai:easy-rsa # ./build-dh
Generating DH parameters, 1024 bit long safe prime, generator 2
This is going to take a long time
.................+...........................................
...................+.............+.................+.........
......................................
Now you can find the generated keys and certificates in the keys subdirectory. The final step in
the key generation process is to copy all files to the machines which need them, taking care to
copy secret files (server.key and client.key) over a secure channel.
9.4.4. Creating Configuration Files
Both the server and client devices must have certain configuration files for OpenVPN to deter-
mine, for example, which IP addresses to use. In this chapter, we will create a basic configuration
file for OpenVPN server and client. We’ll make the PC as server and Access Server as the client.
An example configuration files can be found here: http://openvpn.net/howto.html#examples.
In our example, we use most of the setting described in these files.
Note: The configuration files can be named, for example, server.conf and client.conf in a Linux
system. On Windows they would be named server.ovpn and client.ovpn, where the file extension
is different.
9.4.4.1. Server Configuration File
There are lots of configuration options that can be used with OpenVPN, but this guide only
covers the basic approach to set up a working VPN with minimal effort. The lines needed in the
server configuration file are listed below. After each line, an explanation follows, see
Figure 9-2:
port 1194
• Determines the TCP or UDP port that OpenVPN should listen to. For multiple OpenVPN
instances on the same machine, you’ll need to use a different port for each one. Make sure
your firewall allows traffic through these ports.
proto udp
• Determines whether to use TCP or UDP. We have chosen UDP in our application.
dev tun
123