Hi,
I seem to be having some trouble getting my phone to connect to the VPN server so it can connect to our office PBX.
The phone has firmware version 6.73.0.50
The vpn.cnf file contains
------------
client
dev tap
proto udp
remote <remoteip> 1194 udp
resole-retry infinite
nobind
persist-key
persist-tun
ca /config/openvpn/keys/ca.crt
cert /config/openvpn/keys/client.crt
key /config/openvpn/keys/client.key
ns-cert-type server
comp-lzo adaptive
pull
dhcp-option DNS 192.168.6.1
dhcp-option DOMAIN lan
-----------
The server configuration is as follows:
-----------
dh /tmp/openvpn/dh.pem
ca /tmp/openvpn/ca.crt
cert /tmp/openvpn/cert.pem
key /tmp/openvpn/key.pem
keepalive 10 120
verb 3
mute 3
syslog
writepid /var/run/openvpnd.pid
management 127.0.0.1 14
management-log-cache 100
topology subnet
script-security 2
port 1194
proto udp
cipher bf-cbc
auth sha1
client-connect /tmp/openvpn/clcon.sh
client-disconnect /tmp/openvpn/cldiscon.sh
client-config-dir /tmp/openvpn/ccd
comp-lzo adaptive
tls-server
ifconfig-pool-persist /tmp/openvpn/ip-pool 86400
client-to-client
fast-io
tun-mtu 1400
mtu-disc yes
server-bridge 192.168.6.1 255.255.255.0 192.168.6.50 192.168.6.69
dev tap2
-------------
The dh for generating all keys/certs is 2048 instead of 1024, is this a problem?
Could the problem be that the server is using the SHA1 hash algorithm or the blowfish cipher?
I seem to be having some trouble getting my phone to connect to the VPN server so it can connect to our office PBX.
The phone has firmware version 6.73.0.50
The vpn.cnf file contains
------------
client
dev tap
proto udp
remote <remoteip> 1194 udp
resole-retry infinite
nobind
persist-key
persist-tun
ca /config/openvpn/keys/ca.crt
cert /config/openvpn/keys/client.crt
key /config/openvpn/keys/client.key
ns-cert-type server
comp-lzo adaptive
pull
dhcp-option DNS 192.168.6.1
dhcp-option DOMAIN lan
-----------
The server configuration is as follows:
-----------
dh /tmp/openvpn/dh.pem
ca /tmp/openvpn/ca.crt
cert /tmp/openvpn/cert.pem
key /tmp/openvpn/key.pem
keepalive 10 120
verb 3
mute 3
syslog
writepid /var/run/openvpnd.pid
management 127.0.0.1 14
management-log-cache 100
topology subnet
script-security 2
port 1194
proto udp
cipher bf-cbc
auth sha1
client-connect /tmp/openvpn/clcon.sh
client-disconnect /tmp/openvpn/cldiscon.sh
client-config-dir /tmp/openvpn/ccd
comp-lzo adaptive
tls-server
ifconfig-pool-persist /tmp/openvpn/ip-pool 86400
client-to-client
fast-io
tun-mtu 1400
mtu-disc yes
server-bridge 192.168.6.1 255.255.255.0 192.168.6.50 192.168.6.69
dev tap2
-------------
The dh for generating all keys/certs is 2048 instead of 1024, is this a problem?
Could the problem be that the server is using the SHA1 hash algorithm or the blowfish cipher?