<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="pt-BR">
	<id>https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=Instala%C3%A7%C3%A3o_da_OpenVPN</id>
	<title>Instalação da OpenVPN - Histórico de revisão</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=Instala%C3%A7%C3%A3o_da_OpenVPN"/>
	<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Instala%C3%A7%C3%A3o_da_OpenVPN&amp;action=history"/>
	<updated>2026-04-17T12:39:24Z</updated>
	<subtitle>Histórico de revisões para esta página neste wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=Instala%C3%A7%C3%A3o_da_OpenVPN&amp;diff=86&amp;oldid=prev</id>
		<title>imported&gt;Admin: uma edição</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Instala%C3%A7%C3%A3o_da_OpenVPN&amp;diff=86&amp;oldid=prev"/>
		<updated>2020-08-08T02:45:29Z</updated>

		<summary type="html">&lt;p&gt;uma edição&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;pt-BR&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Edição anterior&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Edição das 02h45min de 8 de agosto de 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;pt-BR&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(Sem diferença)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key omph_wiki-maquine_:diff:1.41:old-85:rev-86 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Admin</name></author>
	</entry>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=Instala%C3%A7%C3%A3o_da_OpenVPN&amp;diff=85&amp;oldid=prev</id>
		<title>2532252&gt;Jefferson em 10h50min de 26 de janeiro de 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Instala%C3%A7%C3%A3o_da_OpenVPN&amp;diff=85&amp;oldid=prev"/>
		<updated>2019-01-26T10:50:17Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Página nova&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Introdução ==&lt;br /&gt;
&lt;br /&gt;
Este procedimento é baseado na instalação do pacote openvpn-2.2.2 em uma CPU usando Linux e com pelo menos duas placas de rede, uma da rede local e outra ligada à Internet.&lt;br /&gt;
&lt;br /&gt;
==  Pacotes a serem instalados ==&lt;br /&gt;
&lt;br /&gt;
Acesse a CPU como root e com o comando abaixo instale os pacotes necessários para a instalação e configuração da VPN&lt;br /&gt;
&lt;br /&gt;
 #yum install openvpn-2.2.2* bridge-utils mutt&lt;br /&gt;
&lt;br /&gt;
== Configuração do Servidor ==&lt;br /&gt;
&lt;br /&gt;
=== Criação do Link Simbólico e dos diretórios ===&lt;br /&gt;
&lt;br /&gt;
Dentro do diretório /etc/openvpn crie o link simbólico com o comando abaixo:&lt;br /&gt;
&lt;br /&gt;
 #ln -s /usr/share/doc/openvpn-2.2.2/easy-rsa/2.0 easy-rsa&lt;br /&gt;
&lt;br /&gt;
=== Criação e edição dos arquivos do diretório bin ===&lt;br /&gt;
&lt;br /&gt;
Ainda dentro do diretório /etc/openvpn crie agora dois diretórios que devem ser chamados de bin e de chaves_clientes com o seguinte comando:&lt;br /&gt;
&lt;br /&gt;
 #mkdir bin chaves_clientes&lt;br /&gt;
&lt;br /&gt;
Copie para o novo diretório bin os arquivos de start e de stop do pacote bridge-utils com os comandos:&lt;br /&gt;
&lt;br /&gt;
 #cp -f /usr/share/doc/openvpn-*/sample-scripts/bridge-start bin/&lt;br /&gt;
 #cp -f /usr/share/doc/openvpn-*/sample-scripts/bridge-stop bin/&lt;br /&gt;
&lt;br /&gt;
Edite, por exemplo com o vi, o arquivo /etc/openvpn/bin/bridge-start&lt;br /&gt;
&lt;br /&gt;
O arquivo original tem a seguinte estrutura originalmente:&lt;br /&gt;
&lt;br /&gt;
 #!/bin/sh&lt;br /&gt;
 #################################&lt;br /&gt;
 # Set up Ethernet bridge on Linux&lt;br /&gt;
 # Requires: bridge-utils&lt;br /&gt;
 #################################&lt;br /&gt;
 # Define Bridge Interface&lt;br /&gt;
 br=&amp;quot;br0&amp;quot;&lt;br /&gt;
 # Define list of TAP interfaces to be bridged,&lt;br /&gt;
 # for example tap=&amp;quot;tap0 tap1 tap2&amp;quot;.&lt;br /&gt;
 tap=&amp;quot;tap0&amp;quot;&lt;br /&gt;
 # Define physical ethernet interface to be bridged&lt;br /&gt;
 # with TAP interface(s) above.&lt;br /&gt;
 eth=&amp;quot;eth0&amp;quot;&lt;br /&gt;
 eth_ip=&amp;quot;192.168.8.4&amp;quot;&lt;br /&gt;
 eth_netmask=&amp;quot;255.255.255.0&amp;quot;&lt;br /&gt;
 eth_broadcast=&amp;quot;192.168.8.255&amp;quot;&lt;br /&gt;
 for t in $tap; do&lt;br /&gt;
     openvpn --mktun --dev $t&lt;br /&gt;
 done&lt;br /&gt;
 brctl addbr $br&lt;br /&gt;
 brctl addif $br $eth &lt;br /&gt;
 for t in $tap; do&lt;br /&gt;
     brctl addif $br $t&lt;br /&gt;
 done &lt;br /&gt;
 for t in $tap; do&lt;br /&gt;
     ifconfig $t 0.0.0.0 promisc up&lt;br /&gt;
 done&lt;br /&gt;
 ifconfig $eth 0.0.0.0 promisc up&lt;br /&gt;
 ifconfig $br $eth_ip netmask $eth_netmask broadcast $eth_broadcast&lt;br /&gt;
&lt;br /&gt;
e nele as 3 linhas abaixo devem ser alteradas a fim de serem compatibilizadas com a nossa rede.&lt;br /&gt;
&lt;br /&gt;
 eth_ip=&amp;quot;IP_DO_SERVIDOR_QUE_ESTAMOS_USANDO&amp;quot;&lt;br /&gt;
 eth_netmask=&amp;quot;MASCARA_DA_REDE&amp;quot;&lt;br /&gt;
 eth_broadcast=&amp;quot;ENDERECO_DE_REDE_DA_NOSSA_REDE&amp;quot;&lt;br /&gt;
&lt;br /&gt;
salve o arquivo.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== O arquivo /etc/openvpn/bin/mkclient-key ====&lt;br /&gt;
&lt;br /&gt;
Crie agora o arquivo mkclient-key idêntico ao abaixo:&lt;br /&gt;
&lt;br /&gt;
 #!/bin/bash&lt;br /&gt;
 #&lt;br /&gt;
 [ $# -ne 1 ] &amp;amp;&amp;amp; echo &amp;quot;Uso: $0 nome-cliente&amp;quot; &amp;amp;&amp;amp; exit 255&lt;br /&gt;
 CLIENTE=$1&lt;br /&gt;
 echo -n &amp;quot;Informe o endereco do servidor: &amp;quot;&lt;br /&gt;
 read SERVER&lt;br /&gt;
 OVPNDIR=/etc/openvpn&lt;br /&gt;
 EASY_RSA=${OVPNDIR}/easy-rsa&lt;br /&gt;
 cd ${EASY_RSA}&lt;br /&gt;
 source ./vars&lt;br /&gt;
 ./pkitool $CLIENTE&lt;br /&gt;
 [ ! -d ${OVPNDIR}/chaves_clientes ] &amp;amp;&amp;amp; mkdir ${OVPNDIR}/chaves_clientes&lt;br /&gt;
 [ -d ${OVPNDIR}/chaves_clientes/${CLIENTE} ] &amp;amp;&amp;amp; rm -rf ${OVPNDIR}/chaves_clientes/${CLIENTE}&lt;br /&gt;
 mkdir ${OVPNDIR}/chaves_clientes/${CLIENTE}&lt;br /&gt;
 cp keys/ca.crt keys/${CLIENTE}.crt keys/${CLIENTE}.key ${OVPNDIR}/chaves_clientes/${CLIENTE}&lt;br /&gt;
 cat ${OVPNDIR}/chaves_clientes/cliente.ovpn | \&lt;br /&gt;
        sed -e &amp;quot;s/__CLIENT__/${CLIENTE}/g&amp;quot; \&lt;br /&gt;
            -e &amp;quot;s/__SERVER__/${SERVER}/g&amp;quot;   &amp;gt;  ${OVPNDIR}/chaves_clientes/${CLIENTE}/${CLIENTE}.ovpn&lt;br /&gt;
 cd ${OVPNDIR}/chaves_clientes&lt;br /&gt;
 zip -r ${CLIENTE}.zip ${CLIENTE}&lt;br /&gt;
 echo -n &amp;quot;Informe o endereco de e-mail para encaminhar a chave: &amp;quot;&lt;br /&gt;
 read MAIL&lt;br /&gt;
 echo &amp;quot;Segue a chave para acesso a VPN, qualquer duvida entre em contato com o departamento de suporte&amp;quot; | mutt -a ${CLIENTE}.zip -s &amp;quot;Chave VPN para: ${CLIENTE}&amp;quot; -b $MAIL&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== O arquivo /etc/openvpn/bin/mkserver-key ====&lt;br /&gt;
&lt;br /&gt;
Crie agora o arquivo mkserver-key idêntico ao abaixo:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 #!/bin/bash&lt;br /&gt;
 #&lt;br /&gt;
 SERVER=server&lt;br /&gt;
 cd /etc/openvpn/easy-rsa&lt;br /&gt;
 source ./vars&lt;br /&gt;
 ./clean-all&lt;br /&gt;
 ./build-dh&lt;br /&gt;
 ./pkitool --initca&lt;br /&gt;
 ./pkitool --server $SERVER&lt;br /&gt;
&lt;br /&gt;
==== O arquivo /etc/openvpn/bin/rmclient-key ====&lt;br /&gt;
&lt;br /&gt;
Crie agora o arquivo rmclient-key idêntico ao abaixo:&lt;br /&gt;
&lt;br /&gt;
 CLIENTE=$1&lt;br /&gt;
 [ -z $CLIENTE ] &amp;amp;&amp;amp; {&lt;br /&gt;
                    echo &amp;quot;Uso: rmclient-key nome-da-chave-gerada&amp;quot;&lt;br /&gt;
                    exit 255&lt;br /&gt;
                   }&lt;br /&gt;
 [ ! -f /etc/openvpn/easy-rsa/keys/${CLIENTE}.key ] &amp;amp;&amp;amp; {&lt;br /&gt;
                    echo &amp;quot;Chave para $CLIENTE nao foi localizada&amp;quot;&lt;br /&gt;
                    echo &amp;quot;nenhuma acao foi tomada.... saindo....&amp;quot;&lt;br /&gt;
                    exit 255&lt;br /&gt;
                  }&lt;br /&gt;
 cd /etc/openvpn/easy-rsa&lt;br /&gt;
 source vars&lt;br /&gt;
 ./revoke-full ${CLIENTE}&lt;br /&gt;
 [ ! -d /etc/openvpn/chaves_clientes/revogadas ] &amp;amp;&amp;amp; mkdir /etc/openvpn/chaves_clientes/revogadas&lt;br /&gt;
 [ -f /etc/openvpn/chaves_clientes/${CLIENTE}.zip ] &amp;amp;&amp;amp; mv -f  /etc/openvpn/chaves_clientes/${CLIENTE}.zip /etc/openvpn/chaves_clientes/revogadas&lt;br /&gt;
 [ -d /etc/openvpn/chaves_clientes/${CLIENTE} ]     &amp;amp;&amp;amp; mv -f /etc/openvpn/chaves_clientes/${CLIENTE}      /etc/openvpn/chaves_clientes/revogadas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Terminada a edição e após ter salvo o arquivo, deve-se aplicar a ele a permissão de poder ser executado com o comando abaixo, bem como em alguns arquivos sob o diretório /etc/openvpn/easy-rsa/:&lt;br /&gt;
&lt;br /&gt;
 #chmod +x /etc/openvpn/bin/*&lt;br /&gt;
 #chmod +x /etc/openvpn/easy-rsa/clean-all&lt;br /&gt;
 #chmod +x /etc/openvpn/easy-rsa/build-dh&lt;br /&gt;
 #chmod +x /etc/openvpn/easy-rsa/pkitool&lt;br /&gt;
 #chmod +x /etc/openvpn/easy-rsa/whichopensslcnf&lt;br /&gt;
 #chmod +x /etc/openvpn/easy-rsa/revoke-full&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Criação e edição do arquivo do diretório /etc/openvpn/chaves_clientes ===&lt;br /&gt;
&lt;br /&gt;
Inicialmente, ainda como root, vá para o diretório /etc/openvpn/chaves_clientes&lt;br /&gt;
&lt;br /&gt;
==== O arquivo /etc/openvpn/chaves_clientes/cliente.ovpn ====&lt;br /&gt;
&lt;br /&gt;
crie com seu editor de preferência o arquivo denominado cliente.ovpn que tem a estrutura abaixo, mas trocando o XXXX por um valor entre 1024 e 65535, equivalente a uma porta UDP que não esteja sendo utilizada na maquina Linux que esta sendo usada para instalar a VPN. Lembre-se que esta porta tera de ser aberta no Firewall:&lt;br /&gt;
&lt;br /&gt;
 client&lt;br /&gt;
 dev tap&lt;br /&gt;
 proto udp&lt;br /&gt;
 remote __SERVER__ &amp;#039;&amp;#039;&amp;#039;XXXX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 resolv-retry infinite&lt;br /&gt;
 nobind&lt;br /&gt;
 persist-key&lt;br /&gt;
 persist-tun&lt;br /&gt;
 comp-lzo&lt;br /&gt;
 verb 3&lt;br /&gt;
 ca ca.crt&lt;br /&gt;
 cert __CLIENT__.crt&lt;br /&gt;
 key __CLIENT__.key&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== A definição das variáveis da VPN ===&lt;br /&gt;
&lt;br /&gt;
Devemos editar o arquivos /etc/openvpn/easy-rsa/vars, que originalmente é o abaixo:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 # easy-rsa parameter settings&lt;br /&gt;
 # NOTE: If you installed from an RPM,&lt;br /&gt;
 # don&amp;#039;t edit this file in place in&lt;br /&gt;
 # /usr/share/openvpn/easy-rsa --&lt;br /&gt;
 # instead, you should copy the whole&lt;br /&gt;
 # easy-rsa directory to another location&lt;br /&gt;
 # (such as /etc/openvpn) so that your&lt;br /&gt;
 # edits will not be wiped out by a future&lt;br /&gt;
 # OpenVPN package upgrade.&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the top level of the easy-rsa&lt;br /&gt;
 # tree.&lt;br /&gt;
 export EASY_RSA=&amp;quot;`pwd`&amp;quot;&lt;br /&gt;
 #&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the requested executables&lt;br /&gt;
 #&lt;br /&gt;
 export OPENSSL=&amp;quot;openssl&amp;quot;&lt;br /&gt;
 export PKCS11TOOL=&amp;quot;pkcs11-tool&amp;quot;&lt;br /&gt;
 export GREP=&amp;quot;grep&amp;quot;&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the openssl.cnf file included&lt;br /&gt;
 # with easy-rsa.&lt;br /&gt;
 export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`&lt;br /&gt;
 # Edit this variable to point to&lt;br /&gt;
 # your soon-to-be-created key&lt;br /&gt;
 # directory.&lt;br /&gt;
 #&lt;br /&gt;
 # WARNING: clean-all will do&lt;br /&gt;
 # a rm -rf on this directory&lt;br /&gt;
 # so make sure you define&lt;br /&gt;
 # it correctly!&lt;br /&gt;
 export KEY_DIR=&amp;quot;$EASY_RSA/keys&amp;quot;&lt;br /&gt;
 # Issue rm -rf warning&lt;br /&gt;
 echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR&lt;br /&gt;
 # PKCS11 fixes&lt;br /&gt;
 export PKCS11_MODULE_PATH=&amp;quot;dummy&amp;quot;&lt;br /&gt;
 export PKCS11_PIN=&amp;quot;dummy&amp;quot;&lt;br /&gt;
 # Increase this to 2048 if you&lt;br /&gt;
 # are paranoid.  This will slow&lt;br /&gt;
 # down TLS negotiation performance&lt;br /&gt;
 # as well as the one-time DH parms&lt;br /&gt;
 # generation process.&lt;br /&gt;
 export KEY_SIZE=1024&lt;br /&gt;
 # In how many days should the root CA key expire?&lt;br /&gt;
 export CA_EXPIRE=3650&lt;br /&gt;
 # In how many days should certificates expire?&lt;br /&gt;
 export KEY_EXPIRE=3650&lt;br /&gt;
 # These are the default values for fields&lt;br /&gt;
 # which will be placed in the certificate.&lt;br /&gt;
 # Don&amp;#039;t leave any of these fields blank.&lt;br /&gt;
 export KEY_COUNTRY=&amp;quot;US&amp;quot;&lt;br /&gt;
 export KEY_PROVINCE=&amp;quot;CA&amp;quot;&lt;br /&gt;
 export KEY_CITY=&amp;quot;SanFrancisco&amp;quot;&lt;br /&gt;
 export KEY_ORG=&amp;quot;Fort-Funston&amp;quot;&lt;br /&gt;
 export KEY_EMAIL=&amp;quot;me@myhost.mydomain&amp;quot;&lt;br /&gt;
 export KEY_EMAIL=mail@host.domain&lt;br /&gt;
 export KEY_CN=changeme&lt;br /&gt;
 export KEY_NAME=changeme&lt;br /&gt;
 export KEY_OU=changeme&lt;br /&gt;
 export PKCS11_MODULE_PATH=changeme&lt;br /&gt;
 export PKCS11_PIN=1234&lt;br /&gt;
&lt;br /&gt;
Obs.: Leia atentamente os comentários e mude o que desejar, mas é fundamental as mudanças abaixo nas ultimas linhas iniciadas por EXPORT. O ficaria da seguinte forma (que nada mais não passa de um exemplo):&lt;br /&gt;
&lt;br /&gt;
 # easy-rsa parameter settings&lt;br /&gt;
 # NOTE: If you installed from an RPM,&lt;br /&gt;
 # don&amp;#039;t edit this file in place in&lt;br /&gt;
 # /usr/share/openvpn/easy-rsa --&lt;br /&gt;
 # instead, you should copy the whole&lt;br /&gt;
 # easy-rsa directory to another location&lt;br /&gt;
 # (such as /etc/openvpn) so that your&lt;br /&gt;
 # edits will not be wiped out by a future&lt;br /&gt;
 # OpenVPN package upgrade.&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the top level of the easy-rsa&lt;br /&gt;
 # tree.&lt;br /&gt;
 export EASY_RSA=&amp;quot;`pwd`&amp;quot;&lt;br /&gt;
 #&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the requested executables&lt;br /&gt;
 #&lt;br /&gt;
 export OPENSSL=&amp;quot;openssl&amp;quot;&lt;br /&gt;
 export PKCS11TOOL=&amp;quot;pkcs11-tool&amp;quot;&lt;br /&gt;
 export GREP=&amp;quot;grep&amp;quot;&lt;br /&gt;
 # This variable should point to&lt;br /&gt;
 # the openssl.cnf file included&lt;br /&gt;
 # with easy-rsa.&lt;br /&gt;
 export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`&lt;br /&gt;
 # Edit this variable to point to&lt;br /&gt;
 # your soon-to-be-created key&lt;br /&gt;
 # directory.&lt;br /&gt;
 #&lt;br /&gt;
 # WARNING: clean-all will do&lt;br /&gt;
 # a rm -rf on this directory&lt;br /&gt;
 # so make sure you define&lt;br /&gt;
 # it correctly!&lt;br /&gt;
 export KEY_DIR=&amp;quot;$EASY_RSA/keys&amp;quot;&lt;br /&gt;
 # Issue rm -rf warning&lt;br /&gt;
 echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR&lt;br /&gt;
 # PKCS11 fixes&lt;br /&gt;
 export PKCS11_MODULE_PATH=&amp;quot;dummy&amp;quot;&lt;br /&gt;
 export PKCS11_PIN=&amp;quot;dummy&amp;quot;&lt;br /&gt;
 # Increase this to 2048 if you&lt;br /&gt;
 # are paranoid.  This will slow&lt;br /&gt;
 # down TLS negotiation performance&lt;br /&gt;
 # as well as the one-time DH parms&lt;br /&gt;
 # generation process.&lt;br /&gt;
 export KEY_SIZE=1024&lt;br /&gt;
 # In how many days should the root CA key expire?&lt;br /&gt;
 export CA_EXPIRE=3650&lt;br /&gt;
 # In how many days should certificates expire?&lt;br /&gt;
 export KEY_EXPIRE=3650&lt;br /&gt;
 # These are the default values for fields&lt;br /&gt;
 # which will be placed in the certificate.&lt;br /&gt;
 # Don&amp;#039;t leave any of these fields blank.&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;export KEY_COUNTRY=&amp;quot;BR&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;export KEY_PROVINCE=&amp;quot;MG&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;export KEY_CITY=&amp;quot;BeloHorizonte&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;export KEY_ORG=&amp;quot;Maquine&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;export KEY_EMAIL=&amp;quot;alarmes@ourominas.com.br&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 export PKCS11_PIN=1234&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== A criação do arquivo /etc/openvpn/server.conf ===&lt;br /&gt;
&lt;br /&gt;
Crie agora o arquivo server.conf idêntico ao abaixo, onde XXXX tem de ser substituído pela porta definida na seção 3.3.1, bem como as linhas server-bridge, push_route e as push_dhcp-option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 port &amp;#039;&amp;#039;&amp;#039;XXXX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 proto udp&lt;br /&gt;
 dev tap0&lt;br /&gt;
 ca /etc/openvpn/easy-rsa/keys/ca.crt&lt;br /&gt;
 cert /etc/openvpn/easy-rsa/keys/server.crt&lt;br /&gt;
 key /etc/openvpn/easy-rsa/keys/server.key&lt;br /&gt;
 dh /etc/openvpn/easy-rsa/keys/dh1024.pem&lt;br /&gt;
 server-bridge IP_DA_CPU_QUE_INSTALAMOS_O_OPENVPN MASCARA IP_INICIAL_DA_REDE_QUE_SERA_FORNECIDO_AOS_CLIENTES_DA_VPN IP_FINAL_DA_REDE_QUE_SERA_FORNECIDO_AOS_CLIENTES_DA_VPN&lt;br /&gt;
 ifconfig-pool-persist /etc/openvpn/ipp.txt&lt;br /&gt;
 push &amp;quot;route END_DE_REDE_DA_REDE_LOCAL MASCARA DEFAULT_ROUTER&amp;quot;&lt;br /&gt;
 push &amp;quot;route END_DE_REDE_DE_OUTRA_REDE MASCARA ROUTER_DESTA_REDE&amp;quot;&lt;br /&gt;
 push &amp;quot;route END_DE_REDE_DE_OUTRA_REDE MASCARA ROUTER_DESTA_REDE&amp;quot;&lt;br /&gt;
 push &amp;quot;dhcp-option DNS IP_DO_SERVIDOR_PRIMARIO_DE_DNS_DA_REDE_LOCAL&amp;quot;&lt;br /&gt;
 push &amp;quot;dhcp-option DNS IP_DO_SERVIDOR_SECUNDARIO_DE_DNS_DA_REDE_LOCAL&amp;quot;&lt;br /&gt;
 push &amp;quot;dhcp-option DNS IP_DO_SERVIDOR_TERCEARIO_DE_DNS_DA_REDE_LOCAL&amp;quot;&lt;br /&gt;
 push &amp;quot;dhcp-option WINS IP_DO_SERVIDOR_WIN_DA_REDE_LOCAL&amp;quot;&lt;br /&gt;
 push &amp;quot;explicit-exit-notify 3&amp;quot;&lt;br /&gt;
 keepalive 10 120&lt;br /&gt;
 comp-lzo&lt;br /&gt;
 max-clients 100&lt;br /&gt;
 persist-key&lt;br /&gt;
 persist-tun&lt;br /&gt;
 verb 3&lt;br /&gt;
 status /etc/openvpn/openvpn_stat.log&lt;br /&gt;
 log-append /var/log/openvpn.log&lt;br /&gt;
&lt;br /&gt;
ATENÇÃO, não esqueça de colocar o arquivo /var/log/openvpn.log dentro do script /etc/logrotage.d/syslog !!!!&lt;br /&gt;
&lt;br /&gt;
== A geração do Certificado do Servidor ==&lt;br /&gt;
&lt;br /&gt;
Finalizada esta configuração já será possível gerar o Certificado do servidor, que usará as informações do arquivo /etc/openvpn/easy-rsa/vars, utilizando o comando abaixo:&lt;br /&gt;
&lt;br /&gt;
 #/etc/openvpn/bin/mkserver-key&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== O start do inicio do processo da inicialização do serviço OPENVPN ==&lt;br /&gt;
&lt;br /&gt;
Temos de considerar aqui que o Servidor tem instalado também o Firewall SHOREWALL e vamos ainda pressupor que na inicialização do Servidor Linux os serviços do Shorewall e do serviço OPENVPN não estão sendo automaticamente inicializados.&lt;br /&gt;
Como teremos de inicializar o comando bridge-start antes do serviço openvpn e do shorewall, teremos de usar o arquivo /etc/rc.d/rc.local, onde temos de inserir os tres comandos abaixo, mantendo a ordem abaixo. Não há nenhuma preocupação se tivermos de incluir entre eles algum outro comando. São eles: &lt;br /&gt;
&lt;br /&gt;
 #/etc/openvpn/bin/brigge-start&lt;br /&gt;
 #service openvpn start&lt;br /&gt;
 #service shorewall start&lt;br /&gt;
&lt;br /&gt;
ATENÇÃO, não esqueça de colocar o arquivo /var/log/openvpn.log dentro do script /etc/logrotage.d/syslog !!!! e de reconfigurar o firewall para reconhecer a nova interface br0 e ter a porta XXXX do protocolo UDP liberada.&lt;br /&gt;
&lt;br /&gt;
[[Category: TI]]&lt;br /&gt;
[[Category: CONFIGURACAO]]&lt;br /&gt;
[[Category: VPN]]&lt;/div&gt;</summary>
		<author><name>2532252&gt;Jefferson</name></author>
	</entry>
</feed>