I only want to have to create a security file per-location, not per computer, as each of my "Locations" may have 20-50 computers, and I don't want to have to customize every computer, so I used the same cert and key file for each client PC at the location.
Now I can connect successfully with multiple computers using the same security file, except they interfere with each other because they all get the same IP address from the vpn server, and all of them end up loosing the connection.
How can I keep them from getting the same IP but use the same client cert and key files? Preferably this will be a server-side fix, because I have over 300 PCs out there that will have to be modified if it's on the client side...
Here is my config files:
Server:
Code: Select all
local 192.168.1.61
port 1194
proto udp
mssfix 1400
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 208.67.220.220"
dev tap
ca "C:\\Program Files (x86)\\OpenVPN\\easy-rsa\\keys\\ca.crt"
cert "C:\\Program Files (x86)\\OpenVPN\\easy-rsa\\keys\\server.crt"
key "C:\\Program Files (x86)\\OpenVPN\\easy-rsa\\keys\\server.key"
dh "C:\\Program Files (x86)\\OpenVPN\\easy-rsa\\keys\\dh1024.pem"
server 192.168.10.0 255.255.255.128
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1"
keepalive 10 120
cipher BF-CBC
comp-lzo
max-clients 100
persist-key
persist-tun
status openvpn-status.log
verb 1
Code: Select all
client
dev tap
#dev-node MyTAP
proto udp
remote blah.dyndns.org 1194
route 192.168.0.2 255.255.255.0 vpn_gateway 3
resolv-retry infinite
nobind
persist-key
persist-tun
ca "<path_to_client_ca>"
cert "<path_to_client_cert>"
key "<path_to_client_key>"
ns-cert-type server
cipher BF-CBC
comp-lzo
verb 1