

Tunnelblick config # Specify that we are a client and that we will be pulling certain config file directives from the server. Iptables -t nat -A POSTROUTING -s 192.168.2.0/24 -o eth0 -j MASQUERADE # port must be 5001 for scripts embedded in firmware to work # management parameter allows DD-WRT's OpenVPN Status web page to access the server's management port The IP displayed should be your office’s IP, meaning you are accessing internet through a tunnel from your office. All your traffic should now be routed through a secure tunnel to your office.Ĭonfirm this by visiting.

Click on Tunnelblick icon next to current time in the top-right corner of your screen and select connect ‘openvpn’. nano ~/Library/Application\ Support/Tunnelblick/Configurations/ bob.key.nano ~/Library/Application\ Support/Tunnelblick/Configurations/ bob.crt.nano ~/Library/Application\ Support/Tunnelblick/Configurations/ca.crt.Use Terminal to add certificate keys to your Tunnelblick configuration (keys created on Ubuntu cloud instance), again replacing bob in filename. and replace text bob with a name you used in the first step when creating certificates (same as filename of certificates).Ĥ. In this configuration, find SSL/TLS parms.
Tunnelblick vpn configuration install#
Click install and edit sample configuration file and paste into it client configuration (find it below).ģ.
Tunnelblick vpn configuration download#
Go to Tunnelblick’s website, download Tunnelblick 3.0 application and install it.Ģ. Configure iptables by going to Administration -> Commands, pasting in iptables config (find it below) and clicking save firewall.įor OS X users the recommended application for using OpenVPN is Tunnelblick.ġ.Paste in OpenVPN server config (find it below).Paste in certificates created in advance on a Ubuntu cloud instance.Enable OpenVPN server in Services and set it’s Start type to WAN Up.Quick flash of the router’s firmware and we are set. Off to the DD-WRT download page and grab the package that also has OpenVPN support ( dd-wrt.v24_vpn_generic.bin). Since we already have a Linksys WRT54G router running DD-WRT firmware it was an obvious decision to just use this piece of hardware to act as an OpenVPN server. From there on I just followed the tutorial on creating certificates. Luckily, Rackspace Cloud instance with Ubuntu was only 2 minutes away. I didn’t want to install openssl and openvpn on my Macbook just so I could generate access certificates. And for an extra layer of security when using public networks. Debating about VPNs on the Sauna Sprint, sprinters convinced me that we should use VPN for remote access to our internal services in our office.
