Skip to content

OpenVPN

Introduction

About this Document

This guide is designed as a reference for technical personnel, system administrators, and network administrators. It begins with an explanation of the basic concepts of OpenVPN, followed by step-by-step instructions for configuring the OpenVPN server on the AXS Guard appliance. Finally, we demonstrate how to connect to the AXS Guard OpenVPN server using a freely available OpenVPN client in a Windows environment.

Examples used in this Guide

All setup and configuration examples in this guide are performed with advanced administrator privileges. Some options may be unavailable if you log in as a full administrator or a user with lower access rights.

Since software development and documentation are continuous processes, the screenshots in this guide may slightly differ from the current AXS Guard user interface.

About OpenVPN

What is OpenVPN?

OpenVPN is an open source virtual private network (VPN) program for creating point-to-point or server-to-multiclient encrypted tunnels between hosts. It is capable of establishing direct links between computers across networks which use network address translation (NAT) and firewalls.

OpenVPN Concept

The AXS Guard OpenVPN server enables peer authentication using either client certificates or a combination of client certificates and username/password authentication, such as one-time passwords. In a multi-client server setup, the AXS Guard OpenVPN server issues an authentication certificate to each client through a Signature and Certificate Authority (PKI). OpenVPN heavily relies on OpenSSL for its cryptographic functions.

Data Encryption

OpenVPN uses OpenSSL to provide encryption for the data and the control channel. OpenSSL is an open source implementation of the SSL and TLS protocols. The core library (written in the C programming language) implements the basic cryptographic functions and provides various utility functions. Detailed information about the OpenSSL core library is outside the scope of this manual. For further details and specifications, please refer to the online resources available at: http://www.openssl.org/.

Authentication Methods

Authentication Method Description
Certificate-based authentication (PKI) The client is authenticated through a client certificate process. The certificate is generated on the AXS Guard appliance and subsequently imported into the OpenVPN client.
Additional authentication The client is authenticated through a client certificate (see above) combined with username/password authentication (e.g., one-time password, back-end authentication). This method requires additional configuration, as the appropriate authentication policy must be configured for the OpenVPN service. It also offers enhanced security, as physical access to the client device alone does not guarantee a connection to the OpenVPN server.

Supported Protocols

OpenVPN can run over UDP or TCP. It multiplexes all communications over a single TCP/UDP port. It has the ability to work through most proxy servers and is effective at working through NAT and getting out through firewalls. The AXS Guard OpenVPN server can push certain network configuration settings to its clients. These include IP addresses, routing commands and a few other connection options.

UDP Port 1194 is the official IANA assigned port number for OpenVPN. Newer versions of the program now default to that port. The use of common network protocols (TCP and UDP) makes OpenVPN a desirable alternative to IPsec in situations where an ISP blocks specific VPN protocols.

Important

Using TCP port 443 is generally recommended for better firewall traversal. This is the system default configuration on AXS Guard.

Supported Clients

The AXS Guard appliance supports any open-source OpenVPN client, as well as the Community and Access Server editions from OpenVPN Technologies, which offer the following advantages:

  • The client is freely available for Windows.
  • The client is also available for portable devices, such as tablet computers and smartphones.
  • You can deploy the OpenVPN Windows client and configuration files via Active Directory.

Deployment Options

OpenVPN offers flexible deployment options that cater to different organizational needs:

Deployment Option Description
OpenVPN Access Server Uses the AXS Guard OpenVPN Access Server for secure, rapid remote access. Compatible with OpenVPN Connect client on Windows, Android, and iOS. Users can download and import configurations via AXS Guard Cloud or a custom URL, reducing administrative tasks related to credential distribution.
Manual Configuration Provides manual export of OpenVPN configuration files or packages for non-Access Server setups. Files contain certificates and settings for client connections.
Note: The private key in configuration files is not password-protected, requiring careful handling.
Deployment Options by Client Type Configuration files are suited for Active Directory deployments, while configuration packages are ideal for the Community Edition or other open-source clients. Proper DNS configuration is essential to ensure clients can resolve the server's FQDN, allowing successful connectivity.

Server-Side Configuration

Overview

In this chapter, we explain how to configure the AXS Guard OpenVPN server. Topics covered in this chapter include:

  • How to enable the OpenVPN server feature

  • How to configure the AXS Guard OpenVPN server

  • How to create, assign and export an OpenVPN client configuration

  • How to configure user authentication for the OpenVPN service

  • How to configure user-level settings, such as firewall access rights

Server & Client Certificates

Server certificates are required for the OpenVPN AS and the OpenVPN server.

Server Type Requirements
OpenVPN Access Server (AS) A valid certificate signed by a public Certificate Authority (CA) is required for the domain name associated with the public DNS record of the OpenVPN AS. The OpenVPN Connect app does not accept self-signed certificates or certificates signed by an untrusted CA by default. The certificate must be imported via PKI > Certificates on your AXS Guard appliance before you can assign it to the OpenVPN AS. Refer to the local access server section or the OpenVPN Access Server Knowledge Base (KB) article for further information.
OpenVPN Server Use the AXS Guard built-in CA to issue client certificates and the OpenVPN server certificate.

Important: AXS Guard automatically provisions client certificates for users when they connect to the OpenVPN Access Server (AS) using the OpenVPN Connect app. Manual certificate issuance is not required in that scenario.

Feature Activation

  1. Log in to the AXS Guard appliance.

  2. Navigate to System > Feature Activation > VPN.

  3. Enable OpenVPN and update your configuration.

    image

Connection Settings

The connection settings are used by the OpenVPN server to listen for incoming client connections. The parameters listed in the table below are included in the client configuration file which is generated when you export an OpenVPN configuration pack. To configure the connection settings:

  1. Navigate to VPN > OpenVPN > Server.

  2. Enable the OpenVPN server.

  3. Configure the connection settings as explained in the sections below.

    OpenVPN Connection Settings

Network Settings

Option Description

Enable OpenVPN Server

Enables and starts the OpenVPN server.

Server Binding Options

Select the appropriate option. See the context-sensitive help on the AXS Guard appliance for additional information. OpenVPN will bind to all Internet interfaces by default, but it can also be configured to bind to a specific Internet interface or IP address.

IP Address

OpenVPN will bind to the specified IP address. This field is only visible if you set the option above to Bind to IP address .

Protocol

Select the protocol for OpenVPN connections. TCP is the system default as it can traverse proxies. Changing this option on an existing server configuration requires you to reconfigure your clients.

Server Port

Enter the OpenVPN server port. 443 is the system default port. Changing the port on an existing server configuration requires you to reconfigure your clients.

Avoid port conflicts. If another service is using TCP port 443, for example the webmail or reverse proxy service, the OpenVPN server will fail to start. Change the OpenVPN port number in that case.

Dead Peer Detection

Option Description

Delay

The number of seconds between keep-alive checks. 10 seconds is the system default.

Timeout

If the client does not reply to the OpenVPN server within the specified period, the connection will be reset. 60 seconds is the system default.

VPN Device Properties

Option Description

Tunnel Device Type

Select the device type which will be used to set up OpenVPN connections. TUN is the system default option which is supported by most devices and operating systems. TUN is also required if you intend to use the OpenVPN Access Server. TAP is only needed if you want to transport non-IP based traffic or for bridging, e.g. if you want your LAN and VPN clients to be in the same broadcast domain.

IP Range

The range of IP addresses that is distributed to the OpenVPN clients. Use the CIDR notation, e.g. 10.255.253.0/24. Make sure the range is not used elsewhere in your network to avoid routing issues.

Advanced Settings

Important

Clients using OpenVPN versions older than 2.4 will be unable to connect to the VPN server if DCO is enabled.

Option Description
Use (DCO) Data Channel Offload Moves the data channel processing to a kernel module, reducing the overhead caused by context switching between the kernel and userspace. Enabling this option can significantly boost OpenVPN performance. Please note that offloading only works in TUN mode and requires all legacy options to be disabled.

Security Settings

  1. Navigate to VPN > OpenVPN > Server.

  2. Select the Security Settings tab.

  3. Configure the settings as explained in the sections below.

    Security Settings

Server Authentication

Option Description

Server Certificate

Select the server certificate for the OpenVPN server. Go to PKI > Certificates to create or import a server certificate. If no hostname is specified in the server certificate, enter it in the Server Hostname field.

Current Certificate

Shows the certificate details of the selected server certificate.

Server Hostname

This field is optional. Enter the external FQDN or IP address of the OpenVPN server, e.g. my.server.net. The hostname will be written to the OpenVPN client configuration files used by the OpenVPN clients. Note that you only need to enter a hostname if you did not specify an FQDN or IP address in the server certificate.

Client Authentication

Option Description

Allow Duplicate Certificates

Allows simultaneous OpenVPN connections from a single user if enabled. Enable this option if you have users which require OpenVPN access from different computers or devices which use the same client certificate.

Enforce Additional Authentication

If enabled, clients will be required to provide a username/password in addition to a client certificate for authentication. Go to Authentication > Services to configure the authentication policy of the OpenVPN server. Select DIGIPASS to enforce two-factor authentication.

Enforce Strict Authentication

If enabled, the server will verify if the CN or e-mail address in the client certificate matches the username provided during authentication. If they differ, the connection will be refused. Prevents sharing of client certificates.

System Legacy Options

Important

The following options exist solely for legacy compatibility, to support outdated client software or obsolete OpenVPN configurations. These legacy options must be disabled for DCO (Data Channel Offload) to function. Additionally, using these outdated server and client options poses security risks. It is highly recommended to upgrade old OpenVPN client software and configurations as soon as possible.

Option Description

Allow Deprecated Ciphers

Enables deprecated ciphers to allow connections with old OpenVPN clients (v2.3 or older). It is strongly recommended to upgrade your OpenVPN clients instead of enabling this option.

Cipher Algorithm

Select the desired data encryption cipher for OpenVPN connections. AES is highly recommended and is the system default algorithm. The digits after AES represent the key size, which is expressed in bits. 128 bits is the system default key size. The higher the key size, the stronger the encryption. Changing this option on an existing server configuration requires you to reconfigure the clients. .

Use small Subranges

Enable to support outdated client software, i.e. for computers which are using OpenVPN 2.0.9 or older versions.

OpenVPN 2.0.9 and older versions of the client software cannot configure a network range for OpenVPN TUN and TAP devices (IP + subnet). As a workaround, the server IP range is divided into small subranges; each client will be allocated a virtual /30 subnet, taking up 4 IP addresses per client, plus 4 additional IP addresses on the server side.

It is recommended to upgrade the client software instead of using this option, as this may result in premature depletion of the configured IP address pool (IP range).

Accept Compressed Data

LZO compression is a data-compression algorithm that focuses on decompression speed. This option is deprecated and considered insecure.

Allowing compression is not recommended, because a recent discovery revealed it is possible to collect information about an encrypted VPN tunnel's contents in very specific circumstances, if an attacker has the ability to capture the encrypted data packets while a certain type of data is transferred through the VPN tunnel. See the official OpenVPN documentation for additional information.

System administrators should disable this option ASAP and distribute new OpenVPN configuration files.

Push-to-Client Configuration

  1. Navigate to VPN > OpenVPN > Server.

  2. Select the Push-to-Client Configuration tab.

  3. Enter the settings as explained in the tables below.

  4. Update your configuration.

    Push-to-Client Configuration

Name Resolution

Option Description

DNS Server

Add the primary domain name server address. Repeat to set secondary DNS server addresses.

WINS Server

Add the primary WINS server address (NetBIOS over TCP/IP Name Server). Repeat to set secondary WINS server addresses.

Search Domain

Enter a connection-specific DNS suffix, e.g. example.com. This allows clients to resolve unqualified hostnames in the specified domain. Administrators can add multiple search domains for clients which need access to resources on various domains or subdomains.

Routing

Option Description

Re-route Client Traffic

If enabled, all client traffic, including Internet traffic, will be routed over the VPN connection. If you disable this option, you must add the internal networks that should be reachable by your OpenVPN clients.

Network

Add the internal network(s) you wish to make available to your OpenVPN clients. Use the CIDR notation, e.g. 192.0.2.0/24

Inactivity Settings

image

Option Description

Idle Timeout

OpenVPN will terminate the connection after a period of inactivity. The length of the idle time is measured from the last incoming or outgoing tunnel packet. The default value is set to 0 seconds, which means the option is disabled.

Dead Peer Detection and TLS control packets are not considered as activity, and are not counted as traffic, as they are only used internally and do not indicate actual user activity.

Access Server Settings

  1. Navigate to VPN > OpenVPN > Server.

  2. Select the Access Server tab.

  3. Configure the settings as explained in the following sections and update your configuration.

    image

Certificate Expiry Notification

AXS Guard incorporates a feature that verifies the expiration dates of certificates assigned to OpenVPN users.

To ensure timely action, AXS Guard will proactively send email notifications to users when their certificate is about to expire.

This notification is composed of a default subject and default body. However, system administrators have the flexibility to modify the subject and body text of the email, allowing them to personalize the notification or override the default content as needed.

image

Option Description
Certificate Lifespan The number of days for which issued OpenVPN client certificates remain valid. 365 days is the system default configuration.
Notify User of Certificate Expiry Enable this option to send e-mail notifications to users regarding expiring certificates. Users will be notified 28 days before their certificate expires. The recipient e-mail address is determined based on the following priority: first, the system uses the first e-mail address in the user's e-mail alias list. If not available, the system defaults to the username appended with the mail domain (e.g., username@maildomain). Finally, if necessary, the username is combined with the system domain (e.g., username@systemdomain).
Notification Sender The e-mail address from where notification mails will be sent. If no sender is defined, root will be used. The sender domain is the mail domain of the appliance. If no mail domain exists, the system domain will be used instead.
Notification Subject The subject to be used in the notification.
Notification Content The content to be used in the notification. Some template variables can be used, as explained in the list below.
Variable Description
{$user}

Will be replaced with the user's full name or the username if no full name exists.

{$username}

Will be replaced with the user's AXS Guard username.

{$fullname}

Will be replaced with the user's full name.

{$validtill}

Will be replaced with the expiration date of the client certificate.

{$license}

Will be replaced with the license number of your AXS Guard appliance.

Local Access Server

The local access server settings allow you to simplify the OpenVPN connection process for end-users.

For example, they can use https://openvpn.mycompany.com instead of the 0000-000XXXXX.appliances.axsguard.cloud URL provided by AXS Guard. This makes connecting to the company network through OpenVPN easier and more user-friendly.

Requirements

  • The AXS Guard appliance must be reachable over the internet via TCP port 443.
  • A public DNS record must resolve to the appliance's public IP address.
  • A valid certificate signed by a public Certificate Authority (CA) is required for the domain name associated with the DNS record. The OpenVPN Connect client does not accept self-signed certificates or certificates signed by an untrusted CA.

image

Hostname

Hostname as used by the clients to connect to the OpenVPN Access server.
It must match the name as configured in your public DNS record(s) as well as the CN (or one of the Subject Alternative Names) in the server certificate.

Certificate Configuration

Select the server certificate for the OpenVPN Access Server. Go to PKI > Certificates to import a server certificate.

It is required that the OpenVPN Access server certificate be issued by a public Certification Authority (CA). The OpenVPN Connect client does not accept self-signed certificates or certificates signed by an untrusted CA.

Certificate Details

Shows the certificate details of the configured server certificate.

Binding Options

Select the appropriate OpenVPN Access Server binding option:

Configuration Behavior
Bind to all Internet interfaces The OpenVPN Access server will listen on all Internet interfaces for incoming traffic. This is the system default configuration.
Bind to a specific Internet interface The OpenVPN Access server will only listen on the specified Internet interface.
Bind to IP address The OpenVPN Access server will only listen on the specified IP address.

Granting Access to OpenVPN

Group-level Access

  1. Navigate to Users & Groups > Groups

  2. Select the appropriate group

  3. Select the VPN tab

  4. Check the appropriate VPN option

  5. Click on update to save your settings

    image

User-level Access

  1. Navigate to Users & Groups > Users.

  2. Select the appropriate user by clicking on the username.

  3. Click on the VPN tab.

  4. If access to the VPN service is already allowed in the user’s group, select use group configuration. If not, set the option to on to overrule the group configuration.

  5. Update your configuration.

    Configuring OpenVPN Access for a User

OpenVPN Firewall and Application Control Settings

System-Wide Firewall Policies

System-wide firewall policies affect all users on the AXS Guard network. Connected OpenVPN users are considered a part of the secure network. It is crucial to restrict the system-wide firewall rights as much as possible.

The default system-wide firewall policies (stat-sec and stat-z-fix) provide appropriate security for OpenVPN access. However, you can overrule these default policies simply by creating separate, custom policies. The custom policies must then be added to the AXS Guard group or user profile in order to be applied after authentication.

A list of default firewall rules is available in the AXS Guard Firewall How To, which can be accessed via the Documentation button in the Administrator Tool. You can also click on a firewall rule or policy to view its configuration.

User and Group Firewall Policies.

Able highly recommends the use of a strong client-side firewall and the creation of dedicated firewall policies for access to network resources that are available through the VPN connection. A predefined firewall policy, fwd-access-lan, is available for convenience. This policy allows any type of traffic towards the AXS Guard secure LAN when a VPN connection is established.

About Application Control

The application control system monitors the application layer (layer 7 of the OSI model) of the network. This is also known to as Deep Packet Inspection (DPI), a form of computer network packet filtering that examines the data part of a packet as it passes the AXS Guard, searching for defined criteria, such as protocols or websites, to decide whether the packet may pass or needs to be blocked. The AXS Guard also collects and reports statistical information about all layer 7 traffic.

The application control system allows application-layer detection of protocols, regardless of the port being used. This means that it is possible to both detect known protocols on non-standard ports, e.g. http traffic on ports other than 80, and also the opposite, e.g. detect Skype traffic on port 80. The system will also detect and block access to certain file types, such as multimedia files (if enabled).

image

Group-level Configuration

  1. Navigate to Users & Groups > Groups.

  2. Click on the appropriate group name.

  3. Select the VPN tab to specify the VPN firewall and application control policies.

  4. Update your configuration.

    L2TP Group Level Firewall Configuration

Option

Description

Add Firewall Policy

Select specific firewall policies for group members who connect to the corporate network with a VPN client, such as a PPTP client. Go to Firewall > Policies > Dynamic for an overview of defined firewall policies.

Option Description

Use computer/system application control policies

Enforce the system-wide policies, assigned under Application Control > General and the computer-level policies, if any.

Add to computer/system application control policies

Assign specific policies to this group, in addition to the system-wide policies configured under Application Control > General and computer-level policies, if any.

Overrule computer/system application control policies

Do not enforce the system-wide policies and computer-level policies, but only the specified policies. The specific policies will be enforced when a member of the group successfully authenticates.

User-level Configuration

  1. Navigate to Users & Groups > Users.

  2. Click on the appropriate username.

  3. Select the VPN tab and select the appropriate firewall and application control policy modes as explained below.

  4. Update your configuration.

    User Level Firewall Configuration

Option Description

Use Group Firewall Policies

Select this option if you wish to apply the same firewall policies for VPN use as defined in the user’s group.

Add to Group Firewall Policies

Select this option to add specific policies for VPN use, in addition to the user’s group firewall policies.

Overrule Groups Firewall Policies

Select this option to overrule the group firewall configuration and specify unique policies for the user.

Option Description

Use group application control policies

Only enforce the policies as configured for the user’s group.

Add to group application control policies

Enforce the policies as configured for the user’s group and the policies that are specified in the user profile.

Overrule group application control policies

Only policies configured at the user, computer and system levels are enforced. Group policies are not enforced.

Overrule Group / Computer / System Application Control Policies

Only the application control policies configured at the user level are enforced.

Exporting OpenVPN Configuration Files

OpenVPN client configuration and certificate files must be generated with the AXS Guard CA via PKI > Certificates. See the PKI guide for more information on creating and exporting certificates.

  • Mind the difference between OpenVPN Configuration Packs and Configuration Files (see deployment options).

  • You can simply block a user’s OpenVPN access by revoking the client certificate.

Generating an OpenVPN Client Configuration

  1. Go to PKI > Certificates.

  2. Export the client’s OpenVPN configuration pack.

    Exporting an OpenVPN Client Configuration

Format Description

PKCS12

Used by PAX units, IPsec Road Warriors and L2TP clients.

OpenVPN Configuration Pack

Used by OpenVPN clients (with private key protection).

OpenVPN Configuration File

Used by OpenVPN clients (without private key protection).

Export Password

A password to protect the certificate. You will need this password to install the certificate on the client.

Downloading OpenVPN Configuration Files

Users can also download their OpenVPN configuration via the AXS Guard cloud or a custom URL. In order to do this, users need a compatible OpenVPN client and a valid set of credentials - like a username and a password - and of course the address (URL) of the OpenVPN Access Server.

Requirements:

  • The AXS Guard OpenVPN server must be correctly configured and running.
  • The Tunnel Device Type must be set to TUN - IPv4 Encapsulation (TAP is not supported).
  • The AXS Guard appliance must be reachable via a custom URL or the AXS Guard cloud. The latter can be tested by logging in to the AXS Guard cloud portal. Then select AXS Guard Central and click on the login button which matches the license of your appliance.

    image

OpenVPN Access Server URL:

Access Type URL
Standard connection URL https://0000-000XXXXX.appliances.axsguard.cloud/
HA cluster connection URL (master node) https://m-0000-000XXXXX.appliances.axsguard.cloud/

Simply replace 0000-000XXXXX with the license number of your AXS Guard appliance.

Supported Clients:

OS Client
Windows OpenVPN Connect
Android
Linux OpenVPN 3 Linux
macOS OpenVPN Connect v3 (OpenVPN Connect v2 is not supported)
iOS OpenVPN Connect v3

User Authentication

Setting the OpenVPN Server Policy

Clients are authenticated by their client certificate. However, additional authentication methods are available for increased security, e.g. DIGIPASS authentication.

In this section, we explain how to configure additional authentication methods for OpenVPN users. For detailed information about authentication methods and policies, see the AXS Guard authentication manual.

The instructions in this section are only relevant if you enabled additional authentication in the OpenVPN server configuration.

  1. Navigate to Authentication > Services.

  2. Click on OpenVPN.

  3. Choose the appropriate Authentication Policy by clicking on the Select button, e.g. DIGIPASS if you want users to authenticate with a one-time password.

  4. Update your configuration.

    Setting the Authentication Policy for OpenVPN

Field Description

Service

The AXS Guard service to be configured. This field cannot be edited.

Authentication Policy

The authentication policy determines how users must authenticate to access the service. Go to Authentication > Advanced > Policy for an overview of policies configured on your system.

Brute Force Attack Protection

Enable to protect the selected service against brute force attacks as configured under Authentication > General.

AXS Guard Service

Supported Authentication Policies

OpenVPN

  • OATH

  • DIGIPASS

  • DirectoryService

  • RADIUS

  • Password

Setting the OpenVPN Access Server Policy

Configure the authentication policy for users who download their OpenVPN configuration via the AXS Guard cloud or a custom URL, using their OpenVPN Connect Client.

  1. Navigate to Authentication > Services.

  2. Click on OpenVPN Access Server.

  3. Choose the appropriate Authentication Policy by clicking on the Select button.

    image

Client-Side Configuration

Deploying with Active Directory

About

The documentation to install and deploy the OpenVPN Technologies client is available on the official website: http://openvpn.net. The main reason you want to use this client, is because it can be deployed via Active Directory, which is particularly useful in large network environments.

The OpenVPN Connect client (MSI) must be deployed via GPOs using a generic server locked profile.

Copying the Server and Client Files to Their Appropriate Directories

The AXS Guard OpenVPN configuration file, which contains the client certificate and configuration, must be copied to the appropriate directory on the client, typically C:\Program Files\OpenVPN\config\ This process can be automated with an Active Directory logon script. Refer to your Active Directory documentation for information about creating logon scripts. Check the OpenVPN online reference for more information.

OpenVPN Connect Example

  1. Download and install the OpenVPN Connect app.
  2. Launch the OpenVPN Connect app.
  3. Enter your OpenVPN Connect URL, e.g.

    https://0000-00012345.appliances.axsguard.cloud/
    Replace 0000-00012345 with the license number of your AXS Guard appliance or use the configured custom URL, e.g. https://openvpn.mycompany.com.

    Important - OpenVPN Access in High Availability (HA) Configurations

    In High Availability (HA) configurations, URLs with the m- and s- prefixes automatically redirect to the active master and slave nodes. The master node handles the primary OpenVPN connections, while the slave node is ready to take over if a failover occurs.

    For example, https://m-0000-00012345.appliances.axsguard.cloud always points to the running master appliance. In the event of a master failure, the running slave appliance will be promoted to master, ensuring continuous availability. The OpenVPN service on the new master will automatically take over and maintain VPN access without requiring changes to the user’s connection settings.

    This seamless redirection ensures uninterrupted VPN connectivity even during appliance failover.

    image

  4. Click on the Next button.

  5. Enter your user credentials for the OpenVPN Access Server.
  6. Click on Import to download your OpenVPN configuration.
  7. Click on the slider button to connect to the OpenVPN server (to initiate a VPN connection).
  8. Enter your OpenVPN server password when prompted.

    image

Manual Installation and Configuration in Windows

Prerequisites

You need the following to successfully install, configure and run your OpenVPN client in Windows:

  • A working server configuration.

  • A valid client certificate.

  • The free OpenVPN client, which can be downloaded from https://openvpn.net/vpn-client/

  • A Windows workstation with Internet access

  • Windows Administrator privileges (required to install and run the OpenVPN software)

Installing the OpenVPN Client

  1. Log in to Windows as an administrator.

  2. Download the OpenVPN client software.

  3. Start the installer and follow the on-screen instructions.

Extract the OpenVPN Configuration Files

  1. Log on to Windows (administrator privileges are required).

  2. Save the OpenVPN configuration pack to the location of your choice.

  3. Right click on the file and select Extract All as shown below.

    image

Testing the OpenVPN Connection

  1. Open the folder where your extracted the OpenVPN configuration pack.

  2. Right-click on the OpenVPN configuration file and select Start OpenVPN on this config file (administrator privileges are required).

    image

  3. Enter the credentials and certificate password as requested on screen.

  4. Minimize the window when your connection is up.

    OpenVPN Connection Up

Close the window to stop the OpenVPN connection.

OpenVPN Status & Logs

Checking the Status

  1. Log in to the AXS Guard appliance.

  2. Navigate to VPN > OpenVPN > Status.

    OpenVPN Status

Accessing the OpenVPN Logs

  1. Log in to the AXS Guard appliance.

  2. Navigate to VPN > OpenVPN > Logs.

  3. Select the desired log type (server or config).

    OpenVPN Logs

  4. Click on the desired date to view the log entries.

Type Description
Server Logs The OpenVPN server logs contain detailed information about VPN server events, such as client connection details, encryption and authentication. They allow you to analyze and troubleshoot client connectivity.
Config Logs The config logs contain useful information about OpenVPN client connect events. See the context-sensitive help on your AXS Guard appliance for additional information.

Troubleshooting

The OpenVPN service fails to start

If another service on your appliance is already using port 443, the service will not start. In that case, you must change the port number.

AXS Guard services that also use port 443:

  • The Reverse Proxy server (HTTPS & RDG)

  • The Webmail server

Contact Able Support if you need to change your Webmail service port.

The connection to the OpenVPN server is successful, but I cannot connect to the corporate LAN

Windows requires administrator privileges to execute some functions in the OpenVPN software, such as adding network routes. Run the OpenVPN client as an administrator.

The OpenVPN client indicates that the route addition failed using CreateIpForwardEntry

Run the VPN client as an administrator.

The OpenVPN client indicates that the user cannot write to the log folder

Run the VPN client as an administrator.

Authenticating without providing a certificate password.

Important

This is possible, but not recommended. The certificate passphrase protects your certificate when it’s copied from one location to another. It also prevents abuse in case it is intercepted or stolen by a third party and provides authentication if no other authentication method has been configured for the OpenVPN service.

This operation requires you to use the command line. Note that the openssl binary, which is needed to remove the certificate password, is not included with the OpenVPN client, so this method only works on a Linux machine or on a Windows machine where the cygnus or openssl package is installed. If a user insists on removing the password of the pkcs12 client certificate, use the following command:

openssl pkcs12 -in <name of .p12> -nodes -out file.pem

Put this file in C:\Program Files\OpenVPN\config. Then modify the ovpn config file as follows:

  • Remove:

    pkcs12 <name of cert>

  • And add:

    ca file.pem
    cert file.pem
    key file.pem
I see an "Auth Username/Password was not provided by peer" error in the logs.

Delete the current OpenVPN client configuration and export the original OpenVPN client configuration again on the client.

I'm seeing comp-lzo warnings in the logs.

Compression must be configured the same on the client and the server side. If there is a mismatch, the server and client log files will show the following messages:

WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'

Bad compression stub decompression header byte: 102

Bad LZO decompression header byte: 69

IP packet with unknown IP version=15 seen

Allowing compression is not recommended, because a recent discovery revealed it is possible to collect information about an encrypted VPN tunnel's contents in very specific circumstances, if an attacker has the ability to capture the encrypted data packets while a certain type of data is transferred through the VPN tunnel.

System administrators should disable this option ASAP and distribute new OpenVPN configuration files.

No common cipher between server and client.

When deprecated ciphers are disabled (recommended) and an old OpenVPN client connects to the AXS Guard OpenVPN server, using an old client configuration, the server logs will contain one of the following entries:

PUSH: No common cipher between server and client. Server data-ciphers: 'AES-256-GCM:AES-128-GCM:AES-128-CBC', client supports cipher 'AES-256-CBC'

PUSH: No common cipher between server and client. Server data-ciphers: 'AES-256-GCM:AES-128-GCM', client supports cipher 'AES-128-CBC'

PUSH: No common cipher between server and client. Server data-ciphers: 'AES-256-GCM:AES-128-GCM', client supports cipher 'BF-CBC'

  1. Upgrade your OpenVPN clients to the latest version.
  2. Disable deprecated ciphers ASAP.
  3. Distribute new OpenVPN configuration files to your clients.

Support

If you encounter a problem

If you encounter a problem with AXS Guard, follow the steps below:

  1. Check the troubleshooting section of the feature-specific manual.

  2. Check the knowledge base on this site for information about special configurations.

  3. If no solution is available in any of the above sources, contact your AXS Guard vendor.

Contact Information

(+32) 15-504-400
support@axsguard.com