OpenVPN Access Server On Redhat Quick Start

2

Install ‘openvpn-as’ package

3

Set password for bootstrapped user: ‘passwd openvpn’

5

Set up in browser: https://[youripaddress]:943/admin (browser setup found here)

Setting up and deploying OpenVPN Access Server on RedHat

Beginning with Access Server 2.7.5, you can install Access Server software packages and the related Connect Client software through our official OpenVPN Access Server software repository. We recommend using the repository as it is a standardized and reliable method for delivering new versions and upgrading existing deployments. It provides you with more security, an industry-standard delivery method, easier upgrades, added flexibility, and an improved user experience. Here’s your quick start guide to rapidly deploy a VPN remote access solution for your business.

The following will give you helpful information about the benefits of OpenVPN Access Server as well as installation instructions. For more, read an overview of OpenVPN Access Server.

Using OpenVPN Access Server on RedHat

There are so many benefits for businesses of providing a VPN. Here are five important ones for you when you deploy OpenVPN Access Server as your VPN on your RedHat servers:

  • You greatly reduce your cyber risks. Providing your employees with a private, secure network, wherever they are, is a big step in increasing your cyber security.
  • You increase employee’s productivity by giving them the ability to connect from anywhere, securely accessing the work network.
  • You show customers and clients that you’re committed to security, especially if your business data includes collecting any of their data.
  • Licenses for Access Server are a low cost that gives your business an affordable security tool. When you add it to a layered approach that includes other tools and practices, you’re managing your cyber security well.
  • Global employees won’t be restricted by any countries that restrict access. Instead, they’ll be connecting through your company’s network and IP.

Use Case Examples for Access Server with RedHat

Configuring Access Server as your RedHat VPN can provide your business with the ability to accomplish many secure use cases such as:

  1. Remote monitoring of worldwide locations
  2. Secure access for transactions through the cloud
  3. Secure access to private enterprise networks on the cloud or on premises
  4. End to end encryption
  5. Blocking unauthorized access
  6. Improving mobile workforce productivity
  7. Extending your Unified Threat Management to remote employees
  8. Providing a secure layer for accessing internal, unprotected applications

Keep your employees work secure through OpenVPN Access Server, which keeps your company safe.

We provide you with next gen secure and scalable communication services. Our award-winning open source protocol is the industry standard for virtual private networks. Put our legacy to work for your business security.

Setting up OpenVPN Access Server on RedHat

OpenVPN Access Server fits seamlessly with RedHat. The repository provides you with the following three components: the popular OpenVPN open-source software; a user-friendly and intuitive admin web interface; and Connect Clients for Android, iOS, Windows, macOS, and Linux. Once set up, deploying VPN clients is simple.

Follow this high level overview to set up OpenVPN Server and OpenVPN Access Server Admin Web UI. More details, if necessary, can be found with the links in the Further Resources section below. Detailed instructions are included in the OpenVPN Documentation section and Installing OpenVPN Access Server on a Linux system, specifically.

1) Get Updates

Begin by logging on to your Linux system on the console or via SSH with root privileges.

Download and install updates:

yum update

If you do not already have ‘net-tools’ installed, we recommend doing so. Access Server relies on ifconfig to function. The ‘net-tools’ package provides ifconfig.

To install ‘net-tools’:

yum install net-tools

2) Install OpenVPN Access Server via repository

Copy and paste these commands and execute them with root privileges. They will add the repository to your system.


yum -y install https://as-repository.openvpn.net/as-repo-centos7.rpm
yum -y install openvpn-as

4) Configure Settings

The Access Server Admin Web Interface provides an intuitive tool to manage settings for OpenVPN Access Server. Within the configuration menu, you can manage licenses, TLS settings, network settings, VPN settings, advanced VPN settings, web server, client settings, and fallover.

Helpful tips for configuration settings:
The following may be helpful configuration settings:

  1. To reach OpenVPN Access Server via the internet, set the Hostname or IP address to one facing the public internet.
  2. The default subnet for OpenVPN Access Server’s internal DHCP system is 172.27.224.0/20. This may be changed to a subnet that better fits your network.
  3. The routing section provides the option to push certain routes to networks accessed via the server to remote clients.
  4. Forwarding client internet traffic through the OpenVPN Access Server is a toggleable option.
  5. Settings can be changed per client from within user permissions.

5) Connect Client

To access a connect client via web browser, use the address below by replacing “openvpnasip” with the IP allocated to your openvpn-as instance:

https://openvpnasip/

Users have two options:

  1. Connect to the VPN: the user connects directly to the VPN through their web browser.
  2. Login to the Connect Client: they can download their user configuration files (client.ovpn) and use them to connect to the VPN with other OpenVPN Clients.

Helpful Linux and RedHat Tips

  • OpenVPN Access Server is not compatible with any version below the 2.1 OpenVPN community/Linux client.
  • Successfully running the Linux commands here requires that they are executed with root privileges logged in as a root user or sudo up
  • When connecting to the Admin web interface for the first time, you’ll likely see a big message about the site’s security certificate not trusted. This is because the server has a self-signed certificate so you will need to bypass this error.
  • If you’re installing a system manually from scratch, make sure the time and date on your RedHat server are correct. Access Server generates certificates with both a start and expiration date, using the system time and date. If needed, install a Network Time Protocol (NTP) client program on the server to correctly and automatically sync the time.
  • For configuring an Access Server without internet access, it requires contacting the OpenVPN team for an offline activation procedure
  • If you experience slowness with the web interface or attempting license key activation, check that DNS resolution is working as expected (e.g.: pinging www.google.com should resolve this to an IP address)
  • The ovpn-init tool can be used to wipe all OpenVPN Access Server configurations with the -force option in case you make a mistake during initial setup. However, don’t use it unless you’re sure you want to delete all configuration and certificates to start over.

Sign Up For License Keys

Join OpenVPN to sign up for license keys to test drive Access Server VPN software package for Redhat

Request More Information

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement