mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-28 08:49:42 -05:00
Clean up text and fix formatting (closes #162)
This commit is contained in:
parent
9b2ce97fe8
commit
a0bee729e1
@ -68,7 +68,8 @@ Using a ProxyVM to set up a VPN client gives you the ability to:
|
|||||||
|
|
||||||
If your choice of template VM doesn't already have the `openvpn` package, you'll need to install it in the template first. You may also need to `systemctl disable` any openvpn service that comes with the package if you follow the instructions for autostart below.
|
If your choice of template VM doesn't already have the `openvpn` package, you'll need to install it in the template first. You may also need to `systemctl disable` any openvpn service that comes with the package if you follow the instructions for autostart below.
|
||||||
|
|
||||||
2. Setup openvpn:
|
2. Set up OpenVPN.
|
||||||
|
|
||||||
Copy your openvpn config files to `/rw/config/openvpn/` folder. The example main config file is `openvpn-client.ovpn`.
|
Copy your openvpn config files to `/rw/config/openvpn/` folder. The example main config file is `openvpn-client.ovpn`.
|
||||||
|
|
||||||
It should have one line that reads `dev tun`.
|
It should have one line that reads `dev tun`.
|
||||||
@ -78,13 +79,15 @@ Using a ProxyVM to set up a VPN client gives you the ability to:
|
|||||||
NOTE: If the connection breaks down all traffic will by default be routed through the upstream network device eth0 (we will stop this with iptables in step 3).
|
NOTE: If the connection breaks down all traffic will by default be routed through the upstream network device eth0 (we will stop this with iptables in step 3).
|
||||||
|
|
||||||
Also add the following to accomodate a DNS script:
|
Also add the following to accomodate a DNS script:
|
||||||
```
|
|
||||||
|
~~~
|
||||||
script-security 2
|
script-security 2
|
||||||
up 'qubes-vpn-handler.sh up'
|
up 'qubes-vpn-handler.sh up'
|
||||||
down 'qubes-vpn-handler.sh down'
|
down 'qubes-vpn-handler.sh down'
|
||||||
```
|
~~~
|
||||||
|
|
||||||
3. Set up iptables.
|
3. Set up iptables.
|
||||||
|
|
||||||
Edit the firewall script with `sudo nano /rw/config/qubes-firewall-user-script` and add:
|
Edit the firewall script with `sudo nano /rw/config/qubes-firewall-user-script` and add:
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
@ -161,7 +164,8 @@ Using a ProxyVM to set up a VPN client gives you the ability to:
|
|||||||
Now save the script and make it executable:
|
Now save the script and make it executable:
|
||||||
`sudo chmod +x /rw/config/openvpn/qubes-vpn-handler.sh`
|
`sudo chmod +x /rw/config/openvpn/qubes-vpn-handler.sh`
|
||||||
|
|
||||||
5. Setup the VPN's autostart:
|
5. Set up the VPN's autostart.
|
||||||
|
|
||||||
Use `sudo nano /rw/config/rc.local` to edit and add:
|
Use `sudo nano /rw/config/rc.local` to edit and add:
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
@ -181,3 +185,4 @@ Using a ProxyVM to set up a VPN client gives you the ability to:
|
|||||||
![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png)
|
![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png)
|
||||||
|
|
||||||
8. Optionally, you can install some [custom icons](https://github.com/Zrubi/qubes-artwork-proxy-vpn) for your VPN
|
8. Optionally, you can install some [custom icons](https://github.com/Zrubi/qubes-artwork-proxy-vpn) for your VPN
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user