Автор: tankistua
Дата сообщения: 11.12.2010 12:06
		на 7-ке и 2008-м надо чтобы сервис запускался правой кнопкой мыши - запустить от имени администратора. Иначе таблицу роутинга система изменить не дает. 
  
 если тебе надо просто запустить в сетку клиентов, то посмотри в сторону бриджинга 
 [more] 
  
 # Which TCP/UDP port should OpenVPN listen on? 
 # If you want to run multiple OpenVPN instances 
 # on the same machine, use a different port 
 # number for each one.  You will need to 
 # open up this port on your firewall. 
 port 443 
  
 # TCP or UDP server? 
 proto tcp-server 
  
 # "dev tun" will create a routed IP tunnel, 
 # "dev tap" will create an ethernet tunnel. 
 # Use "dev tap0" if you are ethernet bridging 
 # and have precreated a tap0 virtual interface 
 # and bridged it with your ethernet interface. 
 # If you want to control access policies 
 # over the VPN, you must create firewall 
 # rules for the the TUN/TAP interface. 
 # On non-Windows systems, you can give 
 # an explicit unit number, such as tun0. 
 # On Windows, use "dev-node" for this. 
 # On most systems, the VPN will not function 
 # unless you partially or fully disable 
 # the firewall for the TUN/TAP interface. 
 dev tap 
  
 # SSL/TLS root certificate (ca), certificate 
 # (cert), and private key (key).  Each client 
 # and the server must have their own cert and 
 # key file.  The server and all clients will 
 # use the same ca file. 
 # 
 # See the "easy-rsa" directory for a series 
 # of scripts for generating RSA certificates 
 # and private keys.  Remember to use 
 # a unique Common Name for the server 
 # and each of the client certificates. 
 # 
 # Any X509 key management system can be used. 
 # OpenVPN can also use a PKCS #12 formatted key file 
 # (see "pkcs12" directive in man page). 
 ca      keys_bridging/ca.crt 
 cert    keys_bridging/server.crt 
 key     keys_bridging/server.key  # This file should be kept secret 
  
 # Diffie hellman parameters. 
 # Generate your own with: 
 #   openssl dhparam -out dh1024.pem 1024 
 # Substitute 2048 for 1024 if you are using 
 # 2048 bit keys.  
 dh      keys_bridging/dh1024.pem 
  
 # Configure server mode for ethernet bridging. 
 # You must first use your OS's bridging capability 
 # to bridge the TAP interface with the ethernet 
 # NIC interface.  Then you must manually set the 
 # IP/netmask on the bridge interface, here we 
 # assume 10.8.0.4/255.255.255.0.  Finally we 
 # must set aside an IP range in this subnet 
 # (start=10.8.0.50 end=10.8.0.100) to allocate 
 # to connecting clients.  Leave this line commented 
 # out unless you are ethernet bridging. 
  
 ifconfig 192.168.100.90 255.255.255.0 
 server-bridge 192.168.100.10 255.255.255.0 192.168.100.91 192.168.11.99 
  
 # To assign specific IP addresses to specific 
 # clients or if a connecting client has a private 
 # subnet behind it that should also have VPN access, 
 # use the subdirectory "ccd" for client-specific 
 # configuration files (see man page for more info). 
 client-config-dir ccd_bridging 
  
 # Uncomment this directive to allow different 
 # clients to be able to "see" each other. 
 # By default, clients will only see the server. 
 # To force clients to only see the server, you 
 # will also need to appropriately firewall the 
 # server's TUN/TAP interface. 
 client-to-client 
  
 # The keepalive directive causes ping-like 
 # messages to be sent back and forth over 
 # the link so that each side knows when 
 # the other side has gone down. 
 # Ping every 10 seconds, assume that remote 
 # peer is down if no ping received during 
 # a 120 second time period. 
 keepalive 10 120 
  
 # For extra security beyond that provided 
 # by SSL/TLS, create an "HMAC firewall" 
 # to help block DoS attacks and UDP port flooding. 
 # 
 # Generate with: 
 #   openvpn --genkey --secret ta.key 
 # 
 # The server and each client must have 
 # a copy of this key. 
 # The second parameter should be '0' 
 # on the server and '1' on the clients. 
 tls-auth keys_bridging/ta.key 0 
  
 # Enable compression on the VPN link. 
 # If you enable it here, you must also 
 # enable it in the client config file. 
 comp-lzo 
  
 # It's a good idea to reduce the OpenVPN 
 # daemon's privileges after initialization. 
 # 
 # You can uncomment this out on 
 # non-Windows systems. 
 user nobody 
 group nobody 
  
 # The persist options will try to avoid 
 # accessing certain resources on restart 
 # that may no longer be accessible because 
 # of the privilege downgrade. 
 persist-key 
 persist-tun 
  
 # Output a short status file showing 
 # current connections, truncated 
 # and rewritten every minute. 
 status          /var/log/openvpn_bridging-status.log 
  
 # By default, log messages will go to the syslog (or 
 # on Windows, if running as a service, they will go to 
 # the "\Program Files\OpenVPN\log" directory). 
 # Use log or log-append to override this default. 
 # "log" will truncate the log file on OpenVPN startup, 
 # while "log-append" will append to it.  Use one 
 # or the other (but not both). 
 log             /var/log/openvpn_bridging.log 
  
 # Set the appropriate level of log 
 # file verbosity. 
 # 
 # 0 is silent, except for fatal errors 
 # 4 is reasonable for general usage 
 # 5 and 6 can help to debug connection problems 
 # 9 is extremely verbose 
 verb 3 
 [/more] 
  
 и сделай в винде бридж из локального интерфейса и тар-а