OpenVPN Files Download
Both the configuration and credential file can be downloaded from the configuration page of the 1NCE Portal.
This section provides a general description of the tunnel interface of the VPN Service as well as an overview of the configuration and credential files. For setup and testing guides for different operating systems, please refer to the VPN Setup Guide.
Connecting the VPN client on PC or server creates a separate tunnel network interface. All mobile originated and mobile terminated data traffic is sent through this tunnel interface and will be routed according to the destination IP address. When using the 1NCE VPN Service, the device with the 1NCE SIM can reach the customer VPN endpoint by addressing the static IP of the client application. In the other way, the application server can reach each individual device by addressing the static IP of the SIM. For opening or pinging a server to SIM device connection it is important that the SIM is attached to the network and the device modem has an active PDP data session open.
When downloading the VPN configuration file (see extract below), two different file formats for Windows and Linux are available. The content of both files is almost identical. The only difference is the
auth-user-pass entry in the file. This line points the VPN client towards the
credentials.txt file for authenticating the user on the VPN server. The default path is different for the two operating systems but can be changed to the specific of the operating system or VPN client. The
remote address and port of the VPN server should not be changed. It has to be ensured that both the domain address and the given port are configured in any firewall or access system to allow a connection towards the 1NCE VPN server. The table below shows the default config provided by 1NCE. Some parameters can be adapted (✔) while others should be not changed (❌). 1NCE does not recommend changing or altering the default configuration and does not guarantee that changes in the configuration will provide the expected connectivity.
|Config Parameter||Default Value||Customizable|
Indicates that the
Virtual network device set to Tunnel (TUN), simulates a network layer device and operates with layer 3 IPv4 and IPv6 packets. Tunnel interface name can be changed to
Protocol setting for communicating with remote host.
Remote host name or IP address.
If hostname resolve fails for –remote, retry resolve for n seconds before failing.
Do not bind to local address and port. The IP stack will allocate a dynamic port for returning packets.
Send server an exit notification if tunnel is restarted or OpenVPN process is exited. Number of attempts that the client will try to resend the exit notification.
Simplification of –ping and –ping-restart. Checks the current connection state by ICMP PING. Settings are
Change the user ID of the OpenVPN process after initialization, dropping privileges in the process. This option is useful to protect the system in the event that some hostile party was able to gain control of an OpenVPN session. This is option only included in the
Optional group to be owner of this tunnel. This is option only included in the
Don't re-read key files across SIGUSR1 or --ping-restart.
Don't close and reopen TUN/TAP device or run up/down scripts across SIGUSR1 or --ping-restart restarts.
Require that peer certificate was signed with an explicit key usage and extended key usage based on RFC3280 TLS rules.
Set output verbosity. Level 3 is recommended if you want a good summary of what’s happening without being swamped by output.
VPN client will not cache the username and password needed for authentication in virtual memory. This will prevent the log entry "WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this" upon connection establishment.
Authenticate with server using username/password from a file containing username/password on 2 lines.
Controls how OpenVPN responds to username/password verification errors such as the client-side response to an AUTH_FAILED message from the server or verification failure of the private key password.
Optional parameter Maximum Transmission Units. In most cases, leave this parameter set to its default value. In case of issues with HTTPS or SSH connections, try lowering this value.
Certificates included in the config file.
More information about the configuration options can be found in the OpenVPN Reference Manual.
If detailed logging is setup for the OpenVPN client, the following warning might appear when the OpenVPN client is started:
WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this.
This warning can be avoided by adding the
auth-nocache parameter into the OpenVPN client configuration file. This should usually have no side affects, nevertheless the official documentation states:
“If specified, this directive will cause OpenVPN to immediately forget username/password inputs after they are used. As a result, when OpenVPN needs a username/password, it will prompt for input from
stdin, which may be multiple times during the duration of an OpenVPN session.“
credentials.txt file downloaded from the CMP (see extract below) contains a user id as username and an access token as password for the 1NCE VPN server. The content of this file does not need to be modified. The location of this file needs to be set in the VPN Config File
Updated about 1 month ago