1 #############################
3 #############################
8 ## (has to be unique for each client)
11 ## device type tun = ip/ipv6, tap = ethernet
14 ## payload encryption algorithm
21 ## message authentication algorithm
25 ##message auth tag length
29 ## this is used to generate the crypto-key and salt
30 ## this should be al least 30 characters
31 passphrase Creating_VPN_Tunnels_With_Anytun_Is_Easy
33 ## The remote host and port
34 remote-host example.com
37 #############################
39 #############################
41 ## don't run in background
44 ## additional log to standard output with a level of 5
48 #############################
50 #############################
52 ## log to syslog with a level of 3
53 log syslog:3,anytun-client1,daemon
55 ## change user and group after init
59 ## chroot to users home directory
60 #chroot /var/run/anytun
62 ## key derivation pseudo random function
69 ## local ip address to bind to (for tunnel data)
70 ## (if you run an anycast cluster this has to be the anycast ip address)
71 #interface <ip-address>
73 ## local port to bind to (for tunnel data)
74 ## make sure to use a different port for every server and client!
80 ## Automaticaly configure the interface an set a route
82 ## We highly recommend the use of the post up script to do this
84 ## the address hast to be supplied in CIDR notation
85 #ifconfig <local>/<prefix length>
87 ## Manually set encryption key and salt
88 ## (this replaces the passphrase)
89 #key 0123456789ABCDEF0123456789ABCDEF
90 #salt 0123456789ABCD0123456789ABCD
92 ## Setting a window size > 0 will enable replay protection
93 ## This most likely will only work with external rekeying