$("#ray_8448").html("\n
1<\/a>
2<\/a>
3<\/a>
4<\/a>
5<\/a>
6<\/a>
7<\/a>
8<\/a>
9<\/a>
10<\/a><\/strong>
11<\/a>
12<\/a>
13<\/a>
14<\/a>
15<\/a>
16<\/a>
17<\/a>
18<\/a>
19<\/a>
20<\/a><\/strong>
21<\/a>
22<\/a>
23<\/a>
24<\/a>
25<\/a>
26<\/a>
27<\/a>
28<\/a>
29<\/a>
30<\/a><\/strong>
31<\/a>
32<\/a>
33<\/a>
34<\/a>
35<\/a>
36<\/a>
37<\/a>
38<\/a>
39<\/a>
40<\/a><\/strong>
41<\/a>
42<\/a>
43<\/a>
44<\/a>
45<\/a>
46<\/a>
47<\/a>
48<\/a>
49<\/a>
50<\/a><\/strong>
51<\/a>
52<\/a>
53<\/a>
54<\/a>
55<\/a>
56<\/a>
57<\/a>
58<\/a>
59<\/a>
60<\/a><\/strong>
61<\/a>
62<\/a>
63<\/a>
64<\/a>
65<\/a>
66<\/a>
67<\/a>
68<\/a>
69<\/a>
70<\/a><\/strong>
71<\/a>
72<\/a>
73<\/a>
74<\/a>
75<\/a>
76<\/a>
77<\/a>
78<\/a>
79<\/a>
80<\/a><\/strong>
81<\/a>
82<\/a>
83<\/a>
84<\/a>
85<\/a>
86<\/a>
87<\/a>
88<\/a>
89<\/a>
90<\/a><\/strong>
91<\/a>
92<\/a>
93<\/a>
94<\/a>
95<\/a>
96<\/a>
97<\/a>
98<\/a>
99<\/a>
100<\/a><\/strong>
101<\/a>
102<\/a>
103<\/a>
104<\/a>
105<\/a>
106<\/a>
107<\/a>
108<\/a>
109<\/a>
110<\/a><\/strong>
111<\/a>
112<\/a><\/pre><\/td>\n  
# Certain Windows-specific network settings<\/span>
<\/span># can be pushed to clients, such as DNS<\/span>
<\/span># or WINS server addresses.  CAVEAT:<\/span>
<\/span># http://openvpn.net/faq.html#dhcpcaveats<\/span>
<\/span># The addresses below refer to the public<\/span>
<\/span># DNS servers provided by opendns.com.<\/span>
<\/span>;push dhcp-option DNS 208.67.222.222<\/span>
<\/span>;push dhcp-option DNS 208.67.220.220<\/span>

<\/span># Uncomment this directive to allow different<\/span>
<\/span># clients to be able to "see" each other.<\/span>
<\/span># By default, clients will only see the server.<\/span>
<\/span># To force clients to only see the server, you<\/span>
<\/span># will also need to appropriately firewall the<\/span>
<\/span># server\'s TUN/TAP interface.<\/span>
<\/span>;client-to-client<\/span>

<\/span># Uncomment this directive if multiple clients<\/span>
<\/span># might connect with the same certificate/key<\/span>
<\/span># files or common names.  This is recommended<\/span>
<\/span># only for testing purposes.  For production use,<\/span>
<\/span># each client should have its own certificate/key<\/span>
<\/span># pair.<\/span>
<\/span>#<\/span>
<\/span># IF YOU HAVE NOT GENERATED INDIVIDUAL<\/span>
<\/span># CERTIFICATE/KEY PAIRS FOR EACH CLIENT,<\/span>
<\/span># EACH HAVING ITS OWN UNIQUE "COMMON NAME",<\/span>
<\/span># UNCOMMENT THIS LINE OUT.<\/span>
<\/span>;duplicate-cn<\/span>

<\/span># The keepalive directive causes ping-like<\/span>
<\/span># messages to be sent back and forth over<\/span>
<\/span># the link so that each side knows when<\/span>
<\/span># the other side has gone down.<\/span>
<\/span># Ping every 10 seconds, assume that remote<\/span>
<\/span># peer is down if no ping received during<\/span>
<\/span># a 120 second time period.<\/span>
<\/span>keepalive 10 120<\/span>

<\/span># For extra security beyond that provided<\/span>
<\/span># by SSL/TLS, create an "HMAC firewall"<\/span>
<\/span># to help block DoS attacks and UDP port flooding.<\/span>
<\/span>#<\/span>
<\/span># Generate with:<\/span>
<\/span>#   openvpn --genkey --secret ta.key<\/span>
<\/span>#<\/span>
<\/span># The server and each client must have<\/span>
<\/span># a copy of this key.<\/span>
<\/span># The second parameter should be \'0\'<\/span>
<\/span># on the server and \'1\' on the clients.<\/span>
<\/span>;tls-auth ta.key 0 # This file is secret<\/span>

<\/span># Select a cryptographic cipher.<\/span>
<\/span># This config item must be copied to<\/span>
<\/span># the client config file as well.<\/span>
<\/span>;cipher BF-CBC        # Blowfish (default)<\/span>
<\/span>;cipher AES-128-CBC   # AES<\/span>
<\/span>;cipher DES-EDE3-CBC  # Triple-DES<\/span>
<\/span>cipher AES-256-CBC<\/span>

<\/span># Enable compression on the VPN link.<\/span>
<\/span># If you enable it here, you must also<\/span>
<\/span># enable it in the client config file.<\/span>
<\/span>comp-lzo<\/span>

<\/span># The maximum number of concurrently connected<\/span>
<\/span># clients we want to allow.<\/span>
<\/span>;max-clients 100<\/span>

<\/span># It\'s a good idea to reduce the OpenVPN<\/span>
<\/span># daemon\'s privileges after initialization.<\/span>
<\/span>#<\/span>
<\/span># You can uncomment this out on<\/span>
<\/span># non-Windows systems.<\/span>
<\/span>user nobody<\/span>
<\/span>group nogroup<\/span>

<\/span># The persist options will try to avoid<\/span>
<\/span># accessing certain resources on restart<\/span>
<\/span># that may no longer be accessible because<\/span>
<\/span># of the privilege downgrade.<\/span>
<\/span>persist-key<\/span>
<\/span>persist-tun<\/span>

<\/span># Output a short status file showing<\/span>
<\/span># current connections, truncated<\/span>
<\/span># and rewritten every minute.<\/span>
<\/span>status openvpn-status.log<\/span>

<\/span># By default, log messages will go to the syslog (or<\/span>
<\/span># on Windows, if running as a service, they will go to<\/span>
<\/span># the "\\Program Files\\OpenVPN\\log" directory).<\/span>
<\/span># Use log or log-append to override this default.<\/span>
<\/span># "log" will truncate the log file on OpenVPN startup,<\/span>
<\/span># while "log-append" will append to it.  Use one<\/span>
<\/span># or the other (but not both).<\/span>
<\/span>;log         openvpn.log<\/span>
<\/span>;log-append  openvpn.log<\/span>

<\/span># Set the appropriate level of log<\/span>
<\/span># file verbosity.<\/span>
<\/span>#<\/span>
<\/span># 0 is silent, except for fatal errors<\/span>
<\/span># 4 is reasonable for general usage<\/span>
<\/span># 5 and 6 can help to debug connection problems<\/span>
<\/span># 9 is extremely verbose<\/span>
<\/span>verb 3<\/span>

<\/span># Silence repeating messages.  At most 20<\/span>
<\/span># sequential messages of the same message<\/span>
<\/span># category will be output to the log.<\/span>
<\/span>;mute 20<\/span><\/pre><\/td>\n<\/tr><\/table>\n\n");