DEFINING TUNNELS
MultiConnect
®
rCell 100 MTR-LTE User Guide 59
d. Remote Host (server public IP address).
e. Remote Port number.
f. LZO Compression as ADAPTIVE from the drop-down.
g. Enter the contents of the following files generated from the easy-rsa tool. You can copy and paste
this content from the certificate files after opening from a text editor like Notepad. (all required):
i. CA PEM (.crt)
ii. Client Certificate PEM (.crt)
iii. Client Key PEM (.key)
h. Click Next.
8. If you use TLS as Authorization Mode, you do not need configure or add Remote Network Routes. The
server adds the routes if the server's Push Routes are already configured. If you use Static Key as
Authorization Mode, you must add and configure Remote Network Routes.
9. Click Next.
10. The system displays the Configuration Preview window (read-only).
11. Click Finish.
12. Click Save and Restart to save your changes.
Now the device client can access the device server subnet. You can ping the IP address of the device server subnet
from the client console to test this.
Note: The PC connected to the device does not have access to the device server subnet.
Configuration 2: OpenVPN Tunnel with TLS Authorization Mode (Device and Connected PC)
This second configuration provides access between a device server and its subnet and device client and its subnet.
An additional configuration is needed on the device server side. This also allows your PC to connect with the device
server and ultimately to the device client through that server.
1. Configure the device server as shown under how to add an OpenVPN Server using TLS (steps 1-14).
2. Open device console, go to /var/config/ovpnccd/openVPNServerName. Create the folder if not present
in the device.
3. Create a file that has the client certificate name with the following information:
a. iroute [Client_Subnet] [Mask]
b. example -- echo “iroute 192.168.3.0 255.255.255.0” > mtrClient1
4. For each client, you must create a separate file in the folder /var/config/ovpnccd/yourserverName.
Note: Make the file name the same as the Common Name value used to create the certificate.
5. Configure device client as shown under how to add an OpenVPN Client (steps 1-12).
Once properly configured, you should have a connection between the device server and device client and their
subnets. Your PC can also connect with the device server and thus the device client through that server.
Configuration 3: OpenVPN Tunnel with Static Key Authorization Mode (device server and client)
This third configuration establishes the OpenVPN Tunnel connection from a device client to a device server using
Static Key as Authorization Mode. This involves adding and configuring both OpenVPN Server and Client sides
within the device UI.