ось Centos 6.4
eth0 Link encap:Ethernet HWaddr 08:00:27:2D:F0:FC
inet addr:192.168.0.14 Bcast:192.168.0.255 Mask:255.255.255.0
tap0 Link encap:Ethernet HWaddr 46:B3:3B:FF:41:80
inet addr:10.10.10.1 Bcast:10.10.10.255 Mask:255.255.255.0
local 192.168.0.14
port 1194
proto tcp-server
dev tap
ca /etc/openvpn/ca.crt
cert /etc/openvpn/vpn.crt
key /etc/openvpn/vpn.key # This file should be kept secret
dh /etc/openvpn/dh1024.pem
mode server
ifconfig 10.10.10.1 255.255.255.0
ifconfig-pool 10.10.10.2 10.10.10.50
ifconfig-pool-persist /etc/openvpn/ipp.txt
push "route 192.168.0.14 255.255.255.0"
client-config-dir /etc/openvpn/ccd
#route 192.168.0.14 255.255.255.0
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 192.168.0.1"
keepalive 10 120
tls-server
tls-auth /etc/openvpn/ta.key 0 # This file is secret
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
comp-lzo
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
log openvpn.log
log-append openvpn.log
verb 3
mute 20
client
tls-client
dev tap
proto tcp
remote 192.168.0.14 1194
resolv-retry infinite
user nobody
group nobody
persist-key
persist-tun
ca C:\\Program Files\\OpenVPN\\config\\ca.crt
cert C:\\Program Files\\OpenVPN\\config\\kab34o.crt
key C:\\Program Files\\OpenVPN\\config\\kab34o.key
#ns-cert-type server
tls-auth C:\\Program Files\\OpenVPN\\config\\ta.key 1
log-append C:\\Program Files\\OpenVPN\\config\\openvpn.log
comp-lzo
ver 3
mute 20
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 1194 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
COMMIT
~