Updated on 2025-05-14 GMT+08:00

openSUSE

Version Requirements

Table 1 lists the client versions supported by openSUSE.
Table 1 Version requirements

openSUSE Version

OpenSSL Version

OpenVPN Version

15.5

1.1.1

2.5 or later

Procedure

  1. Log in to the CentOS system as the root user and open the CLI.
  2. Configure Zypper repositories.

    1. Run the following command to back up the original configuration file of the system:

      mkdir /etc/zypp/repos.d/repo_bakmv /etc/zypp/repos.d/*.repo /etc

      /zypp/repos.d/repo_bak/mv /etc/zypp/repos.d/*.repo /etc/zypp/repos.d/repo_bak/

    2. Configure the image source.

      The image source configuration varies according to the client version. For details, see the Zypper repository configuration documents.

  3. Run the following command to check the version information:

    openvpn --version

    The following information is displayed:
    OpenVPN 2.5.6 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
    library versions: OpenSSL 1.1.1l  24 Aug 2021 SUSE release 150500.15.4, LZO 2.10
    • If the OpenVPN version is displayed, go to 4.
    • If no OpenVPN version is displayed, perform the following operations to install OpenVPN:
      1. Run the following command to install OpenVPN:

        zypper install openvpn

        If the following information is displayed, OpenVPN is successfully installed:
        Loading repository data...
        ...
        ...
        ...
        Continue? [y/n/v/...? shows all options] (y): y             # Enter y.
        ...
        ...
        ...
        (1/1) Installing: openvpn-2.5.6-150400.3.6.1.x86_64 ........................................[done]
      2. Run the following command again to check the version information:

        openvpn --version

        Information similar to the following is displayed:
        OpenVPN 2.5.6 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
        library versions: OpenSSL 1.1.1l  24 Aug 2021 SUSE release 150500.15.4, LZO 2.10

  4. Download the client configuration file on a Windows system.

    1. Log in to the management console.
    2. Click in the upper left corner and select the desired region and project.
    3. Click in the upper left corner, and choose Networking > Virtual Private Network.
    4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
    5. Click the P2C VPN Gateways tab, and click Download Client Configuration in the Operation column of the target VPN gateway.

      The downloaded client configuration file is client_config.zip.

  5. Decompress client_config.zip to a specified directory, for example, D:\.

    After the decompression, the client_config.ovpn and client_config.conf files are generated.

  6. Open the client_config.conf file using Notepad or Notepad++.
  7. Add the client certificate and private key to the file.

    Enter the client certificate content and the corresponding private key in between <cert></cert> and <key></key> tags, respectively.
    <cert>
    -----BEGIN CERTIFICATE-----
    Client certificate content
    -----END CERTIFICATE-----
    </cert>
    
    <key>
    -----BEGIN PRIVATE KEY-----
    Client private key
    -----END PRIVATE KEY-----
    </key>

  8. (Optional) Comment out disable-dco. Perform this step only when OpenVPN 2.5 or earlier is used.

    1. Press Ctrl+F to search for and locate disable-dco.
    2. Enter # in front of the line where disable-dco is located to comment out the line.
      ...
      ...
      # disable-dco
      ...
      ...

  9. Save the .conf configuration file.
  10. Upload the .conf configuration file to the openSUSE system using Xftp. In this example, the file is uploaded to the /opt/ directory.
  11. On openSUSE, run the following command to go to the directory where the client configuration file is stored:

    cd /opt/

  12. Run the following command to start the OpenVPN client and connect to the VPN gateway:

    openvpn --config /opt/openvpn_config_user-01.conf

    If the following information in bold is displayed, the OpenVPN connection is successfully established:

    2025-02-27 14:09:26 OpenVPN 2.5.6 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
    2025-02-27 14:09:26 library versions: OpenSSL 1.1.1l  24 Aug 2021 SUSE release 150500.15.4, LZO 2.10
    ...
    ...
    ...
    2025-02-27 14:09:28 Initialization Sequence Completed

  13. Run the following command to verify the connectivity:

    ping XX.XX.XX.XX

    XX.XX.XX.XX indicates the private IP address of the ECS to be connected. Replace it with the actual private IP address.

    If information similar to the following is displayed, the client can communicate with the ECS:

    64 bytes from XX.XX.XX.XX: icmp_seq=1 ttl=63 time=1.27 ms
    64 bytes from XX.XX.XX.XX: icmp_seq=2 ttl=63 time=1.36 ms
    64 bytes from XX.XX.XX.XX: icmp_seq=3 ttl=63 time=1.40 ms
    64 bytes from XX.XX.XX.XX: icmp_seq=4 ttl=63 time=1.29 ms
    64 bytes from XX.XX.XX.XX: icmp_seq=5 ttl=63 time=1.35 ms
    64 bytes from XX.XX.XX.XX: icmp_seq=6 ttl=63 time=1.52 ms