These notes describe how to use the OpenVPN-based Virtual Private Network provided by SC Lab. With it:
If you asked for a fixed ip address, Bob will tell you it (it will have the form 10.160.81.x)
One additional issue: openvpn uses ICMP for signalling, more broadly than some firewalls allow by default. If you can't get our VPN to work, or your connection keeps dropping out, you may need to open ICMP more broadly to get a stable connection (if this is the cause of the problems, you should be able to see ICMP packets being blocked from tun0 in your logs). If you do so, you should restrict the opening as above, to addresses in our VPN range (10.160.80.0 to 10.160.81.255) on the VPN interface (tun0). Opening ICMP risks ICMP flood attacks, but it's unlikely that they would originate in our VPN, so it should be safe so long as you only open the port to the VPN.
(With a GUI version in MS Windows, you can open the tunnel by right-clicking the config file or a tray icon on a taskbar)
route-method exe route-delay 2
Please note that this configuration uses the https port 443, rather than the proper vpn port, 1194. This means you can be very confident that it won't be blocked, wherever you are using it from (and if you're behind a proxy, the proxy will almost certainly pass it too). NAT should also not cause any problems. You will need to change the lines:
ca /Users/rim/Library/openvpn/certs/ca.crt cert /Users/rim/Library/openvpn/certs/bobsmac.crt key /Users/rim/Library/openvpn/keys/bobsmac.key
or on MSW
ca PATH-TO-CERTS\\ca.crt cert PATH-TO-CERTS\\bobsmac.crt key PATH-TO-KEYS\\bobsmac.key ;user nobody ;group nobody
Useful vpn addresses:
10.160.81.65 sc 10.160.80.1 sc1