Secrets
In WinBox you can configure OpenVPN secrets in PPP -> Secrets, there you can click to + to create new user or you can use terminal with command /ppp secret
Authentication methods
Certificate-only authentication
When using certificate-only authentication, no PPP secrets are needed. Client authentication is handled entirely through certificates.
This method is enabled by setting require-client-certificate=yes on the OpenVPN server and not configuring any PPP secrets.
Advantages:
More secure (no password to compromise)
Easier to manage for small number of users
Certificate revocation is possible
Disadvantages:
Each client needs individual certificate
More complex initial setup
Certificate + Username/Password
This method combines certificate authentication with traditional username/password authentication.
Advantages:
Additional security layer
Easier user management
Can use same certificate for multiple users
Disadvantages:
Passwords can be compromised
More complex for users
Creating PPP secrets
Basic user configuration
Click on + to add new PPP secret
You will need to fill out:
Name - Username for the VPN connection
Password - User's password
Service - Select "ovpn"
Profile - Select appropriate VPN profile
Local Address - (Optional) Router's tunnel endpoint IP
Remote Address - (Optional) Specific IP for this user
Advanced user settings
For more control over individual users:
Routes - Static routes to be added when user connects
Rate Limit - Bandwidth limitation for the user
Comment - Description for the user
Assigning specific IP addresses
You can assign specific IP addresses to users:
User management
Disabling users
To temporarily disable a user without deleting:
Enabling users
To re-enable a disabled user:
Changing passwords
To update a user's password:
Multiple authentication profiles
Different user groups
Create different profiles for different user types:
Rate limiting per user type
Set different bandwidth limits for different user groups:
Security considerations
Password policy
Strong password requirements:
Minimum 12 characters
Mix of uppercase, lowercase, numbers, and symbols
Avoid dictionary words
Regular password changes
Certificate management
When using certificate + password authentication:
Each user should have unique certificate
Certificates should have reasonable expiration dates
Revoked certificates should be properly managed
Certificate common names should match usernames
Monitoring access
Check active connections and user activity:
Best practices
User account management
Regular audits - Review and remove unused accounts
Password rotation - Implement regular password changes
Access logging - Monitor and log all access attempts
Principle of least privilege - Give users minimum required access
Certificate management
Individual certificates - Each user should have unique certificate
Certificate expiration - Set appropriate validity periods
Revocation process - Have clear process for certificate revocation
Backup certificates - Securely backup CA and certificates
Troubleshooting authentication
Authentication failures:
Check username and password spelling
Verify user account is enabled
Check certificate validity and trust
Review server logs for detailed error messages
Connection issues:
Verify profile configuration
Check IP pool availability
Test network connectivity
Review firewall rules
Last updated
Was this helpful?