To successfully configure a VPN connection you need to know a few things about the server side.
I don't known about yours, but mine give to the clients two files: a configuration file and a PKSC#12 file. Using it on command line looks like this:
Code:
openvpn --config myvpn.ovpn --script-security 2
On the config file there are settings for the type of vpn connection (TLS, password based, static keys, etc), if it uses a TUN or TAP interface, if it runs over TCP or over UDP (most common case), the MTU, the port on the remote end (where the server is listening to), what cypher is used to encrypt the data, and what kind of compression is used. The config file has the name of the PKCS#12 file too. The p12 file have the certificates for CA, for the user and the key used to cypher/protect this data.
If you are trying with NetworkManager-openvpn module it is easy (kind of) to fill the blanks when you setup a new VPN connection. You must fill the fields on the main window and the General and Security tabs on the Advanced window. They are all the above and you need to get the details with your system administrator.
Start with the command line as root using the config file and the PKCS#12 file.
When using Network Manager there are issues due to constrains imposed by SELinux. For test purpose only - disable SELinux and re-enable and fix it later.
Of course, I suppose your openVPN is TLS based. If is not, I am afraid I can't help much more, since I don't have any experience with static keys and password based is too insecure to anyone use it in nowadays.
I started a
thread about his subject a while ago in this same forum about using NM-opvn and Zerina/Smoothwall server.
I hope this can help you.