How to install and configure PPTPVPN in CentOSLinuxVPS

Many netizens use VPN or proxy when visiting some websites. This article references the methods for building PPTPVPN in OPENVZVPScentos. PPTPVPN is generally supported on the XEN virtual technology VPS. However, many VPS host vendors provide new

IPtables firewall usage skills

IPtables firewall usage tips: Recently, a small LINUX server was set up. because LINUX machines need to be used as soft routers, let's talk about the experience of using IPtables firewall. Iptables is very powerful. For example, IP forwarding and

How to install and use tcpdump

Among today's many hacking technologies, sniffer is the most common and important technology. Anyone who has used the sniffer tool on windows (for example, netxray and snifferpro) may know that in a shared Lan, using the sniffer tool can provide a

Use iptables to deploy the LAN environment

As a result of the project's needs, the network environment implemented by virtual machines, one of which serves as the bridge, all other machines are transitioned through the bridge, so it is implemented using the linux Iptablesnat function. The

Use iptables + tc to control traffic

On the eth0 server, the external address eth0: 192.168.1.223eth1 is set to the internal address eth1: 11920.2.1. the function to be implemented now is to limit the entire exit to 512 kbit (upload traffic ), download traffic of the 192.168.2 network

How to configure and disable iptables firewall in CentOS Linux

Comment: recently, when installing and configuring ORACLE databases in CentOSLinux, the system displays the failure of EM installation due to network ports. I plan to disable the firewall and see the configuration instructions of the firewall, it

CentOS Linux system information collection commands

The following are common viewing commands used by CentOS system. System # uname-a # View kernel/OS/CPU information # head-n1/etc/issue # View OS # cat/proc/cpuinfo # View CPU information # hostname # View computer name # lspci-TV # List all PCI

Use iptables in Linux to implement port forwarding

I have read a lot of articles about using Iptables to implement port forwarding, but I don't feel very clear about the problem. now I have joined my own setup and usage experience and talked about its implementation process. we have a computer with

Detailed description of IPsecVPN data transmission process

IPsecVPN data transmission process the following is a packet transmission process (such as ICMP packet) through the IPsecVPN tunnel ), when the PC in the subnet is protected by the VPN on the left to transmit data to the PC in the VPN on the right

Detailed usage of tcpdump

The F system only monitors the communication data packets of the host named hostname. The host name can be a local host or any computer on the network. The following command reads all the data sent by the host hostname: # The Command below the

Resin study notes

The most common method for setting automatic service startup is in rc. add a script similar to the following in local: # sshd/usr/local/sbin/sshd # proftpd/usr/local/sbin/proftpd # apache/home/apache/bin/apachectlstart #

Common rules for iptables learning

The following describes how to define a simple iptables rule: Step 1: clear all defined rules and user-defined rules # iptables-F # iptables-X # iptables-Z Step 2: set the default policy for security and aspect control, set all default policies to

Configure port 80 forwarding for local tomcat applications in Linux

Scenario: locally deploy tomcat to port 8080, and expect local access to port 80 to access local tomcat. Conclusion: The iptables tool in linux is used to implement port forwarding. Specifically for the current get root permission to execute

How to set up nat service and set tc traffic limit in Linux

The Internet environment is as follows: eth0 Internet ip address:. b. c. deth1 intranet ip1: 192.168.0.0/24 for the boss and bteth2 intranet ip2: 192.168.1.0/24 for me and csfans using linux for nat Command:

Don't talk about Hadoop. your data is not big enough.

Written by DontuseHadoopwhenyourdataisntthatbig ": ChrisStucchio, a data scientist with many years of experience, a postdoctoral fellow at the corang Research Institute of New York University, worked as a CTO of a startup company on a high-frequency

In-depth analysis of TCP connection established in Linux

TCP is a connection-oriented protocol. before sending data, any interaction must be completed based on the connection. This blog post discusses how to establish a connection. I open a port on the local machine, and telnet the port. after the

Collect common commands in Linux

Use a script to include these commonly used linux Network Operation Commands. #/Bin/sh # View http request headertcpdump-s1024-l-A-nhost192.168.9.56tcpdump-s1024-l-Asrc192.168.9.56ordst192.168.9.56sudotcpdump-A-s1492dstport8 Use a script to include

Common iptables commands

The instance disabling ssh port only allows remote ssh login on 192.168.62.1, and prohibit ssh # iptables-AINPUT-s192.168.62.1-ptcp from other computers? # Iptables-AINPUT-ptcp? Dport22-jDROP disable proxy port # iptables-AIN Instance with

Using iptables in CentOS

Run the following command to generate the/etc/sysconfig/iptables list [root @ centos ~] #/Etc/init. d/iptablesrestart after this operation is completed, the system will automatically generate a ChainRH-Firewall-1-INPUT linked list, but the system

In-depth analysis of the maximum transmission unit (MTU)

Improper MTU settings may cause many network problems, such as the unavailability of some network applications and the unavailability of some websites. The following are the MTU settings that have been searched online. some of them may not be

Total Pages: 2732 1 .... 2676 2677 2678 2679 2680 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.