I. Main VPN technologies in Linux
1. IPSecInternet Protocol Security)
IPSec is a perfect security standard for IETFInternet Engineer Task Force. It combines several security technologies to form a complete system, which has received the attention and support of many vendors. Data Encryption, authentication, and integrity check ensure the reliability, privacy, and confidentiality of data transmission.
Advant
communicate with the VPN service, that is, the client may access the VPN server through this address)(2) define the IP segment of the client. (with-to connect the continuous IP, with half-width commas to separate the IP of the different segments)
Vi/etc/ppp/options.pptpdAdd one line at the endMs-dns 4.2.2.2 (You can
. Note: The IP of the VPN server is to fill in the globally unique unicast address, that is, the eth0 address of the gateway server.
4. Enable VPN service
Before enabling VPN, verify that the kernel's IP forwarding function is turned on, and then execute Command # Service PPTPD start to enable VPN waiting for remote
Run pppd over ssh (the simplest linux vpn)
SBA 2003.1.10
In order to pass the firewall of udp packets to qq
Tried many methods
It's good to use snake's socks5 proxy. You can use windows as an Internet host.
In linux, stunnel only forwards packets that do not support qq udp.
So I thought that vpn pptpd is a very good
Build a Linux-based VPN Network-Linux Enterprise Application-Linux server application information. The following is a detailed description. Building a VPN is almost one of the most advanced Linux applications. Learning this techno
From getting started to being proficient in hacker linux, Ma Hao handled the VPN server agenda in three minutes :. VPN introduction. how VPN works. VPN data transmission protocol. VPN server construction case: the distance between
/options.ppt pd file, or set "*" to automatically identify the server. "secret" corresponds to the logon password. "IP addresses" corresponds to the IP address of the client that can be dialed in. If you do not need to set any special restrictions, you can set it. 5. set IP disguised forwardingOnly remote computers connected to the VPN can ping each other after IP disguised Forwarding is configured, so as
Linux uses pptpconfig to connect to the vpn Server-Linux Enterprise Application-Linux server application information. The following is a detailed description. If it is in Windows XP, you can directly connect to the vpn Server by using the XP dial-up software. The configurati
Topology:
Note: The company's Intranet environment requires domain support;
The front-end two VPN servers are Linux operating systems;
A green line indicates the physical link of the network environment;
Red indicates the authentication method;
# When a user requests a VPN connection, use the domain account to log on. DNSPOD determines whether it is a China Tele
.
vi /etc/pptpd.confUncomment the following content
localip 192.168.0.1remoteip 192.168.0.234-238,192.168.0.245The IP address range that can be obtained after the external computer connects to the vpn through pptp and the IP address settings of the server.
4. Add an account for login
vi /etc/ppp/chap-secretsThe format is as follows:
# client server secret IP addressescqc pptpd 123456 *The user name
in the/etc/ppp/options.ppt pd file, or be set to "*" to automatically identify the server; "secret" corresponds to the login password; "IP addresses" corresponds to the IP address of the client that can be dialed in. if you do not need to make any special restrictions, you can set it.
5. set IP disguised forwarding
Only remote computers connected to the VPN can ping each other after IP disguised forwardi
address of the client that can be dialed in. If you do not need to set any special restrictions, you can set it.
5. set IP disguised forwarding
Only remote computers connected to the VPN can ping each other after IP disguised Forwarding is configured, so as to achieve sharing like a LAN. Run the following command to set the parameters:
# Echo 1>/proc/sys/net/ipv4/ip_forward
You can put this command in the
VPN is widely used in the current network. In windows, you can refer to the relevant documents to easily build a VPN network, this experiment is based on the VPN setup experiment on the linux platform. The linux Server under two VMS on the experimental platform and the Ip ad
client.
Linux Enterprise Edition 4
1. software installation
Install the RPM package. Note: The RPM packages are installed sequentially. Last installation with kernel.
The sequence of installing the RPM Package is:
(1 ). Dkms-2.0.5-1.noarch.rpm
(2 ). Pptpd-1.3.0-0.i386.rpm
(3 ). Ppp-2.4.3-5.rhel4.i386.rpm
(4 ). Kernel_ppp_mppe-0.0.5-2dkms.noarch.rpm
Installation Command: First use rpm? Install ivh. if you
Article title: set up a VPN for a single Linux Nic and use NAT to share the Internet. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The server uses shorewall as the firewall. In f
In linux, use poptop to quickly build the VPN service-Linux Enterprise Application-Linux server application information. The following is a detailed description. VPN (Virtual Private Network) is an extension of a Private Network. It can simulate a point-to-point Private conn
VPN (Virtual Private Network) is an extension of a Private Network. It can simulate a point-to-point Private connection through a shared Internet or public Network connection, send data between a local computer and a remote computer.It has good confidentiality and is not subject to authorization, so that both parties can establish a free and secure point-to-point connection. The following describes how to quickly build a
In debianLinux, the implementation of vpn Server-Linux Enterprise Application-Linux server application information is as follows. Server Side settings:
First, add the mppe patch to the kernel of the vpn Server,
Obtain patches from debian:
Apt-get install kernel-patch-mppe
Then execute the patch in the source code direc
VPN under Linux-general Linux technology-Linux technology and application information, the following is a detailed description. Today, I configured a LINUX VPN (single Nic). The machine can connect to the
The initial vpn experience in linux-Linux Enterprise Application-Linux server application information. The following is a detailed description. I am idle, and I have a vpn service in the company's Intranet, so that I can easily log on to the company's intranet elsewhere. Nex
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.