primarily used for remote access connections to remote or mobile users.
Let's look at the composition of the Remote access VPN:
Let's take a look at the functions of each role:
(1) VPN server: This of course is used to receive and respond to VPN client connection requests and establish a connection. It can be a dedicated VPN server device, or it can be a host running the VPN service. Here, of course, belong to the latter kind.
(2) VPN client: A VPN client is used to initiate a request to
that passes through the firewall.
2
■ HotSpot Gateway
The technology is web-based authentication. You do not need to install a client and can record your Internet access information.
Users can pay by time, send or receive data
Bandwidth control Bandwidth shaping
Connection time, download/upload, and other restrictions
DHCP service functions
Radius Billing
Real-time user status information
2
■ VPN Server/client
PPTP (Point to Point Tunnel Protocol)
, but this is the user's.
5) obtain the PPTP Client
Rpm -- install pptp-linux-1.5.0-1. i386.rpm
This is a VPN Client ". This is a GUI client from which you can install VPN connections and various options.
6) Obtain phppcntl
Rpm -- instalGetphp-pcntl php-pcntl-4.3.8-1.i386.rpm
It helps the GUI work.
7) obtain the phpgtk Module
Rpm -- install php-gtk-pcntl-1.0.0-2.i386.rpm
This file also h
255.255.255.0 so that the IP address remains in the same network segment as the wireless network node. Generally, the wireless network nodes that are not configured are not encrypted. During connection, you may be prompted "whether to connect to an insecure wireless network ". First confirm the connection, and then perform security encryption after the wireless LAN connection is successful. After a normal connection, the current signal strength is displayed in the network properties.
Software f
ifconfig.
Create an iptables file in the/etc/network/if-up.d/directory with the following content:#! /Bin/sh
Iptables-restore Add the execution permission to the script:Chmod + x/etc/NET/if-up.d/iptables
Modify/etc/sysctl. the conf content is as follows: There are two items not listed above. You can simply add them directly. Other projects mainly remove comments. In fact, you can directly copy the following content to the configuration file:Net. ipv4.ip _ forward = 1
Net. ipv4.conf. all. send_r
I saw a good article about the pseudo-terminal. I posted it and studied it in another day.
Many network service applications such as L2TP, PPTP, and Telnet on Linux use pseudo terminals. Some may ask about this concept and write down what I know for discussion.
I. TerminalTo understand the Pseudo Terminal, let's take a look at what is the terminal ).
A terminal is a type of terminal device. It has multiple types and generally uses tty for short.
1. Se
gateway, open another terminal and goEnter route, and the gateway will display it.
After the installation is complete, the online command isSudoBrasupThe access command isSudoBrasdown
(For details, pleaseLook: http://bbs.nju.edu.cn/bbstcon? Board = linuxunix file = m.1240660576.a)
2. Use VPN to access the Internet
2. 1. Install VPN
First use bras to access the Internet, and then enter it in the terminal.SudoApt-Get install PPTP-LinuxSecurityInstall
1. If the check results do not support these features, PPTP cannot be installed. Execute Command:
# Modprobe ppp-compress-18 Echo OK
# Cat/dev/NET/TUN
If the result of this command is the following text, it indicates that:
Cat:/dev/NET/TUN: file descriptor in bad state
2. Check whether PPP supports MPPE.
Run the following command to check whether PPP supports MPPE:
# Strings '/usr/sbin/pppd' | grep-I MPPE | WC -- lines
If the above command output is
longDwredialpause as longEnd type
Private type rascredentialsDwsize as longDwmask as longSzusername (256) as byteSzpassword (256) as byteSzdomain (15) as byteEnd type
Private const et_none as long = 0' no encryptionPrivate const et_require as long = 1 'require EncryptionPrivate const et_requiremax as long = 2 'require Max EncryptionPrivate const et_optional as long = 3 'do encryption if possible. None OK.
Private const vs_default as long = 0 'default (PPTP
et_none as long = 0' no encryptionPrivate const et_require as long = 1 'require EncryptionPrivate const et_requiremax as long = 2 'require Max EncryptionPrivate const et_optional as long = 3 'do encryption if possible. None OK.
Private const vs_default as long = 0 'default (PPTP for now)Private const vs_pptponly as long = 1' only PPTP is attempted.Private const vs_pptpfirst as long = 2 '
During the past few years, we have a lot of stingy network administrators, so we need to be careful when we do this. So I usually use VPN, which is more anonymous than anonymous proxies! Generally, I find my real IP address. If I create a new connection in windows, I can directly dial the VPN Server. But in Linux, it is a little more troublesome. In fact, it is not troublesome, you only need to install the software "pptpconfig "! The procedure is as follows:
Run
Program code sudo gedit/etc/APT/s
Rotten mud: ubuntu 14.04 OpenVPN server, 14.04 openvpn
This article is written by Xiuyi Lin FengProviding friendship sponsorship, first launched in the dark world
The company branch needs to connect to the company's internal server, but the server only allows access to the company's internal network.
To solve this problem, we plan to use VPN. PPTP is the most widely used solution for VPN in the past, but PPTP
VPN log of FreeBSD
December 11, 2005 (Sunday)Classification: Telecom, computer, rack station
Some websites will refer to the source IP addresses, especially the digital website, the pay-as-you-go website, the full-text forum, and the underground site, it is ineffective even if proxy is set. Therefore, if a person is in urgent need of external use, he may have to get some VPNs to change.
My frequently-used VPN Server is not quite fixed. I had a good time and urged others to repair the s
When writing a Shell filter process, most people use grep to search for the specified process in the output result of ps aux. However, the grep process is also displayed, for example, the pptpd process, two matching items are displayed:
Copy codeThe Code is as follows: [root @ selboo ~] # Ps aux | grep pptp
Root 20191 0.0 0.2 5108 704 pts/2 R + grep pptp
Root 22054 0.0 0.1 1952 608? Ss Oct22 0: 00/usr/sbin
" and the password you set earlier.
Step 4: Install the client from the client URL (it will give you an option to download the installer)
Here, you can learn how to install it on your operating system.Step 5: Use the username and password you created to connect to your server
In this way, you can access whatismyip.com to view your IP address. It should already be the OpenVPN address on your CentOS 7.
Build and configure PPTP and OpenVPN in CentOS5-b
1. PPTPVPN server installation in centos5 (pptpdVPN requires kernel support for mppe) virtual private network (VPN) is defined as creating a temporary and secure connection through a public network (usually the Internet, it is a safe and stable tunnel through chaotic public networks. A virtual private network is an extension of the enterprise Intranet. Virtual private network can help remote users, company branches, business partners and suppliers to establish trusted and secure connections with
, games are poor, network latency, UDP datagram loss or late arrival, and the use of video and voice is restricted by the firewall. These problems can be easily solved on IP505LT +. IP505LT + is more powerful and supports multiple network connection modes, including automatic DHCP settings), fixed IP addresses, and PPPoE. It also includes PPTP and L2TP dialing that are commonly used by carriers in different regions in China. Remote Management is also
Windows rras vpn pptp service default port number through the registryThe default port number used by the first-layer tunnel protocol PPtp of VPN (virtual private network) is TCP 1723, which is a standard, that is to say, whether it is the VPN service provided by Microsoft Windows Server or other systems or hardware VPN, this port number is used, but if it is the route and remote access (RRAS) that comes w
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.