OpenVPN is the first choice for VPN servers. There are two solutions for how openVPN breaks through the firewall blocking. One is to use the http-proxy that comes with openVPN, second, use HttpTunnel
1. the http-proxy provided by liopenvpn breaks through the firewall blockingOpenVPN itself can use an http proxy. That is to say, the
event will be audited as an exception event, as it seems normal, since it is necessary to maintain a persistent connection, it should not be disconnected. Now it is disconnected, and that is not necessary. Second, for those environments where bandwidth is scarce resources, heartbeat packets occupy considerable resources, such as 3G users, without actual data transmission, the heartbeat packets sent will be completely wasted.
Why does VPN need to maintain a persistent connection? Isn't it easy t
OpenVPN construction and related configuration in CentOS6.3
I. background
Because the company does a lot of business, it is divided into network companies and other business companies, that is, several companies are separated, not in the same place, then some data of the network company needs to be accessed by other business companies, that is, shared data can also be accessed by everyone. Many of the data shared by the network company is stored on th
certificates provide the most comprehensive functions, but require extra effort to maintain a PKI certificate system. OpenVPN2.0 introduces a user name/password combination authentication method, which can omit the client certificate, but there is still a server certificate to be used for encryption.
All communication in OpenVPN is based on a single IP port. UDP protocol communication is recommended by default, and TCP is also supported.
Configure openvpn in Ubuntu
First, make sure that the apt-Get of ubuntu can find the openvpn package.Sudo apt-Get update
Install openvpn packageSudo apt-Get install openvpn
Create an openvpn configuration file. The example can be found in the following path:/Usr/share/doc/
private key, third-party certificate and user name/password combination. Pre-access keys are the easiest, but they can only be used to establish point-to-point VPNs. PKI-based third-party certificates provide the most comprehensive functions, but require extra effort to maintain a PKI certificate system. Openvpn2.0 introduces a user name/password combination authentication method, which can omit the client certificate, but there is still a server certificate to be used for encryption.
All commu
1.
Environment 1.1. server environment
Centos6, kernel version: 2.6.32-71. el6The IP address is 192.168.122.180, and the tunnel IP address is 10.8.0.1.
Kernel must support Tun devices and must load iptablesCheck whether Tun is installed:
# Modinfo Tun
Filename:/lib/modules/2.6.32-71. el6.i686/kernel/Drivers/NET/TUN. KoAlias: Char-Major-10-200License: GPLAuthor: (c) 1999-2004 Max kranyansky maxk@qualcomm.comDescription: Universal tun/TAP Devic
Use openvpn + linux to quickly establish an enterprise VPN
Openvpn introduction http://openvpn.sourceforge.net/, not much said.
Openvpn can work in two modes:
One is the IP Route mode, which is mainly used for point-to-point
One is the Ethernet-based Tunnel Bridge mode, which is applicable to point-to-point and multi-p
OpenVPN server configuration file description (transfer), openvpn configuration file
This article describes how to configure the configuration file on the OpenVPN server. In Windows, this configuration file is generally called server. ovpn. in Linux/BSD, this configuration file is generally called server. conf. Although the configuration file name is different, t
Openvpn itself can use an HTTP proxy. That is to say, the openvpn client does not directly connect to the openvpn server, but uses an HTTP proxy for connection. This feature is the peripheral feature of openvpn, not its core, but it can solve many practical problems. It is equivalent to another
Use OPENVPN to implement Intranet mutual access between two locations (1) master server configurationMaster Server Configuration
Functions to be implemented:
Shenzhen:Master VPN Server: dns.dog.comInternet ip-eth1: 192.168.68.71Intranet ip-eth0: 10.1.1.254Guangzhou:VPN Server: lvs1.dog.comInternet ip-eth1: 192.168.68.73Intranet ip-eth0: 10.1.2.1Clients outside China:192.168.68.79Shenzhen-Guangzhou tunnel u
Tunneling technology is a very important application in IPV6 transition technology. Depending on how the IPv4 address of the tunnel endpoint is obtained, the tunnel is divided into "manual tunneling" (or "Configuration Tunnel") and "Automatic Tunneling". Compared with manual tunnels, automatic tunnels are more flexible in configuration and use. While the ISATAP
First, the working principle of OpenVPN
VPN technology establishes a private tunnel on the public network through key exchange, encapsulation, authentication and encryption, which guarantees the integrity, privacy and effectiveness of the transmitted data. OpenVPN is a new open source project emerging in recent years, which realizes a sslvpn solution.
Tradition
Today, I saw someone in the group talking about openvpn. I just had a holiday at home, so I just studied it. I used the openvpn client when I was a little white two years ago when I was in the old unit and connected to the headquarters OA. I felt that the project should be usable in the future, SOgoogle has a lot of pieces of information on the Internet, and it has been around for a long time. according to
VPN is a virtual private network, is provided to the enterprise or between the individual and the company security data transmission between the tunnel, OpenVPN is the Linux open source VPN leader, provides the good performance and the friendly user GUI, uses the OpenSSL library encryption and the authentication function. Supports UDP and TCP protocols and provides two kinds of virtual network interfaces: T
Article title: use Openbsd and Openvpn to quickly establish an enterprise VPN. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Use openbsd + openvpn to quickly establish an enterprise vpn
Openvpn can work in two modes:
One is
OpenVPN Optimization-Establishment of TLS handshake Control CHannelAn optimization of the OpenVPN data tunnel is in progress. After referring to the concept and idea of the "giant frame", I carefully considered the design and implementation of the TCP/IP protocol stack, so I come up with a possible error, but at least it is very practical in my scenario: although
the 0.3 instance is encapsulated through a tunnel. The data reaches 0.1 and then reaches openvpn. At this time, the data that enters openvpn is a source IP address of 0.3, the destination IP address is 0.4 of the original data "stream", then openvpn writes it to tun0, after the route, the data is written to tun0, and
tap1 addm em0 up" I'm creating two tap devices (I actually have two OpenVPN networks on this machine ), and bridging them all with em0. The ifconfig_tap0 line isn't actually necessary since the config lin E "ifconfig 192.168.1.249 255.255.255.0" will set the IP address on the tap interface being configured. you can also use just "dev tap" instead of "dev tap0" and the tap interface will be auto-created by openvpn
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.