communicate with the VPN service, that is, the client may access the VPN server through this address)(2) define the IP segment of the client. (with-to connect the continuous IP, with half-width commas to separate the IP of the different segments)
Vi/etc/ppp/options.pptpdAdd one line at the endMs-dns 4.2.2.2 (You can change to your own common DNS)
vi/etc/ppp/chap-secrets to user rights and assigning IPFormat: User, service password * (wildcard)# vi/
/options.ppt pd file, or set "*" to automatically identify the server. "secret" corresponds to the logon password. "IP addresses" corresponds to the IP address of the client that can be dialed in. If you do not need to set any special restrictions, you can set it. 5. set IP disguised forwardingOnly remote computers connected to the VPN can ping each other after IP disguised Forwarding is configured, so as
Anyone familiar with X Window knows that X Window (hereinafter referred to as X) was developed in 1984 and is a long-history project many years earlier than Linux ). Even the current X is based on the X11 protocol established in 1987, which is why we call X "X11. X architecture uses Server/Client mode flexibly), but it inevitably brings latency and affects the efficiency of desktop graphics.
Recently, Krist
With the advent of the Ubuntu "feisty fawn" 7.04 release, components of the Linux operating system will be adopted by more server environments.
Canonical, a co-sponsor of Ubuntu, promises that the operating system's existing server capabilities will become better in 2007.
Ubuntu always has a server component, but the
is to connect host1 to Host2 through HOST3.We execute the following command in Host1:$ ssh-l 2121:host2:21 Host3The l parameter in the command accepts a total of three values, namely "Local Port: Destination Host: Destination host port", separated by colons. The meaning of this command is to specify SSH to bind the port 2121, and then specify HOST3 to forward all data to 21 ports on the target host host2 (assuming HOST2 runs FTP, the default port is 21).In this way, we simply connect the host1
VPN (Virtual Private Network) is an extension of a Private Network. It can simulate a point-to-point Private connection through a shared Internet or public Network connection, send data between a local computer and a remote computer. It has good confidentiality and is not subject to authorization, so that both parties can establish a free and secure point-to-point connection. The following describes how to quickly build a VPN Server.
Install software
somewhat insecure), or command-line commands, so memory usage can be reduced by about 30-40%.6. Improve Linux Exim server performanceThere are many ways to improve server Exim performance, one way is to use the DNS cache daemon, which reduces the bandwidth and CPU time required to resolve DNS records, and the DNS cache improves network performance by eliminating
this, we have been ignoring the azure of a unique secret, currently I have not found other public cloud to provide DSR support!Below we create two virtual machines using CentOS 6.7 Images and configure a Linux server failover cluster on the Azure China edition.Pre-preparation work:1. Place two virtual machines in the same cloud service and must use standard type
in the/etc/ppp/options.ppt pd file, or be set to "*" to automatically identify the server; "secret" corresponds to the login password; "IP addresses" corresponds to the IP address of the client that can be dialed in. if you do not need to make any special restrictions, you can set it.
5. set IP disguised forwarding
Only remote computers connected to the VPN can ping each other after IP disguised forwardi
about 30-40%.6. Improve Linux Exim server performanceThere are many ways to improve server Exim performance, one way is to use the DNS cache daemon, which reduces the bandwidth and CPU time required to resolve DNS records, and the DNS cache improves network performance by eliminating the need to find DNS records every time from the root node, Djbdns is a very po
.modify the options.ppt pd FileEdit the/etc/ppp/options.ppt pd configuration file and replace it with the following content:AuthLockDebugProxyarpLockName rh9vpn # name of the VPN ServerMultilinkRefuse-papRefuse-chapRefuse-mschapRefuse-eapRefuse-mschap-v2Require-mppeMs-wins 192.168.1.2 # enter the IP address of the machine you want to see in the network neighbor.Ms-dns 192.168.1.2 # DNS server addressDumpLogfile/var/log/pptpd. log # log storage path4.
SSH service supports a security authentication mechanism, that is, key authentication. The so-called key authentication, in fact, is to use a pair of encrypted strings, one called the public key, which anyone can see its contents, used for encryption, and another called The secret key (private key), which only the owner can see for decryption. Ciphertext encrypted with public key can be easily decrypted using a se
.
vi /etc/pptpd.confUncomment the following content
localip 192.168.0.1remoteip 192.168.0.234-238,192.168.0.245The IP address range that can be obtained after the external computer connects to the vpn through pptp and the IP address settings of the server.
4. Add an account for login
vi /etc/ppp/chap-secretsThe format is as follows:
# client server secret
Article Title: how to set up a DNS server in Linux. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic categories. There are three main methods to configure DNS servers in
Tags: statistics impact receive process blog End Agent Dynamic AtimeA Linux server Performance View 1.1 CPU Performance View 1, view the number of physical CPUs:cat /proc/cpuinfo |grep "physical id"|sort|uniq|wc -l2. View the number of cores in each physical CPU:cat /proc/cpuinfo |grep "cpu cores"|wc -l3, the number of logical CPUs:cat /proc/cpuinfo |grep "processor"|wc -lNumber of physical CPUs * Number of
ObjectiveThe Linux server uploads files to S3 through the AWS command line.To connect to your Linux server, follow these steps.# install PIPYum-y Install Python-pip# Install AWSCLIPip Install Awscli# Initialize Configuration> AWS ConfigureAWS Access Key ID [None]:AWS Secret
Article Title: CIPE server configuration in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Copy the sample configuration file in/usr/share/doc/cipe-version/samples/to/etc/ci
Two methods:Method One: Create a secret key with Linux built-in RSAMethod Two: Using the CRT client, generate the secret key650) this.width=650; "src=" Http://img.baidu.com/hi/jx2/j_0056.gif "alt=" J_0056.gif "/>650" this.width=650; "src=" Http://img.baidu.com/hi/jx2/j_0056.gif "alt=" J_0056.gif "/>650) this.width=650; "src=" Http://img.baidu.com/hi/jx2/j_0056.gi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.