gateway, open another terminal and goEnter route, and the gateway will display it.
After the installation is complete, the online command isSudoBrasupThe access command isSudoBrasdown
(For details, pleaseLook: http://bbs.nju.edu.cn/bbstcon? Board = linuxunix file = m.1240660576.a)
2. Use VPN to access the Internet
2. 1. Install VPN
First use bras to access the Internet, and then enter it in the terminal.
After the vpn is installed, a 800 error is prompted when you connect to the vpn using windows. Generally, the firewall does not open the corresponding Port. In this case, add the port to the firewall. The code is as follows:Iptables-a input-m state-state NEW-m tcp-p tcp-dport 1723-j ACCEPTService iptables save (save)Service iptables restart (restart the service to make the configuration take effect)Tip: If
VPN is widely used in the current network. In windows, you can refer to the relevant documents to easily build a VPN network, this experiment is based on the VPN setup experiment on the linux platform. The linux Server under two VMS on the experimental platform and the Ip address of a windows host as the client are planned as follows: client 192.
Microsoft has recently released Windows 8 RTM, and many friends have installed it. Of course, I am no exception. In the past few days, many of my friends have asked me that no matter how the VPN connection is, the password is wrong and cannot be verified. So I connected the VPN for a test, as shown below:After configuring the VPN, do not repeat it. Enter the ID a
The company now uses iptables as the firewall in the LAN, the Internet is no problem. This time, because of the test, you need to connect PPTP VPN. The problem is, the VPN dial has failed and reported 619 errors. I have no problem with my cell phone or my home dialing.
Landing the router, the PPTP support all open to try again, the result is not.
Then find the reason for iptables, finally finally resolved
The IPSec VPN realizes the network expansion, the firewall realizes the control and the filtering to the network traffic, therefore has the influence to the IPSec VPN communication.
The default ASA maintains a state session only for UDP/TCP traffic, and therefore discards the ESP traffic that is returned. There are two ways to solve the problem
One uses ACLs to release ESP traffic.
Two applications check
To install the PPTP client and MPPE encryption module:
The code is as follows
Copy Code
OPKG UpdateOpkg Install PPTPOpkg Install Kmod-mppe
Add account number and password to config file:
The code is as follows
Copy Code
Cat/etc/ppp/chap-secrets#USERNAME PROVIDER PASSWORD IPAddressHaiyun.me VPN "haiyun.me" *
New dial-up configuration file:
The code is as follows
In the WINDOWS8 consumer preview version of the VPN link when one does not pay attention to the occurrence of such or such errors, such as 691, 629 errors, after these days to consult the literature, many attempts to finally finish, the following I say need to pay attention to the place.
Operation Steps
When you enter a username and password, a backslash () must precede the user name that is not administered by the ad domain in the normal user.
Und
purchase or deploy a small VPN system on their own. For an enterprise (even an IT enterprise), Certificate Management is quite complicated.
6. Performance
Ssl vpn is encrypted at the application layer, with poor performance. At present, VPN can reach 1g or even close to 10g, while ssl vpn is encrypted at the appli
long as the broadband access mode is available. Therefore, broadband access to the Internet to do corporate networking is technically feasible, cost of the economy.
From the above analysis, we can draw the conclusion that through the Internet +vpn to realize the long-distance interconnection of enterprise organizations is the best solution of the current enterprise networking. But in the specific implemen
the network, that is, it is equivalent to forming another local area network! This network is dedicated to both parties and provides excellent confidentiality. After the VPN is successfully established, you can use IP addresses or "Network neighbors" for mutual access. Of course, you can use the hardware and software resources shared by the other party!
Problems encountered in VPN network application and
launching VPN services. They are mainly divided from the perspective of business development. Users often have their own division methods, mainly based on their own needs. The following describes the classification of VPN from different angles.
1. divided by access method
This is the most important VPN division method for users and carriers. Under normal circums
What does a VPN mean?
The English full name of the VPN is "virtual private network", translation come Over is "the fictitious specialized network". As the name suggests, virtual private network we can understand him as a virtual enterprise internal line.----
This VPN's English full name is "Virtual private network", translates is "The fictitious private network". As the name suggests, Virtual Private Netw
Rd and RT (mpls vpn bgp)
Rd (route-distinguisher) is used to identify different VPN instances on the PE device. Its main function is to achieve address multiplexing between VPN instances. It and the IP address constitute a 12byte vpnv4 address space, rd and the route are carried together in the bgp update message and published to the peer end. On the one hand, we
these protocols, and check Microsoft chap Version 2 (do not select other options. Generally, the L2TP/IPSec VPN authentication protocols are Microsoft chap version 2, if it cannot be authenticated, try to check other protocols ). enter the user name and password of your L2TP/IPSec VPN in username and password respectively.
No other settings are required. Save the configuration and prepare to connect to t
What is a VPN?
The English full name of the VPN is "virtual private network", translation comes from "The fictitious specialized network". As the name suggests, virtual private network we can understand him as a virtual out of the enterprise internal line.
This VPN's English full name is "Virtual private network", translates is "The fictitious private network". As the name suggests, the virtual privat
remote computers and read internal server data. It uses standard Secure Sockets Layer (SSL) to encrypt data packets in transmission, thus protecting data security at the application layer. High-quality ssl vpn solution ensures secure global access for enterprises. In the ever-expanding Internet web sites, remote offices, traditional transaction halls, and clients, ssl
VPN system should support standard Authentication methods, such as RADIUS (Remote Authentication Dial In User Service, Remote Authentication Dial-Up User Service) Authentication, PKIPublic Key-based Infrastructure, and Public Key Infrastructure) certificate authentication and emerging biometric identification technologies. For a large-scale VPN system, the key management center of PKI/KMI provides LDAP dir
failure after restart.For client 741 errors, see: http://bbs.aliyun.com/read/161352.html2. The local vpn settings are as follows: 1. set vpn connection properties-Network-TCP/IP protocol-advanced cancel "use the default gateway on the remote network" so that the global data of the VPN connection still goes through the local network. 2. Set the local route table
after restart.For client 741 errors, see: http://bbs.aliyun.com/read/161352.html2. The local vpn settings are as follows: 1. set vpn connection properties-Network-TCP/IP protocol-advanced cancel "use the default gateway on the remote network" so that the global data of the VPN connection still goes through the local network. 2. Set the local route table with a s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.