First step: Modify the server-side configuration file:
Auth-user-pass-verify/usr/local/openvpn/etc/checkpsw.sh via-env
Client-cert-not-required
Username-as-common-name
Script-security 3
Note: If you add client-cert-not-required, then the user name password is used to authenticate the login, and if not, the certificate and username password are required to double verify the login.
checkpsw.sh Download Address: http://openvpn.se/files/other/checkp
The command is very simple, but there seems to be no information on the Internet, only the information below RHEL6. Directly paste the command: 12345cd ~
The command is very simple, but there seems to be no information on the Internet, only the information below RHEL6.
Directly paste the command:
12345
Cd ~ Wget http://swupdate.openvpn.org/as/openvpn-as-2.0.10-CentOS7.x86_64.rpm rpm-Uvh openvpn
I. openvpn needs to be installed in RedHatLinux enterprise 4. Easy to install, high platform compatibility, and no need to compile the kernel. (I'm disgusted with re-compiling the kernel software); 2. I can penetrate the NAT Intranet without limits. (This is critical because my server is currently in school, in our lab, we use NAT layer by layer.) due to the above two restrictions, I have tried pptpd and opensvn in many existing solutions. Pptpd is an
The order is simple, but there seems to be no information on the Internet, only RHEL6 the following information.
Direct Paste Command:
CD ~wget http://swupdate.openvpn.org/as/openvpn-as-2.0.10-CentOS7.x86_64.rpm
RPM-UVH openvpn-as-2.0.10-centos7.x86_64.rpmOvpn-init
After the port what can be changed by themselves.
After Init, you need to modify the OpenVPN a
There are several timers in openvpn. These timers limit the maximum duration of some specific behaviors of openvpn. If they are not set properly, they may cause inexplicable disconnection problems, however, how to set these counters does not have a general solution. In certain cases, they cannot be too large or too small.
1. Ping
This timer defines the interval between sending ping packets (in case of upper
Today, I saw some people in the group mentioned OpenVPN, just a holiday at home, incidentally, the study of the next.
2 years ago when I was a little white when the old unit even headquarters OA used OpenVPN This client, feel pretty good, and feel that after the project should also be able to use, so Google on the internet a large number of fragmented data, tossing the majority of the day, according to the
Use phpmailer to implement simple openvpn user authentication. Now everyone has countless accounts and passwords, which cannot be remembered. The principle is to complete authentication through the mail server pop service, or use SMTP and add SSL to improve security; password setting is not required. now everyone has countless accounts and passwords, which is hard to remember. The principle is that authentication is completed through the pop service o
Now everyone has countless accounts and passwords, which cannot be remembered. The principle is to complete authentication through the mail server pop service, or use SMTP, and add SSL to improve the security of OpenVPN.
Now everyone has countless accounts and passwords, which cannot be remembered. The principle is to complete authentication through the mail server pop service, or use SMTP and add SSL to improve security; this eliminates the trouble
Some time ago, the virtual network card installation was required.ProgramSo in the website to collect some, find to find, did not see a separate installation, most of the said to install openvpn, and then only install the virtual network card of the tap-win32. In this case, the program of openvpnis used to run tapinstall.exe install oemwin2k. run the command line INF tap0x01 to install the tool (these files can be found in the
I would like to ask you how to modify the OpenVPN protocol. a project needs to modify the original OpenVPN protocol to cope with DPI analysis. could you please discuss your ideas? thank you!
Reply to discussion (solution)
In this regard, there are a lot of existing solutions and patches on the Internet, is generally added to protocol obfuscation and encryption, you can refer to TorProject ObfsProxy (
China Mobile received a pass from China tietong to enter the fixed network. China Unicom's GSM network and China Netcom merged into the new China Unicom, and China Telecom received China
APNIC is an organization that manages IP Address Allocation in the Asia Pacific region. It has a rich and accurate IP Address Allocation library, and this information is also made public to the public! Next let's take a look at how to obtain the IP address distribution of some telecom operators in Linux:
Wget http://ftp.apnic.net/apnic/dbase/tools/ripe-dbase-client-v3.tar.gz
Tar xzvf ripe-dbase-client-v3.tar.gzCD whois-3.1./ConfigureMakeAfter completing the above compilation and installation
Operator
Proxy name
Usage
Direct Connection name
Usage
China Mobile
Cmwap
Cmwap is China Mobile's GPRS proxy for Internet access.You cannot directly useConnector. Open ("target address ");Instead, the proxy is used for connection.The specific creation code is a proxy method.Proxy address: 10.0.0.172Port: 80 and 8080The proxy header is X-Online-host.
Cmnet
In the direct conne
Mobile 10657 SMS China Unicom 10655 SMS China Telecom 10659 SMS 1-hand direct connection port.
Mobile CMPP protocol
CMPP (China Mobile Peer to Peer)
Chinese name: China Mobile Communication Internet Short Message Gateway Interface Protocol
Note: This is the enterprise specification of
Article Title: easy access to CIDR blocks of China Netcom, China Telecom, and China Tietong. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sometimes it is necessary to know the I
Bank process: service process differences between China Merchants Bank, China Construction Bank, and China Bank
What is the difference between a bank and a bank? Some people may say that there is no difference. My general feelings in the past were that ICBC and China Construction Bank had a large number of out
Recently, we need to differentiate China Mobile, China Unicom, and China Telecom, and sort out the differentiation methods.
1: differentiate by number segment
Connect: 130,131,132,155,156
China Telecom: 133,153,189
Mobile: 134,135,136,137,138,139,150,151,152,157,158,159,188
2: According to imsi:
Protecte
Recently, I was busy updating the company's website. I accidentally found that the website was blocked by China Telecom and China Unicom, while China Netcom was accessible.
The free space for the website to use freehostia is always good !!
There is very little free space in China, and even the charges are unstable. F
Sometimes it is necessary to know the IP address segment distribution of telecom, China Netcom, China tietong and other telecom operators as accurate as possible for cross-network segment engineering and applications. However, there are few materials available on the Internet, in addition, it is often the expiration date of N months ago ......
APNIC is an organization that manages IP Address Allocation in t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.