quality, progress control, project management and various models (iterative waterfall ...). Therefore, we need to redefine hash_function and hash_compare so that they can return a value! The idea behind it is that after the hash key and hash compare results are fixed, if the client IP address is changed at this time, there is still no error, it indicates that the hash search process has nothing to do with the source IP address and port of the receive
certificate as follows:
Ll keys/
We can see that three files, ilanni. csr, ilanni. crt, and ilanni. key, have been generated. Here, we use the ilanni. crt and ilanni. key Files.
In this way, the Client certificate is created.
4. Configure the Server
After all the certificates are created, we now start to configure the Server. Server configuration file, which can be copied from the openvpn built-in template. As follows:
Cp/usr/share/doc/
country in which KEY_COUNTRY is defined.
The province in which KEY_PROVINCE is defined.
The city in which KEY_CITY is defined.
The organization in which the KEY_ORG definition is located.
KEY_EMAIL defines the email address.
The Unit in which KEY_OU is defined.
KEY_NAME defines the name of the openvpn server.
The above is all the content of The vars configuration file. We can also use the default configuration for the vars configuration file.
# Service iptables restart
2. disable SELINUX
# Setenforce 0
# Vi/etc/sysconfig/selinux
---------------
SELINUX = disabled
---------------
Server (routing mode ):
I. network settings
1. enable the server-side route forwarding function
# Vi/etc/sysctl. conf
---------------------
Net. ipv4.ip _ forward = 1
---------------------
# Sysctl-p
2. set nat forwarding:
Note: ensure that the VPN address pool can be routed out of the Internet
# Iptables-t nat-a postrouting-s 10.8.0.0/24-o eth0-jMASQUERA
/openvpn/easy-rsa]# CD ...
[root@ss-usa-odo01/etc/openvpn]# VI server.conf
# # #下面是我的配置文件可以参考
[root@ss-usa-odo01/etc/openvpn]# Grep-ev ' ^ ($|#) ' server.conf
; The local a.b.c.d #Specifies the local IP of the listener (because some computers have multiple IP addresses), the command is optional and all IP addresses are monitored by default.
multiple verification methods and many powerful functions.
OpenVPN operates on layer 2nd or layer 3rd of the OSI model and uses SSL/TLS protocol for network transmission. Supports various customer authentication methods, such as certificates, smart cards, and user name and password certificates. In addition, there is a powerful ACL function that limits the customer's information exchange.
OpenVPN can run
I. openvpn introduction openvpn is an SSL-based vpn. it uses the industrial standard SSL/TLS protocol to implement the Layer 2 and Layer 3 secure data link VPN. it has the following advantages: 1. based on the SSL protocol, security, and using a single TCP or UDP port can achieve 2. using two-way authentication...
I. INTRODUCTION to openvpnOpenvpn is an SSL-based
{node ID, the IP/port} ing table shows the VPN processing node to which the data is sent.
5. to use BIO instead of the network to implement TLS between nodes, you must understand that the SSL handshake has nothing to do with the network elements, just as the OpenVPN implements, you can use the BIO/Realiable layer to implement TLS negotiation between two memory buffers. In this way, a tunnel can be establis
/server. conf/etc/openvpn
Then modify the configuration vi server. conf as follows:
Local 192.227.161.xx (with your own vps IP address)Port 1194Proto udpDev tunCa/etc/openvpn/ca. crtCert/etc/openvpn/server. crtKey/etc/openvpn/server. key # This file shocould be kept secre
challenge password []:An optional company name []:Using configuration from /etc/openvpn/easy-rsa/2.0/openssl-1.0.0.cnfCheck that the request matches the signatureSignature okThe Subject's Distinguished Name is as followscountryName :PRINTABLE:'JP'stateOrProvinceName :PRINTABLE:'JP'localityName :PRINTABLE:'Tokyo'organizationName :PRINTABLE:'heylinux.com'organizationalUnitName:PRINTABLE:'MyOrganizationalUnit'commonName
The first bottleneck of openvpn is that the Tun character device reads and writes frames at one link layer. The reason why the user-mode openvpn process must have the same link-MTU on both ends, it is because each time openvpn reads a complete Ethernet frame from the/dev/NET/TUN character device, there are not many, and the library interface: ssize_t read (int fd
= "netops@netops.com"
Export KEY_OU = "netops"
# Initializing Environment Variables
Source vars
# Generate the root certificate, Root key, server certificate, server key, Diffie-Hellman key, and ta. key Files.
./Clean-all
./Build-ca
./Build-key-server OpenVPN
./Build-dh
Openvpn -- genkey -- secret keys/ta. key
The generated Certificate file is under the keys directory of the current directory.
the-dev parameter cannot identify the device type.3) -- Dev-node: Any node is indicated as a virtual Nic device. The Node path and name can be arbitrary, but if it is not in the tunx/tapx format, the-Dev-type parameter must be configured.4) -- lladdr HW: configure the link layer address for the virtual Nic.2.1.2 network configuration parameters:1) -- local host: configure the IP address used locally. If it is not for bind, you do not need to configure this parameter.
mode to listen to the default UDP port 1194. The Virtual Interface uses the tun0 device. See the configuration example openvpn-2.0.9/sample-config-files/server. conf in the openvpn source code directory)
[Root @ gw1 ~] # Vim/etc/openvpn/gw1_tun0.conf
Local 173.74.75.76 // specify the IP address of the lis
: ia5string: 'elm @ elm.freetcp.com'Certificate is to be certified until Feb 9 10:05:53 2016 GMT (3650 days)Sign the certificate? [Y/n]: Y1 out of 1 certificate requests certified, commit? [Y/n] yWrite out database with 1 new entriesData Base updatedC: \ Program Files \ openvpn \ easy-RSA>The TA. Key file is generated belowFormat: openvpn -- genkey -- secret keys/Ta. KeyOutput: Keys/Ta. Key=================
sample and then modify it on this basis:
# Cp/usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz/etc/openvpn/
# Cd/etc/openvpn/
# Gunzip server.conf.gz
This will decompress a server. open the conf file and edit it. If you follow my steps from the beginning, you can copy my configuration directly. In this case, modify the configuration according to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.