亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? openvpn.8

?? 一個開源的VPN原碼
?? 8
?? 第 1 頁 / 共 5 頁
字號:
.TP.B SIGHUPCause OpenVPN to close all tun/tap andnetwork connections,restart, re-read the configuration file (if any),and reopen tun/tap and network connections..TP.B SIGUSR1Like .B SIGHUP,except don't re-read configuration file, and possibly don't close and reopen tundevice, re-read key files, preserve local IP address/port, or preserve most recently authenticatedremote IP address/port based on.B --persist-tun, --persist-key, --persist-local-ip,and.B --persist-remote-ipoptions respectively (see above).This signal may also be internally generated by a timeout condition, governedby the.B --ping-restartoption.This signal, when combined with.B --persist-remote-ip,may besent when the underlying parameters of the host's network interface changesuch as when the host is a DHCP client and is assigned a new IP address.See.B --ipchangeabove for more information..TP.B SIGUSR2Causes OpenVPN to display its current statistics (to the syslogfile if.B --daemonis used, or stdout otherwise)..TP.B SIGINT, SIGTERMCauses OpenVPN to exit gracefully..SH TUN/TAP DRIVER SETUPIf you are running Linux 2.4.7 or higher, you probably have the tun/tap driveralready installed.  If so, there are still a few things you need to do:Make device:.B mknod /dev/net/tun c 10 200Load driver:.B modprobe tunIf you have Linux 2.2 or earlier, you should obtain version 1.1 of thetun/tap driver from.I http://vtun.sourceforge.net/tun/and follow the installation instructions..SH EXAMPLESPrior to running these examples, you should have OpenVPN installed on twomachines with network connectivity between them.  If you have notyet installed OpenVPN, consult the INSTALL file included in the OpenVPNdistribution..SS TUN/TAP Setup:If you are using Linux 2.4 or higher,make the tun device node and load the tun module:.IP.B mknod /dev/net/tun c 10 200.LP.IP.B modprobe tun.LPIf you installed from RPM, the.B mknodstep may be omitted, because the RPM install does that for you.If you have Linux 2.2, you should obtain version 1.1 of thetun/tap driver from.I http://vtun.sourceforge.net/tun/and follow the installation instructions.For other platforms, consult the INSTALL file at.I http://openvpn.sourceforge.net/install.htmlfor more information..SS Firewall Setup:If firewalls exist betweenthe two machines, they should be set to forward UDP port 5000in both directions.  If you do not have control over the firewallsbetween the two machines, you may still be able to use OpenVPN by adding.B --ping 15to each of the.B openvpncommands used below in the examples (this will cause each peer to send outa UDP ping to its remote peer once every 15 seconds which will cause manystateful firewalls to forward packets in both directionswithout an explicit firewall rule).If you are using a Linux iptables-based firewall, you may need to enterthe following command to allow incoming packets on the tun device:.IP.B iptables -A INPUT -i tun+ -j ACCEPT.LPSee the firewalls section below for more information on configuring firewallsfor use with OpenVPN..SS VPN Address Setup:For purposesof our example, our two machines will be called.B may.kgand.B june.kg.If you are constructing a VPN over the internet, then replace.B may.kgand.B june.kgwith the internet hostname or IP address that each machine will useto contact the other over the internet.Now we will choose the tunnel endpoints.  Tunnel endpoints areprivate IP addresses that only have meaning in the context ofthe VPN.  Each machine will use the tunnel endpoint of the othermachine to access it over the VPN.  In our example,the tunnel endpoint for may.kgwill be 10.4.0.1 and for june.kg, 10.4.0.2.Once the VPN is established, you have essentiallycreated a secure alternate path between the two hostswhich is addressed by using the tunnel endpoints.  You cancontrol which networktraffic passes between the hosts (a) over the VPN or (b) independently of the VPN, by choosing whether to use(a) the VPN endpoint address or (b) the public internet address,to access the remote host. For example if you are on may.kg and you wish to connect to june.kgvia.B sshwithout using the VPN (since.B sshhas its own built-in security) you would use the command.B ssh june.kg.However in the same scenario, you could also use the command.B telnet 10.4.0.2to create a telnet session with june.kg over the VPN, that woulduse the VPN to secure the session rather than.B ssh.You can use any address you wish for thetunnel endpointsbut make sure that they are private addresses(such as those that begin with 10 or 192.168) and that they arenot part of any existing subnet on the networks ofeither peer.  If you use an address that is part ofyour local subnet for either of the tunnel endpoints,you will get a weird feedback loop..SS Example 1: A simple tunnel without security.LPOn may:.IP.B openvpn --remote june.kg --dev tun1 --ifconfig 10.4.0.1 10.4.0.2 --verb 8.LPOn june:.IP.B openvpn --remote may.kg --dev tun1 --ifconfig 10.4.0.2 10.4.0.1 --verb 8.LPNow verify the tunnel is working by pinging across the tunnel..LPOn may:.IP.B ping 10.4.0.2.LPOn june:.IP.B ping 10.4.0.1.LPThe.B --verb 8option will produce verbose output, similar to the.BR tcpdump (8)program.  Omit the.B --verb 8option to have OpenVPN run quietly..SS Example 2: A tunnel with static-key security (i.e. using a pre-shared secret)First build a static key on may..IP.B openvpn --genkey --secret key.LPThis command will build a random key file called.B key(in ascii format).Now copy.B keyto june over a secure medium such as byusing the.BR scp (1)program..LPOn may:.IP.B openvpn --remote june.kg --dev tun1 --ifconfig 10.4.0.1 10.4.0.2 --verb 5 --secret key.LPOn june:.IP.B openvpn --remote may.kg --dev tun1 --ifconfig 10.4.0.2 10.4.0.1 --verb 5 --secret key.LPNow verify the tunnel is working by pinging across the tunnel..LPOn may:.IP.B ping 10.4.0.2.LPOn june:.IP.B ping 10.4.0.1.SS Example 3: A tunnel with full TLS-based securityFor this test, we will designate.B mayas the TLS client and.B juneas the TLS server..I Note that client or server designation only has meaning for the TLS subsystem.  It has no bearing on OpenVPN's peer-to-peer, UDP-based communication model.First, build a separate certificate/key pairfor both may and june (see above where.B --certis discussed for more info).  Then constructDiffie Hellman parameters (see above where.B --dhis discussed for more info).  You can also use theincluded test files client.crt, client.key,server.crt, server.key and tmp-ca.crt.The .crt files are certificates/public-keys, the .keyfiles are private keys, and tmp-ca.crt is a certificationauthority who has signed bothclient.crt and server.crt.  For Diffie Hellmanparameters you can use the included file dh1024.pem..I Note that all client, server, and certificate authority certificates and keys included in the OpenVPN distribution are totally insecure and should be used for testing only..LPOn may:.IP.B openvpn --remote june.kg --dev tun1 --ifconfig 10.4.0.1 10.4.0.2 --tls-client --ca tmp-ca.crt --cert client.crt --key client.key --reneg-sec 60 --verb 5.LPOn june:.IP.B openvpn --remote may.kg --dev tun1 --ifconfig 10.4.0.2 10.4.0.1 --tls-server --dh dh1024.pem --ca tmp-ca.crt --cert server.crt --key server.key --reneg-sec 60 --verb 5.LPNow verify the tunnel is working by pinging across the tunnel..LPOn may:.IP.B ping 10.4.0.2.LPOn june:.IP.B ping 10.4.0.1.LPNotice the.B --reneg-sec 60option we used above.  That tells OpenVPN to renegotiatethe data channel keys every minute.Since we used.B --verb 5above, you will see status information on each new key negotiation.For production operations, a key renegotiation interval of 60 secondsis probably too frequent.  Omit the.B --reneg-sec 60option to use OpenVPN's default key renegotiation interval of one hour..SS Routing:Assuming you can ping across the tunnel,the next step is to route a real subnet overthe secure tunnel.  Suppose that may and june have two networkinterfaces each, one connectedto the internet, and the other to a privatenetwork.  Our goal is to securely connectboth private networks.  We will assume that may's private subnetis 10.0.0.0/24 and june's is 10.0.1.0/24..LPFirst, ensure that IP forwarding is enabled on both peers.On Linux, enable routing:.IP.B echo 1 > /proc/sys/net/ipv4/ip_forward.LPand enable tun packet forwarding through the firewall:.IP.B iptables -A FORWARD -i tun+ -j ACCEPT.LPOn may:.IP.B route add -net 10.0.1.0 netmask 255.255.255.0 gw 10.4.0.2.LPOn june:.IP.B route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.4.0.1.LPNow any machine on the 10.0.0.0/24 subnet canaccess any machine on the 10.0.1.0/24 subnetover the secure tunnel (or vice versa).In a production environment, you could put the route command(s)in a shell script and execute with the.B --upoption..SH FIREWALLSOpenVPN's usage of a single UDP port makes it fairly firewall-friendly.You should add an entry to your firewall rules to allow incoming OpenVPNpackets.  On Linux 2.4+:.IP.B iptables -A INPUT -p udp -s 1.2.3.4 --dport 5000 -j ACCEPT.LPThis will allow incoming packets on UDP port 5000 (OpenVPN's default UDP port)from an OpenVPN peer at 1.2.3.4.If you are using HMAC-based packet authentication (the default in any ofOpenVPN's secure modes), having the firewall filter on sourceaddress can be considered optional, since HMAC packet authenticationis a much more secure method of verifying the authenticity ofa packet source.  In that case:.IP.B iptables -A INPUT -p udp --dport 5000 -j ACCEPT.LPwould be adequate and would not render the host inflexible withrespect to its peer having a dynamic IP address.OpenVPN also works well on stateful firewalls.  In some cases, you maynot need to add any static rules to the firewall list if you areusing a stateful firewall that knows how to track UDP connections.If you specify.B --ping n,OpenVPN will be guaranteedto send a packet to its peer at least once every.B nseconds.  If.B nis less than the stateful firewall connection timeout, you canmaintain an OpenVPN connection indefinitely without explicitfirewall rules.You should also add firewall rules to allow incoming IP traffic ontun or tap devices such as:.IP.B iptables -A INPUT -i tun+ -j ACCEPT.LPto allow input packets from tun devices,.IP.B iptables -A FORWARD -i tun+ -j ACCEPT.LPto allow input packets from tun devices to be forwarded toother hosts on the local network,.IP.B iptables -A INPUT -i tap+ -j ACCEPT.LPto allow input packets from tap devices, and.IP.B iptables -A FORWARD -i tap+ -j ACCEPT.LPto allow input packets from tap devices to be forwarded toother hosts on the local network.These rules are secure if you use packet authentication,since no incoming packets will arrive on a tun or tapvirtual deviceunless they first pass an HMAC authentication test..SH FAQ.I http://openvpn.sourceforge.net/faq.html.SH HOWTOFor a more comprehensive guide to setting up OpenVPNin a production setting, see the OpenVPN HOWTO at.I http://openvpn.sourceforge.net/howto.html.SH PROTOCOLFor a description of OpenVPN's underlying protocol,see the file ssl.h included in the OpenVPN source distribution orbrowse the file in the CVS repository at.I http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/openvpn/openvpn/ssl.h.SH WEBOpenVPN's web site is at.I http://openvpn.sourceforge.net/Go here to download the latest version of OpenVPN, subscribeto the mailing lists, read the mailing listarchives, or browse the CVS repository..SH BUGSReport all bugs to the OpenVPN users list <openvpn-users@lists.sourceforge.net>.To subscribe to the list or see the archives, go to.I http://sourceforge.net/mail/?group_id=48978.SH "SEE ALSO".BR dhcpcd (8),.BR ifconfig (8),.BR openssl (1),.BR route (8),.BR scp (1).BR ssh (1).SH NOTES .LPThis product includes software developed by theOpenSSL Project (.I http://www.openssl.org/)For more information on the TLS protocol, see.I http://www.ietf.org/internet-drafts/draft-ietf-tls-rfc2246-bis-01.txtFor more information on the tun/tap driver see.I http://vtun.sourceforge.net/tun/For more information on the LZO real-time compression library see.I http://www.oberhumer.com/opensource/lzo/.SH COPYRIGHTCopyright (C) 2002 by James Yonan. This program is free software;you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation; either version 2 of the License, or(at your option) any later version..SH AUTHORSJames Yonan <jim@yonan.net>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美va在线播放| 日本亚洲一区二区| 欧美蜜桃一区二区三区| 国产a级毛片一区| 久久精品亚洲国产奇米99| 亚洲欧洲av一区二区三区久久| 日韩av中文在线观看| 色婷婷综合五月| 久久九九久久九九| 国产在线观看免费一区| 欧美一区二区三区人| 亚洲成人av一区二区三区| 色综合久久久久久久久久久| 国产欧美一区二区精品久导航| 国产精品一区二区无线| 久久综合丝袜日本网| 韩国三级在线一区| 欧美激情在线免费观看| 97se亚洲国产综合自在线观| 最新久久zyz资源站| 色香色香欲天天天影视综合网| 亚洲久本草在线中文字幕| 色婷婷av一区二区三区大白胸| 亚洲一区二区偷拍精品| 欧美电影影音先锋| 国产成a人亚洲| 久久久精品一品道一区| 欧美一区二区三区视频| 国产大陆a不卡| 麻豆中文一区二区| 亚洲一区二区美女| 亚洲欧美日韩国产综合| 亚洲欧美怡红院| 日韩一区二区免费视频| 亚洲日本一区二区| 日韩一级高清毛片| 国产日韩亚洲欧美综合| 国产福利精品导航| 综合久久久久综合| 国产精品久久久久天堂| 中文字幕永久在线不卡| 中文字幕在线观看一区| 综合久久国产九一剧情麻豆| 国产精品情趣视频| 亚洲欧美日韩一区二区 | 性做久久久久久久免费看| 一区免费观看视频| 一区二区三区 在线观看视频| 亚洲美女在线国产| 亚洲综合免费观看高清完整版| 依依成人综合视频| 偷拍亚洲欧洲综合| 日韩国产高清影视| 麻豆91在线看| 国产福利电影一区二区三区| 成人午夜激情在线| 99久久精品免费看国产免费软件| 99久久亚洲一区二区三区青草| 91小宝寻花一区二区三区| 在线免费观看一区| 欧美福利视频导航| 精品国产一区二区三区不卡| 欧美高清在线一区| 亚洲精品日韩综合观看成人91| 亚洲国产cao| 免费成人你懂的| 国产+成+人+亚洲欧洲自线| av色综合久久天堂av综合| 欧美在线综合视频| 欧美mv和日韩mv国产网站| 欧美激情一区二区| 亚洲第一搞黄网站| 国产精品1区二区.| 欧美亚洲综合色| 亚洲精品在线免费播放| 亚洲欧洲一区二区在线播放| 日韩国产欧美在线播放| 国产精品一品二品| 欧美体内she精高潮| 久久久久国产免费免费| 亚洲欧美经典视频| 精品在线一区二区三区| 91在线观看美女| 精品少妇一区二区| 亚洲欧美日韩国产综合| 毛片不卡一区二区| 色婷婷久久久亚洲一区二区三区| 91精品国产黑色紧身裤美女| 国产精品丝袜黑色高跟| 三级一区在线视频先锋 | 欧美日韩中文字幕精品| 久久色成人在线| 亚洲激情图片一区| 国产高清精品在线| 午夜久久福利影院| 久久精品国产网站| 91国产免费看| 久久免费视频一区| 日韩av成人高清| 色综合色狠狠综合色| 久久久电影一区二区三区| 首页国产欧美久久| 色综合咪咪久久| 中文字幕精品一区二区精品绿巨人 | 自拍av一区二区三区| 老鸭窝一区二区久久精品| 色综合久久久久综合体| 中文字幕av一区 二区| 老司机精品视频一区二区三区| 色噜噜狠狠成人网p站| 欧美激情在线免费观看| 精彩视频一区二区三区| 69久久99精品久久久久婷婷| 亚洲欧美激情在线| 99精品久久免费看蜜臀剧情介绍| 欧美精品一区在线观看| 日本aⅴ精品一区二区三区| 在线亚洲精品福利网址导航| 国产精品久久福利| 成人永久看片免费视频天堂| 精品久久久久久久久久久久久久久久久 | 91精品国产全国免费观看| 亚洲欧美日韩国产一区二区三区| 成人性生交大片免费看中文网站| 欧美成人精品福利| 麻豆精品国产91久久久久久| 欧美二区在线观看| 国产乱人伦偷精品视频不卡| 国产欧美日韩精品一区| 北岛玲一区二区三区四区| 国产嫩草影院久久久久| 9l国产精品久久久久麻豆| 国产精品嫩草影院av蜜臀| 欧美性高清videossexo| 蜜桃av噜噜一区| 亚洲超碰97人人做人人爱| 国产精品毛片久久久久久| 91视频你懂的| 亚洲综合色在线| 日韩欧美国产wwwww| 在线观看av不卡| 欧美xxxx在线观看| 中文字幕一区二区不卡| 色域天天综合网| 亚洲视频一区在线观看| 色婷婷av一区二区| 亚洲不卡一区二区三区| 欧美日韩精品是欧美日韩精品| 色婷婷av一区二区三区软件| 久久久噜噜噜久久中文字幕色伊伊| 激情都市一区二区| 国产精品素人一区二区| 一本色道久久综合亚洲91| 亚洲一区二区五区| 欧美一区国产二区| 国内精品在线播放| 中文字幕亚洲一区二区av在线 | 日韩一级片网址| 国产尤物一区二区在线| 国产日韩欧美亚洲| 日本韩国精品在线| 日韩中文字幕1| 久久看人人爽人人| 色婷婷精品大在线视频| 七七婷婷婷婷精品国产| 国产午夜精品一区二区三区视频| 不卡免费追剧大全电视剧网站| 亚洲精品久久久蜜桃| 日韩三级免费观看| 成人午夜免费电影| 亚洲超碰97人人做人人爱| 欧美成人一级视频| 99久久99久久综合| 日韩av午夜在线观看| 国产三级三级三级精品8ⅰ区| 99久久国产综合精品女不卡| 日韩av午夜在线观看| 国产精品久久久久影院亚瑟| 欧美日韩一区二区在线视频| 国内精品视频666| 亚洲一区二区四区蜜桃| xfplay精品久久| 欧美午夜精品免费| 丁香桃色午夜亚洲一区二区三区| 亚洲午夜成aⅴ人片| 国产午夜精品一区二区三区视频 | 久久久亚洲综合| 成人99免费视频| 天天色天天操综合| 国产精品毛片a∨一区二区三区| 欧美乱妇15p| av在线播放一区二区三区| 免费成人美女在线观看.| 一区二区三区中文字幕电影| 久久夜色精品国产欧美乱极品| 日本丶国产丶欧美色综合| 国产综合成人久久大片91| 偷拍自拍另类欧美| 伊人婷婷欧美激情| 国产精品情趣视频|