VPN FA: Difference between revisions
(Created page with "MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora ==server data== IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153 ==Extra services== ===Tor Output=== Tor VPN Port: 90...") |
No edit summary |
||
Line 1: | Line 1: | ||
MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora | MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora | ||
== | ==OpenVPN== | ||
IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153 | IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153 | ||
===Server Admin=== | |||
Webmin: https://10.7.0.1:10000 | |||
===IRC Private server connection=== | |||
IRC Server | |||
===Tor Output=== | ===Tor Output=== | ||
Line 17: | Line 22: | ||
Protocol: Socks5 | Protocol: Socks5 | ||
</pre> | </pre> | ||
==Installation openvpn== | ==Installation openvpn== | ||
Line 31: | Line 27: | ||
sudo apt-get install openvpn | sudo apt-get install openvpn | ||
Ceate fowarding ip: | |||
<pre> | <pre> | ||
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding | comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding | ||
Line 40: | Line 37: | ||
source ./vars | source ./vars | ||
./build-key | ./build-key | ||
</pre> | </pre> | ||
Line 80: | Line 76: | ||
route 10.7.0.32 255.255.255.255 # faos | route 10.7.0.32 255.255.255.255 # faos | ||
client | |||
dev tun | |||
proto udp | |||
# route-nopull | |||
remote 80.86.87.232 1194 | |||
resolv-retry infinite # Try to preserve some state across restarts. | |||
persist-key | |||
persist-tun | |||
ca ca.crt | |||
cert 1000he.crt | |||
key 1000he.key | |||
ns-cert-type server | |||
comp-lzo | |||
pull dhcp-options | |||
verb 3 | |||
</pre> | |||
3. Output proxys | 3. Output proxys | ||
Line 92: | Line 103: | ||
Samba | ==Samba== | ||
Partilhas de pastas, pastas comuns e uploads. | Partilhas de pastas, pastas comuns e uploads. | ||
Line 99: | Line 110: | ||
smb://10.7.0.1/dump_share - local de reciclagem e dump | smb://10.7.0.1/dump_share - local de reciclagem e dump | ||
http://wiki.openwrt.org/doc/howto/vpn.openvpn | [[Openwrt]] http://wiki.openwrt.org/doc/howto/vpn.openvpn | ||
.................................................................................................... | .................................................................................................... | ||
Line 109: | Line 120: | ||
cd ~/fa/vpn | cd ~/fa/vpn | ||
sudo openvpn vpn.conf | sudo openvpn vpn.conf | ||
The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use | The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use | ||
Line 120: | Line 128: | ||
ip tuntap add | ip tuntap add | ||
To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using | To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using | ||
tunctl -t tun1 | |||
tunctl -t tun1 | tunctl -t tun1 | ||
Line 128: | Line 137: | ||
==Allow Ping Windows== | |||
Tell Windows to allow pings (ICMPv4) | Tell Windows to allow pings (ICMPv4) | ||
Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule... | Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule... | ||
Custom Rule | Custom Rule | ||
A | |||
ll programs | |||
Protocol: ICMPv4 | Protocol: ICMPv4 | ||
Allow the connection | Allow the connection | ||
Apply to Private profile | Apply to Private profile | ||
Name it. | Name it. | ||
Finally pings were returned. | Finally pings were returned. | ||
Revision as of 00:36, 20 July 2018
MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora
OpenVPN
IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153
Server Admin
Webmin: https://10.7.0.1:10000
IRC Private server connection
IRC Server
Tor Output
Tor VPN Port: 9050 Permite usar uma proxy que encaminha o tráfego do browser ou mesmo outras apps pela rede tor através da VPN. Aconselha-se o uso do foxyproxy para o firefox.
Ip: 10.7.0.1 Port: 9050 Protocol: Socks5
Installation openvpn
sudo apt-get install openvpn
Ceate fowarding ip:
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding
Easy RSA
source ./vars ./build-key
Config
File de ligação cliente:
client dev tun proto udp route-nopull remote roltel.net 56732 resolv-retry infinite ca ca.crt cert win10.crt key win10.key comp-lzo # pull dhcp-options persist-tun persist-key tun-mtu 1532 route 10.7.0.1 255.255.255.255 # famain server route 10.7.0.4 255.255.255.255 # itead_--------- orisis route 10.7.0.6 255.255.255.255 # osiris route 10.7.0.8 255.255.255.255 # route 10.7.0.10 255.255.255.255 # pcreset route 10.7.0.12 255.255.255.255 # 1000he route 10.7.0.14 255.255.255.255 # reset-home/pi route 10.7.0.16 255.255.255.255 # ze route 10.7.0.18 255.255.255.255 # msantos route 10.7.0.20 255.255.255.255 # r0173x route 10.7.0.22 255.255.255.255 # run /xp route 10.7.0.24 255.255.255.255 # rebian route 10.7.0.26 255.255.255.255 # msantos route 10.7.0.28 255.255.255.255 # zh route 10.7.0.30 255.255.255.255 # skeptic route 10.7.0.32 255.255.255.255 # faos client dev tun proto udp # route-nopull remote 80.86.87.232 1194 resolv-retry infinite # Try to preserve some state across restarts. persist-key persist-tun ca ca.crt cert 1000he.crt key 1000he.key ns-cert-type server comp-lzo pull dhcp-options verb 3
3. Output proxys
10.7.0.6 (dev DE) porta-10080
10.7.0.18 (lab FR) - 1080
Samba
Partilhas de pastas, pastas comuns e uploads.
smb://10.7.0.1/atomic - mp3datacenter smb://10.7.0.1/datacenter - datacenterfa smb://10.7.0.1/dump_share - local de reciclagem e dump
Openwrt http://wiki.openwrt.org/doc/howto/vpn.openvpn
....................................................................................................
vpn-home.sh
- !/bin/bash
echo 'Ligar VPN' cd ~/fa/vpn sudo openvpn vpn.conf
The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use tunctl instead of ip tuntap add To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using tunctl -t tun1 tunctl -t tun1
tincd -n myvpn -d5 -D
https://servertutz.wordpress.com/2011/08/14/installing-openvpn-on-centos/
Allow Ping Windows
Tell Windows to allow pings (ICMPv4)
Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule...
Custom Rule A ll programs
Protocol: ICMPv4
Allow the connection
Apply to Private profile
Name it.
Finally pings were returned.