VPN FA
MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora
server data
IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153
Extra services
Tor Output
Tor VPN Port: 9050 Permite usar uma proxy que encaminha o tráfego do browser ou mesmo outras apps pela rede tor através da VPN. Aconselha-se o uso do foxyproxy para o firefox.
Ip: 10.7.0.1 Port: 9050 Protocol: Socks5
Server Admin
Webmin: https://10.7.0.1:10000
IRC Private server connection
IRC Server
Installation openvpn
sudo apt-get install openvpn
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding
Easy RSA
source ./vars ./build-key
Config
File de ligação cliente:
client dev tun proto udp route-nopull remote roltel.net 56732 resolv-retry infinite ca ca.crt cert win10.crt key win10.key comp-lzo # pull dhcp-options persist-tun persist-key tun-mtu 1532 route 10.7.0.1 255.255.255.255 # famain server route 10.7.0.4 255.255.255.255 # itead_--------- orisis route 10.7.0.6 255.255.255.255 # osiris route 10.7.0.8 255.255.255.255 # route 10.7.0.10 255.255.255.255 # pcreset route 10.7.0.12 255.255.255.255 # 1000he route 10.7.0.14 255.255.255.255 # reset-home/pi route 10.7.0.16 255.255.255.255 # ze route 10.7.0.18 255.255.255.255 # msantos route 10.7.0.20 255.255.255.255 # r0173x route 10.7.0.22 255.255.255.255 # run /xp route 10.7.0.24 255.255.255.255 # rebian route 10.7.0.26 255.255.255.255 # msantos route 10.7.0.28 255.255.255.255 # zh route 10.7.0.30 255.255.255.255 # skeptic route 10.7.0.32 255.255.255.255 # faos
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding
2.
3. Output proxys 10.7.0.6 (dev DE) porta-10080 10.7.0.18 (lab FR) - 1080
Samba:
Partilhas de pastas, pastas comuns e uploads.
smb://10.7.0.1/atomic - mp3datacenter smb://10.7.0.1/datacenter - datacenterfa smb://10.7.0.1/dump_share - local de reciclagem e dump
http://wiki.openwrt.org/doc/howto/vpn.openvpn
....................................................................................................
vpn-home.sh
- !/bin/bash
echo 'Ligar VPN' cd ~/fa/vpn sudo openvpn vpn.conf
https://leap.se/en/docs/platform (meter no server)
tunctl -t tun1
The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use tunctl instead of ip tuntap add To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using tunctl -t tun1
tincd -n myvpn -d5 -D
https://servertutz.wordpress.com/2011/08/14/installing-openvpn-on-centos/
Tell Windows to allow pings (ICMPv4) Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule... Custom Rule All programs Protocol: ICMPv4 Allow the connection Apply to Private profile Name it. Finally pings were returned.
client dev tun proto udp
- route-nopull
remote 80.86.87.232 1194 resolv-retry infinite # Try to preserve some state across restarts. persist-key persist-tun ca ca.crt cert 1000he.crt key 1000he.key
ns-cert-type server comp-lzo pull dhcp-options verb 3