本站用于记录日常工作内容,虚拟化云计算,系统运维,数据库DBA,网络与安全。
Suricata 是一个网络入侵检测和阻止引擎,由开放信息安全基金会以及它所支持的提供商说开发。该引擎是多线程的,内置 IPv6 的支持,可加载预设规则,支持 Barnyard 和 Barnyard2 工具。This installation guide has been tested with:Suricata 3.0, 2.0.11 on CentOS 7Suricata 3.0, 2.0.11 on Scientific Linux 7Suricata 3.0, 2.0.11 on Fedora 23, Fedora 22Suricata 3.0 on CentOS 6Pre-Installation RequirementsCentOS 6 Only: CentOS 6 requires the EPEL package repository:yum install epel-releaseBefore you can build Suricata, run the following command to ensure that all dependencies are installed:sudo yum -y install gcc libpcap-devel pcre-devel libyaml-devel file-devel \ zlib-devel jansson-devel nss-devel libcap-ng-devel libnet-devel tar make \ libnetfilter_queue-devel lua-devel SuricataTo download and build Suricata, enter the following:wget http://www.openinfosecfoundation.org/download/suricata-3.0.tar.gz tar -xvzf suricata-3.0.tar.gz cd suricata-3.0 ./configure --prefix=/usr --sysconfdir=/etc ...
CentOS 服务器一键安装/配置模板教程 服务系统:CentOS 5/6 32/64位 (支持蜂巢Centos 6.7)推荐宽带:10M 以上更新时间:2016-03-12授权码:sbwml.cn(脚本仅供娱乐,禁止商业用途)1) 使用 root 账号登录 Linux 服务器。2)执行一键安装脚本(需要密钥):如果提示出错 bash: wget: command not found 请执行 yum -y install wget3) 根据终端返回提示完成安装配置。4) 安装完成后,复制终端输出的地址并下载链接中的配置文件。 5) 解压下载的压缩包,提取OpenVPN.ovpn。CA证书:ca.crtTLS密钥:ta.key成品配置文件:OpenVPN.ovpn
服务器端安装openvpn在这里http://swupdate.openvpn.org/community/releases/openvpn-install-2.3.4-I004-i686.exe下载openvpn在服务器安装时记得勾选红框中的两个选项安装完成后编辑C:\Program Files (x86)\OpenVPN\easy-rsa目录下的vars.bat.sample文件,修改如下内容然后切换到如下目录cd /D C:\Program Files (x86)\OpenVPN\easy-rsainit-configvarsclean-all生成根证书:build-cabuild-dh生成服务端证书:build-key-server server  生成客户端证书build-key client1将生成的(C:\Program Files (x86)\OpenVPN\easy-rsa\keys 目录下)ca.crt,dh1024.pem,server.crt,server.key复制到C:\Program Files (x86)\OpenVPN\config下在C:\Program Files (x86)\OpenVPN\config创建server.ovpn文件编辑该文件写入一下内容右mode serverlocal 118.184.23.131   port 1194proto udpdev tunca ca.crtcert server.crtkey server.key # This file should be kept secretdh dh1024.pemserver 172.16.1.0 255.255.255.0ifconfig-pool-persist ipp.txtpush "route 0.0.0.0 0.0.0.0"     push "redirect-gateway def1 bypass-dhcp&qu...
FreeRadius记录登陆的错误信息到数据库 在modules里面添加attr_rewrite,内容为attr_rewrite sanereplymessage {attribute = Reply-Messagesearchin = replysearchfor = "\n|\r"replacewith = ""ignore_case = nonew_attribute = nomax_matches = 10append = no}12345678910attr_rewrite sanereplymessage { attribute = Reply-Message searchin = reply searchfor = "\n|\r" replacewith = "" ignore_case = no new_attribute = no max_matches = 10 append = no}然后修改default,在sql前面增加sanereplymessagePost-Auth-Type REJECT {..sanereplymessagesql..}123456Post-Auth-Type REJECT { .. sanereplymessage sql .. }最后按照FreeRADIUS 2.x 记录认证者信息 修改usr/local/etc/raddb/sql/mysql/dialup.confpostauth_query = "INSERT INTO ${postauth_table} \ (username, pass, reply, authdate, calledstationid, nasipaddress, replymessage) \ VALUES ( \ '%{User-Name}', \ '%{%{User-Password}:...
 
0
FreeRADIUS 2.x默认在数据库只记录用户名,密码,认证时间等信息,但没有访问IP和连接VPN的IP,为了更好的监控,所以添加记录验证者的ip和连接vpn的IP。首先给FreeRADIUS数据库的radpostauth表添加2个字段 calledstationid和nasipaddress。然后修改 /usr/local/etc/raddb/sql/mysql/dialup.conf ,将最后的认证信息修改为: postauth_query = "INSERT INTO ${postauth_table} \ (username, pass, reply, authdate, calledstationid, nasipaddress) \ VALUES ( \ '%{User-Name}', \ '%{%{User-Password}:-%{Chap-Password}}', \ '%{reply:Packet-Type}', '%S', '%{Calling-Station-Id}', '%{NAS-IP-Address}')"123456 postauth_query = "INSERT INTO ${postauth_table} \                          (username, pass, reply, authdate, calledstationid, nasipaddress) \  &nb...
 安装freeradius 2.x和freeradius 3.x,测试连接都无法通过,错误如下 freeradius 2.x 提示的错误radclient:: Failed to find IP address for Excaliburradclient: Nothing to send.12radclient:: Failed to find IP address for Excaliburradclient: Nothing to send. freeradius 3.x 提示的错误(0) Error parsing "-": ip_hton: Name or service not known1(0) Error parsing "-": ip_hton: Name or service not known 解决方法很简单给/etc/hosts添加主机名解析就可以vi /etc/hosts添加:127.0.0.1 servername或者运行以下语句cat >>/etc/hosts<<EOF127.0.0.1 `hostname`EOF123cat >>/etc/hosts<<EOF127.0.0.1 `hostname`EOF
H3C S5048E web不能配置端口链路汇聚在web中配置链路汇聚 手工模式时,添加端口状态都是不能添加的状态。通过控制口,查看当然运行配置信息如:interface GigabitEthernet0/47 speed 1000 controller arp enable undo arp detection trust arp rate-limit 15 port link-aggregation group 1 dhcp-snooping trust#interface GigabitEthernet0/48 speed 1000 controller arp enable  undo arp detection trust arp rate-limit 15 dhcp-snooping trust#然后通过命令配置聚合, #: port link-aggregation group 1 mode manaul提示打开controller arp enable 命令,不能配置聚合。#: undo controller arp 再配置端口聚合,可以正常配置。#: port link-aggregation group 1 mode manaul# interface GigabitEthernet 0/48#: port link-aggregation group 1# interface GigabitEthernet 0/47#: port link-aggregation group 1再到web中查看配置,已经添加好了端口聚合。配置关键点:1.同一个汇聚组中端口的基本配置必须保持一致,基本配置主要包括STP、QoS、VLAN、端口属性等相关配置;2.对于端口环回监测(loopback-detect...
华为S2700 交换机,web操作时,不小心操作错误了。配置文件中接口显示:undo port hybrid vlan 1查看文件说明如下:port hybrid pvid vlan vlan-idundo port hybrid pvid【视图】以太网端口视图/端口组视图【参数】vlan-id:指定接口的缺省的VLAN ID,取值范围为1~4094。【描述】port hybrid pvid vlan命令用来设置Hybrid端口的缺省VLAN ID。undo port hybrid pvid命令用来恢复缺省情况。缺省情况下,Hybrid端口的缺省VLAN为VLAN1。对Hybrid端口,执行undo vlan命令删除端口的缺省VLAN后,端口的缺省VLAN配置不会改变,即可以使用已经不存在的VLAN作为缺省VLAN。在以太网端口视图下执行该命令,则该配置只在当前端口生效;在端口组视图下执行该命令,则该配置将在端口组中的所有端口生效 配置Vlan时,怎么也添加不了,提示端口有错误。使用以下两条命令解决。port hybrid tagged vlan 1port hybrid untagged vlan 1 然后再配置vlan,将接口配置成access模式,再创建vlan ,然后添加进vlan中,测试同一vlan可以互通,与其它端口不通
CentOS 6安装lnmp+pptp+freeradius+daloradius   在CentOS 6系统上安装lnmp + pptp + freeradius + daloradius的过程,已在原生CentOS 6、Linode、digitalocen等VPS上测试过均无问题。一,安装LNMP地址见http://lnmp.org/install.html,发布本文时,博主本人安装的是lnmp1.0版安装完成需要作一些简单的优化,DaloRADIUS需要PEAR的DB插件,原生的LNMP并未安装pear,故这里也需要安装编辑/usr/local/php/etc/php.ini,找到disable_functions,去掉scandir、fsockopen函数ln -s /usr/local/php/etc/php.ini /etc/php.iniwget http://pear.php.net/go-pear.pharphp -f go-pear.phar按1(修改Installation base),输入/usr/local/pear按5(修改PHP code directory),输入/usr/local/php/share/pear按9(修改Public Web Files directory),输入/home/wwwroot然后回车,提示alter php.ini,选择Y,一路回车 检查一下/usr/local/php/etc/php.ini,检查如下一行,如果没有就加上include_path=".:/usr/local/php/share/pear" ln -s /usr/local/pear/bin/pear /usr/bin/pearpear install DB/etc/init.d/php-fpm reload二,安装pptp vpnwget http:/...
一、安装(一条命令解决了)   yum install openswan ppp xl2tpd喜欢源码安装的朋友可去去 http://pkgs.org  去下载相就的源码包。 二、配置1.编辑/etc/ipsec.conf   vim /etc/ipsec.conf   把下面xx.xxx.xxx.xxx换成你自己VPS实际的外网固定IP。其他的不动。config setup    nat_traversal=yes    virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12    oe=off    protostack=netkey conn L2TP-PSK-NAT    rightsubnet=vhost:%priv    also=L2TP-PSK-noNAT conn L2TP-PSK-noNAT    authby=secret    pfs=no    auto=add    keyingtries=3    rekey=no    ikelifetime=8h    keylife=1h    type=transport    left=xx.xxx.xxx.xxx    leftprotoport=17/1701    right=%any    rightprotoport=17/%any 2.编辑/etc/ipsec.secrets   vim /etc/ipsec.secrets192.168.1.100 %any: PSK &...
    总共15页,当前第4页 | 页数:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14