本站用于记录日常工作内容,虚拟化云计算,系统运维,数据库DBA,网络与安全。
Using StrongSwan for IPSec VPN on CentOS 7StrongSwan is an open source IPsec-based VPN Solution. It supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel. This tutorial will show you how to use strongSwan to set up an IPSec VPN server on CentOS 7.Install strongSwanThe strongSwan packages are available in the Extra Packages for Enterprise Linux (EPEL) repository. We should enable EPEL first, then install strongSwan.yum install http://ftp.nluug.nl/pub/os/Linux/distr/fedora-epel/7/x86_64/e/epel-release-7-5.noarch.rpm yum install strongSwan openssl Generate certificatesBoth the VPN client and server need a certificate to identify and authenticate themselves. I have prepared two shell scripts to generate and sign the certificates. First, we download these two scripts into the folder /etc/strongswan/ipsec.d.cd /etc/strongswan/ipsec.d wget https://raw.githubusercontent.com/michael-loo/strongswan_config/for_vultr/serv...
CentOS7下Strongswan架设IPSec-IKEv1, IKEv2, L2TP VPN,适用于 IOS9,OSX, Windows, LinuxVPN 隧道协议PPTP、L2TP、IPSec和SSLVPN(SSTP,OpenVPN)中安全性逐级提高,相应的受到墙的干扰相对要弱点,但是现在我们考虑到跨平台,PPTP穿透力及安全性可以忽略,所以这里搭建支持 ikev1/ikev2 的 Ipsec VPN,适用于iOS、Android、Windows 7+ 、MacOS X,及Linux。为了兼容Windows 7以下的系统,同时搭建L2TP/IPSec支持。支持IOS9 IKEV2 的配置,直接到最后查看2015.12更新安装 StrongSwan由于Openswan已经没人维护了,所以我们选择更强大的Strongswan.它是一个完整的2.4和2.6的Linux内核下的IPsec和IKEv1 的实现。它也完全支持新的IKEv2协议的Linux 2.6内核。StrongSwan 的发行版已包含在 EPEL 源中, 但是CentOS源的包比较旧,所以我们手动在官网https://www.strongswan.org/download.html下载安装包,当然你也可以直接源码编译。wget http://dl.fedoraproject.org/pub/epel/7/x86_64/s/strongswan-5.3.2-1.el7.x86_64.rpm rpm -ihv strongswan-5.3.2-1.el7.x86_64.rpm编译:wget http://download.strongswan.org/strongswan.tar.gz tar xzf strongswan.tar.gz cd strongswan-*...
在 CentOS 7 上部署 L2TP/IPSec VPN 服务 首先安装strongswan和xl2tpd: Shell yum install strongswan xl2tpd 记得开启IP转发,修改 /etc/sysctl.conf,将net.ipv4.ip_forward的值改为1,然后执行 sysctl - p 使之生效。 接下来修改 /etc/strongswan/ipsec.conf文件,如下: config setup conn %default ikelifetime=60m keylife=20m rekeymargin=3m keyingtries=1 conn l2tp keyexchange=ikev1 # IKE版本 left=<对外IP> leftsubnet=0.0.0.0/0 leftprotoport=17/1701 authby=secret leftfirewall=no right=%any rightprotoport=17/%any type=transport auto=add 修改 /etc/strongswan/ipsec.secrets文件(没有此文件就新建一个): # ipsec.secrets - strongSwan IPsec secrets file : PSK " " IPsec的部分就完成了,接下来是L2TP。 /etc/xl2tpd/xl2tpd.conf文件的 [lns default] 部分如下: [lns default] ip range = 10....
This is a guide on setting up an IPSEC VPN server on CentOS 7 using StrongSwan as the IPsec server and for authentication. It has a detailed explanation with every step. We choose the IPSEC protocol stack because of recent vulnerabilities found in pptpd VPNs and because it is supported on all recent operating systems by default. Why a VPN?More than ever, your freedom and privacy when online is under threat. Governments and ISPs want to control what you can and can't see while keeping a record of everything you do, and even the shady-looking guy lurking around your coffee shop or the airport gate can grab your bank details easier than you may think. A self hosted VPN lets you surf the web the way it was intended: anonymously and without oversight.A VPN (virtual private network) creates a secure, encrypted tunnel through which all of your online data passes back and forth. Any application that requires an internet connection works with this self hosted VPN, including your web browser, e...
Configuring Remote Administration The VisualSVN Server Manager console uses Windows Management Instrumentation (WMI) for remote administration. Connecting to WMI on a remote computer requires that Windows Firewall and security settings be configured properly on the server. The following configuration steps apply to domain and non-domain environments. Non-domain environments may require additional steps. The following main steps enable VisualSVN Server Remote Administration: Configure the Windows Firewall rules to allow network connections to WMI,Grant appropriate user access permissions. Windows Firewall Connecting to WMI remotely requires that you first configure the Windows Firewall on the server to allow this. Incorrect Windows Firewall settings are usually identified by receiving the "RPC Server Unavailable" error message when trying to remotely ...
您所在的组无权查看该日志
haproxy 代理 ssl 有两种方式 1、haproxy 本身提供ssl 证书,后面的web 服务器走正常的http 2、haproxy 本身只提供代理,后面的web服务器https 第一种方式 需要编译haproxy 支持ssl, 编译参数:      make TARGET=linux26 USE_OPENSSL=1 ADDLIB=-lz ldd haproxy | grep ssl libssl.so.10 => /usr/lib64/libssl.so.10 (0x00007fb0485e5000) 配置参数: frontend https_frontend bind *:443 ssl crt /etc/ssl/certs/servername.pem mode http option httpclose option forwardfor reqadd X-Forwarded-Proto:\ https default_backend web_server backend web_server mode http balance roundrobin cookie SERVERID insert indirect nocache server s1 192.168.250.47:80 check cookie s1 server s2 192.168.250.49:80 check cookie s2 注意:这里的pem 文件是下面两个文件合并而成: cat servername.crt servername.key |tee servername.pem 第二种方式配置 不需要重新编译支持ssl,简单方便。需要后面的web服务器配置好ssl 即可。 frontend https_frontend bind *:443 mode ...
 
0
在 HAproxy 1.5 中使用 SSL 证书 返回原文英文原文:Using SSL Certificates with HAProxy Overview If your application makes use of SSL certificates, then some decisions need to be made about how to use them with a load balancer. A simple setup of one server usually sees a client's SSL connection being decrypted by the server receiving the request. Because a load balancer sits between a client and one or more servers, where the SSL connection is decrypted becomes a concern. 译者信息 概述 如果你的应用使用SSL证书,则需要决定如何在负载均衡器上使用它们。 单服务器的简单配置通常是考虑客户端SSL连接如何被接收请求的服务器解码。由于负载均衡器处在客户端和更多服务器之间,SSL连接解码就成了需要关注的焦点。 There are two main strategies. SSL Termination is the practice of terminating/decrypting an SSL connection at the load balancer, and sending unencrypted connections to the backend servers. This means...
您所在的组无权查看该日志
CENTOS 搭建SVN服务器(附自动部署到远程WEB)  安装subversion服务端01# 安装02yum install -y subversion03 04# 测试是否安装成功 如果显示了版本信息则表示安装成功05svnserve --version;sleep 5s06 07# svn配置建立svn版本库目录可建多个:08PATHSSS="/home/svn"09echo SVN仓库将创建在:$PATHSSS;sleep 5s10 11# 新建一个版本库目录12mkdir -p $PATHSSS13cd $PATHSSS14# 建立svn版本库:15svnadmin create $PATHSSS16 17# 先设置passwd18cat >$PATHSSS/conf/passwd<<ANGIE.K19[users]20jianglinzhi = jianglinzhi21root1 = root22ANGIE.K23 24# 再设置权限authz25cat >$PATHSSS/conf/authz<<ANGIE.K26[groups] #用户组27admin = jianglinzhi,root128coder = coders1,coders2,coders329ui_and_ue = ui1,ui2,ui330[/] #/仓库权限31@admin = rw32@coder = rw33@ui_and_ue = rw34ANGIE.K35 36# 最后设定svnserve.conf37cat >$PATHSSS/conf/svnserve.conf<<ANGIE.K38[general]39# 使非授权用户无法访问40anon-access = none41# 使授权用户有写权限42auth-access = write43# 用户密码文件44password-d...
    总共46页,当前第23页 | 页数:
  1. 13
  2. 14
  3. 15
  4. 16
  5. 17
  6. 18
  7. 19
  8. 20
  9. 21
  10. 22
  11. 23
  12. 24
  13. 25
  14. 26
  15. 27
  16. 28
  17. 29
  18. 30
  19. 31
  20. 32
  21. 33