Moxa V2403-C3-W-T [33/90] Openvpn show ciphers openvpn show auths

Moxa V2403-C7-W-T [33/90] Openvpn show ciphers openvpn show auths
V2403 Series Linux Software Managing Communications
3-18
eth_broadcast=“192.168.8.255”
#gw=“192.168.8.173”
...
Start the bridge script file to configure the bridge interface.
# /etc/openvpn/bridge restart
ATTENTION
Select cipher and authentication
algorithms by specifying cipher and auth. To see which algorithms are
available, type:
# openvpn
--show-ciphers
# openvpn --show-auths
7. Start both OpenVPN peers on machine OpenVPN A and OpenVPN B.
# openvpn --config /etc/openvpn/tap0-br.conf&
If you see the line Peer Connection Initiated with 192.168.8.173:5000on each machine, the
connection between OpenVPN machines has been established successfully on UDP port 5000.
ATTENTION
You can create link symbols to start
the OpenVPN service at boot time:
# ln
-sf /etc/init.d/openvpn /etc/rc2.d/S16openvpn
To stop the service, you should create these links:
# ln
-sf /etc/init.d/openvpn /etc/rc0.d/K80openvpn
# ln -sf /etc/init.d/openvpn /etc/rc6.d/K80openvpn
8. On each OpenVPN machine, check the routing table by typing the command
# route
Destination Gateway Genmsk Flags Metric Ref Use Iface
192.168.5.0 0.0.0.0 255.255.255.0 U 0 0 0 eth2
192.168.4.0 0.0.0.0 255.255.255.0 U 0 0 0 br0
192.168.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
192.168.30.0 0.0.0.0 255.255.255.0 U 0 0 0 eth3
192.168.8.0 0.0.0.0 255.255.255.0 U 0 0 0 br0
Interface eth1 and device tap0 both connect to the bridging interface, and the virtual device tun sits on top
of tap0. This ensures that all traffic coming to this bridge from internal networks connected to interface
eth1 write to the TAP/TUN device that the OpenVPN program monitors. Once the OpenVPN program detects
traffic on the virtual device, it sends the traffic to its peer.
9. To create an indirect connection to Host B from Host A, you need to add the following routing item:
# route add –net 192.168.4.0 netmask 255.255.255.0 dev eth0
To create an indirect connection to Host A from Host B, you need to add the following routing item:
# route add –net 192.168.2.0 netmask 255.255.255.0 dev eth0
Now ping Host B from Host A by typing:
# ping 192.168.4.174
A successful ping indicates that you have created a VPN system that only allows authorized users from one
internal network to access users at the remote site. For this system, all data is transmitted by UDP packets
on port 5000 between OpenVPN peers.
10. To shut down OpenVPN programs, type the command:
# killall -TERM openvpn

Содержание

Похожие устройства

Скачать