Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Setup your own VPN with IPCop and OpenVPN

IPCop

Setup your own VPN with IPCop and OpenVPN

Post date: March 30, 2006, 17:03 Category: Network Views: 9710 Comments
Tutorial quote: I ’m a huge fan of IPCop. It’s a great firewall distro that makes administration a snap using a slick web interface. My goal was to use IPCop and an easy-to-use VPN client to allow access to my LAN while away from home.

I ended up going with the ZERINA OpenVPN addon for IPCop and the OpenVPN GUI for Windows.

If you’ve ever wanted full, secure, encrypted access to your LAN from any remote location, here is your guide.

Just follow these ten easy steps…
OpenSolaris

Installing and Configuring OpenVPN in OpenSolaris

Post date: December 20, 2009, 16:12 Category: Software Views: 4418 Comments
Tutorial quote: Learn to install and configure the free OpenVPN software package under OpenSolaris. OpenVPN is an opensource VPN solution using SSL for encryption and certificate authentication. The tutorial teaches how to install & configure OpenVPN and create certificates for authentication.
Unix+clones

Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux

Post date: January 2, 2007, 19:01 Category: Security Views: 4046 Comments
Tutorial quote: WEP is insecure and having different WPA authentications at different Access Points can be a pain. Why not centralize all your meeting rooms with OpenVPN to a central server? This tutorial gets you up to speed.
Unix+clones

The 'no-configuration, only-active-when-needed' SSH VPN

Post date: April 13, 2005, 03:04 Category: Network Views: 2680 Comments
Tutorial quote: So, we started thinking about how we might set up a VPN between the application server and our internal software mirror. The only requirement is that the VPN be initiated from the "inside-out" and that the connection is only active for as long as we need to use. In other words, it would only be active during an administration session. Ideally, it wouldn't be a lot of work to setup and tear down either.

SSH to the rescue...

Fortunately, SSH client and server come with support for this out of the box, requiring no additional software to be installed, and no configuration changes. On the server side, sshd, the setting "AllowTcpForwarding" defaults to "yes" unless your sshd_config file explicitly disables it. On the client side, all you have to do is request the forwarding.
OpenBSD

Creating secure wireless access points with OpenBSD and OpenVPN

Post date: December 13, 2005, 18:12 Category: Network Views: 7886 Comments
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
Lintrack

Lintrack As A LAN Gateway And An OpenVPN Bridge

Post date: May 9, 2007, 22:05 Category: Installing Views: 6553 Comments
Tutorial quote: This tutorial will guide you through the installation and configuration of Lintrack, a GNU/Linux distribution specialized in networking tasks. We will give two LANs access to the internet along with DHCP and DNS cache servers, and then we will connect our networks using OpenVPN in bridging mode. You should be running all these in well under an hour, thanks to the unified configuration interface of Lintrack.
Ubuntu

Anonymous BitTorrent Using ItsHidden VPN

Post date: July 28, 2009, 18:07 Category: Benchmarks Views: 4051 Comments
Tutorial quote: With anti-piracy outfits warning those who share copyrighted content and ISPs threatening to pull the plug on alleged offenders, many file-sharers have decided to protect themselves by going anonymous. To accommodate this growing demand, ItsHidden is now offering a free VPN targeted at those who want to protect their privacy online. Named ItsHidden, the free VPN solution has opened up a BETA test to the public, who can now privatize their Internet traffic - including BitTorrent transfers - in next to no time. ItsHidden was set up with torrent users in mind, allowing them to hide their identities from third parties who choose to snoop on their activities.
Linux

NFS over CIPE-VPN tunnels

Post date: May 23, 2005, 16:05 Category: Network Views: 2845 Comments
Tutorial quote: The Network File System (NFS) is a standard protocol for sharing file services with Linux and Unix computers. It is a distributed file system that enables local access to remote disks and file systems and is based on the client\server architecture. Although easy to configure, it is typically used only to transfer data over an intranet or LAN because of its transparency and security potholes when exposed to the risks of the Internet. However, it still can be employed -- without compromising security -- to share files over the Internet by configuring it to run on a Virtual Private Network (VPN) connection. This article will show you how to set up NFS to run over a CIPE-VPN connection between two Linux systems.
Debian

Complete Debian Linux Server Setup Guide

Post date: March 15, 2006, 00:03 Category: Installing Views: 5253 Comments
Tutorial quote: This tutorial includes debian Installation,FTP Server Setup,Webserver Setup,Samba Server Setup,Database Server Setup,time clock sync server,
Mail Server Configuration,VNC Server setup,Proxy Server Setup,SSH Server Setup,tftp Server Setup,DHCP Server Setup,
IPtables Configuration,DNS Server Setup,Firewalls configuration,Backup configuration
Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3402 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
Web-based applications and online marketing solutions - LumoLink