当前位置:网站首页>Deploy L2TP in VPN (Part 2)
Deploy L2TP in VPN (Part 2)
2022-06-24 07:31:00 【Chen Bucheng I】
If some options are not found , Write it directly to the end of the file . After preservation , perform : sysctl -p
2.iptables Rule settings need iptables To forward external requests .sysctl The solution is , A user through ppp After connecting to the server , How does his request map inside the server , therefore , No, iptables, The user configures through the above , You can log in and connect to L2TP VPN 了 , But it's very likely that you can't access the Internet on the connection , Because the external request has not been forwarded , Configure the following to forward . iptables -I INPUT -p udp -m multiport --dports 500,4500,1701 -j ACCEPTiptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPTiptables -I FORWARD -s 192.168.2.0/23 -j ACCEPTiptables -t nat -A POSTROUTING -s 192.168.2.0/23 -j SNAT --to-source xxx.xx.xx.xxiptables save
among 192.168.2.0/23 Is the assigned client address range customizable ,xxx.xx.xx.xx Is the mapped Internet address systemctl restart iptables
3、 ... and . Client connection
1. Meet these conditions
- Make sure that the local router does not vpn The intranet segment of the server In a segment , Otherwise conflict
- windows A pure system must be used
- Make sure you are not currently using the agent software , No wall climbing VPN
2.. Open the network sharing center –> Set up a connection or network – Connect to the workspace
3. Click to use my internet Connect – Enter the address information
4. Enter the username and password – establish
5. Click change adapter settings – Right click VPN, Select Properties
6. Click Security Settings vpn type
6. Click Advanced settings to set the shared secret key
7. Click OK to connect
边栏推荐
- Huawei cloud database advanced learning
- Win11笔记本省电模式怎么开启?Win11电脑节电模式打开方法
- 伦敦金的资金管理比其他都重要
- 【Cnpm】使用教程
- 现货黄金有哪些眩人的小技术?
- In JS, the regular expression verifies the hour and minute, and converts the input string to the corresponding hour and minute
- MFC multithreaded semaphore csemaphore critical area and mutually exclusive events
- The first common node of two linked lists_ The entry of the link in the linked list (Sword finger offer)
- (CVE-2020-11978)Airflow dag中的命令注入漏洞复现【vulhub靶场】
- In the era of industrial Internet, there are no more centers in the real sense, and these centers just turn tangible into intangible
猜你喜欢

取模软件 模拟显示验证取模数据正确性 逆向 把点阵数组bin文件转显示

Unexpected token u in JSON at position 0

In JS, the regular expression verifies the hour and minute, and converts the input string to the corresponding hour and minute

相機標定(標定目的、原理)

Summary of 2022 blue team HW elementary interview questions

bjdctf_ 2020_ babystack
![[WUSTCTF2020]alison_likes_jojo](/img/a9/dcc6f524772cd0b8781289cbaef63f.png)
[WUSTCTF2020]alison_likes_jojo

Tutorial on simple use of Modbus to BACnet gateway
![[pointnet] matlab simulation of 3D point cloud target classification and recognition based on pointnet](/img/86/5db689cdac2a927a23dff3fb9594b0.png)
[pointnet] matlab simulation of 3D point cloud target classification and recognition based on pointnet

利用微搭低代码实现级联选择
随机推荐
【MySQL 使用秘籍】克隆数据表、保存查询数据至数据表以及创建临时表
Analog display of the module taking software verifies the correctness of the module taking data, and reversely converts the bin file of the lattice array to display
【图像融合】基于伪 Wigner 分布 (PWD) 实现图像融合附matlab代码
华为云图引擎服务
Unexpected token u in JSON at position 0
学会使用楼宇控制系统BACnet网关没那么难
bjdctf_2020_babystack
How to delete / select an input method on your computer
MFC multithreaded semaphore csemaphore critical area and mutually exclusive events
Bjdctf 2020 Bar _ Babystack
[WUSTCTF2020]爬
What is an intrusion detection system?
[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
电脑如何打开软键盘,教大家Win10如何打开软键盘的方法
get_started_3dsctf_2016
【Proteus】Arduino UNO + DS1307+LCD1602时间显示
Combine with (& &) logic or (||), dynamic binding and ternary operation
现货黄金有哪些值得借鉴的心态
How to select a third-party software testing company? 2022 ranking of domestic software testing institutions
[image fusion] image fusion based on pseudo Wigner distribution (PWD) with matlab code