Difference between revisions of "Pomo as OpenVPN server"
From Tech
Jump to navigationJump to search(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
* using OpenVPN, see [http://wiki.debian.org/OpenVPN wiki.debian.org OpenVPN] on how to set up |
* using OpenVPN, see [http://wiki.debian.org/OpenVPN wiki.debian.org OpenVPN] on how to set up |
||
* For NAT, using iptables, and the script from [http://www.debian-administration.org/articles/23 debian-administration.org] |
* For NAT, using iptables, and the script from [http://www.debian-administration.org/articles/23 debian-administration.org] |
||
+ | =iptables= |
||
− | |||
For iptables, I'm using this <tt>/etc/init.d/iptables</tt> script: |
For iptables, I'm using this <tt>/etc/init.d/iptables</tt> script: |
||
Line 45: | Line 45: | ||
;; |
;; |
||
esac</nowiki> |
esac</nowiki> |
||
+ | |||
+ | =openvpn= |
||
+ | Using [https://play.google.com/store/apps/details?id=de.blinkt.openvpn openvpn android app]. This apparently doesn't work with the static config, but it does work with the TLS certificated generated by [http://wiki.debian.org/OpenVPN wiki.debian.org OpenVPN]. The certs are in <tt>/etc/openvpn</tt> on my nexus 7 |
Latest revision as of 14:23, 26 December 2012
- using OpenVPN, see wiki.debian.org OpenVPN on how to set up
- For NAT, using iptables, and the script from debian-administration.org
iptables
For iptables, I'm using this /etc/init.d/iptables script:
#!/bin/sh PATH=/usr/sbin:/sbin:/bin:/usr/bin EXT=eth0 INT=tun1 # # delete all existing rules. # iptables -F iptables -t nat -F iptables -t mangle -F iptables -X case $1 in start|restart) # Always accept loopback traffic iptables -A INPUT -i lo -j ACCEPT # Allow established connections, and those not coming from the outside iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -m state --state NEW ! -i $EXT -j ACCEPT iptables -A FORWARD -i $EXT -o $INT -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow outgoing connections from the LAN side. iptables -A FORWARD -i $INT -o $EXT -j ACCEPT # Masquerade. iptables -t nat -A POSTROUTING -o $EXT -j MASQUERADE # Don't forward from the outside to the inside. iptables -A FORWARD -i $EXT -o $EXT -j REJECT # Enable routing. echo 1 > /proc/sys/net/ipv4/ip_forward ;; stop) echo 0 > /proc/sys/net/ipv4/ip_forward ;; esac
openvpn
Using openvpn android app. This apparently doesn't work with the static config, but it does work with the TLS certificated generated by wiki.debian.org OpenVPN. The certs are in /etc/openvpn on my nexus 7