User Tools

Site Tools


sdf_s_vpn_servers

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
sdf_s_vpn_servers [2024/09/18 06:11] – **” hc9sdf_s_vpn_servers [2024/09/18 06:22] (current) – alt hc9
Line 194: Line 194:
 Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**: Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**:
  
-{{ :sdf_s_vpn_servers:vpn1.png?nolink |}}+{{ :sdf_s_vpn_servers:vpn1.png?nolink |image alternative text goes here}}
  
-{{ :sdf_s_vpn_servers:vpn4.png?nolink |}}+{{ :sdf_s_vpn_servers:vpn4.png?nolink |image alternative text goes here}}
  
 Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setting_it_up|from when you ran setvpn]]): Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setting_it_up|from when you ran setvpn]]):
  
-{{ :sdf_s_vpn_servers:vpn2.png?nolink |}}+{{ :sdf_s_vpn_servers:vpn2.png?nolink |image alternative text goes here}}
  
 Now click on **Advanced**: Now click on **Advanced**:
  
-{{ :sdf_s_vpn_servers:vpn3.png?nolink |}}+{{ :sdf_s_vpn_servers:vpn3.png?nolink |image alternative text goes here}}
  
 Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro. Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro.
Line 212: Line 212:
 If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted. If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted.
  
-{{ :sdf_s_vpn_servers:vpn5.png?nolink |}}+{{ :sdf_s_vpn_servers:vpn5.png?nolink |image alternative text goes here}}
  
 ===== Connecting in OpenWRT ===== ===== Connecting in OpenWRT =====
Line 371: Line 371:
   - Open Viscosity's preferences window.   - Open Viscosity's preferences window.
   - Create a new connection   - Create a new connection
-    - {{:sdf_s_vpn_servers:viscosity1.png?nolink&500|}}+    - {{:sdf_s_vpn_servers:viscosity1.png?nolink&500|image alternative text goes here}}
   - In the New Connection window,   - In the New Connection window,
     - Give your connection a name     - Give your connection a name
Line 377: Line 377:
     - Make sure protocol is set to **tap** not **tun**     - Make sure protocol is set to **tap** not **tun**
     - Uncheck **Enable DHCP**.     - Uncheck **Enable DHCP**.
-    - {{:sdf_s_vpn_servers:viscosity2.png?nolink&500|}}+    - {{:sdf_s_vpn_servers:viscosity2.png?nolink&500|image alternative text goes here}}
   - Move on to the Authentication tab|   - Move on to the Authentication tab|
     - You will need to copy the certificates and keys you received in e-mail to a //SECURE// location on your //local// disk.     - You will need to copy the certificates and keys you received in e-mail to a //SECURE// location on your //local// disk.
     - Select the appropriate certificate or key for each of the three SLL file locations     - Select the appropriate certificate or key for each of the three SLL file locations
-    - {{:sdf_s_vpn_servers:viscosity4.png?nolink&500|}}+    - {{:sdf_s_vpn_servers:viscosity4.png?nolink&500|image alternative text goes here}}
   - Now move to the Options tab   - Now move to the Options tab
   - Set LZO Compression to **On** or **On (Adaptive)**   - Set LZO Compression to **On** or **On (Adaptive)**
-    - {{:sdf_s_vpn_servers:viscosity5.png?nolink&500|}}+    - {{:sdf_s_vpn_servers:viscosity5.png?nolink&500|image alternative text goes here}}
  
 That's it! Hit Save, and you're ready to roll securely through the SDF VPN. That's it! Hit Save, and you're ready to roll securely through the SDF VPN.
sdf_s_vpn_servers.txt · Last modified: 2024/09/18 06:22 by hc9