03-05-2012
Hi Spynappels,
The services that need to be accessible is VPN.
The operating system I'd like to use, is Linux (Centos or Ubuntu).
9 More Discussions You Might Find Interesting
1. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
2. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
3. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
4. UNIX for Advanced & Expert Users
I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies
5. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
6. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies
7. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
8. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
9. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
LEARN ABOUT DEBIAN
gnunet-vpn
GNUNET-VPN(1) General Commands Manual GNUNET-VPN(1)
NAME
gnunet-vpn - manually setup a GNUnet VPN tunnel
SYNOPSIS
gnunet-vpn [options]
DESCRIPTION
gnunet-vpn can be used to manually setup a VPN tunnel via the GNUnet network. There are two main types of tunnels. Tunnels to an exit
node which routes the traffic to the global Internet, and tunnels to a node that runs a service only within GNUnet. Depending on the type
of tunnel, gnunet-vpn takes different options. The "-i" option is required for tunnels to an exit node, whereas the "-p" and "-s" options
in conjunction with either "-u" or "-t" are required for tunnels to services. For exit tunnels, both UDP and TCP traffic will be redi-
rected. For service tunnels, either UDP ("-u") or TCP ("-t") traffic will be redirected.
The tool will display the IP address for this end of the tunnel. The address can be displayed as soon as it has been allocated, or only
after ("-a") the tunnel has been created.
OPTIONS
-4, --ipv4
Desired IP address on this end of the tunnel should be an IPv4 address.
-6, --ipv6
Desired IP address on this end of the tunnel should be an IPv6 address.
-a, --after-connect
Display IP address only after the tunnel is fully connected.
-c FILENAME, --config=FILENAME
Use the configuration file FILENAME.
-d SEC, --duration SEC
The mapping should be established for SEC seconds. Default is 5 minutes.
-h, --help
Print short help on options.
-i IP, --ip IP
Tunnel should be to an exit node and connect to the given IPv4 or IPv6 IP address. Note that you can specify an IPv6 address as the
target here, even in combination with "-4" (4to6) and similarly you can specify an IPv4 address in combination with "-6" (6to4).
-L LOGLEVEL, --loglevel=LOGLEVEL
Use LOGLEVEL for logging. Valid values are DEBUG, INFO, WARNING and ERROR.
-p PEERID, --peer=PEERID
Name of the peer offering the service to connect to. Cannot be used in conjunction with "-i", requires "-s".
-s NAME, --service=NAME
Name of the service running on the target peer. Cannot be used in conjunction with "-i", requires "-p".
-t, --tcp
Service runs TCP. Either "-t" or "-u" must be specified when using "-s".
-u, --udp
Service runs UDP. Either "-t" or "-u" must be specified when using "-s".
-V, --verbose
Be verbose.
-v, --version
Print GNUnet version number.
BUGS
Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic mail to <gnunet-developers@gnu.org>
SEE ALSO
gnunet-setup(1)
GNUnet 25 Feb 2012 GNUNET-VPN(1)