OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network
- Autorzy:
- Open VPN Solutions, Jan Just Keijser
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 356
- Dostępne formaty:
-
PDFePubMobi
Opis ebooka: OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network
Wybrane bestsellery
-
OpenVPN provides an extensible VPN framework that has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, and supporting alternative authentication methods via OpenVPN’s plugin module interface. Thi...
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
You will be able to build secure private networks across the internet and hostile networks with confidence.
Mastering OpenVPN. Master building and integrating secure private networks using OpenVPN Mastering OpenVPN. Master building and integrating secure private networks using OpenVPN
-
OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations...
OpenVPN: Building and Integrating Virtual Private Networks. Learn how to build secure VPNs using this powerful Open Source application OpenVPN: Building and Integrating Virtual Private Networks. Learn how to build secure VPNs using this powerful Open Source application
-
Мова Python сьогодні відома у всьому світі. Вона з...
Head First. Python. Легкий для сприйняття довідник Head First. Python. Легкий для сприйняття довідник
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
Ця книжка познайомить вас з особливостями Jav...
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions. It empowers architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
O autorze ebooka
Ebooka "OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- Tytuł oryginału:
- OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network.
- ISBN Ebooka:
- 978-18-495-1011-0, 9781849510110
- Data wydania ebooka:
- 2011-02-17 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku Pdf:
- 7.5MB
- Rozmiar pliku ePub:
- 7.0MB
- Rozmiar pliku Mobi:
- 11.0MB
Spis treści ebooka
- OpenVPN 2 Cookbook
- Table of Contents
- OpenVPN 2 Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Point-to-Point Networks
- Introduction
- Shortest setup possible
- Getting ready
- How to do it...
- How it works...
- Theres more...
- Using the TCP protocol
- Forwarding non-IP traffic over the tunnel
- OpenVPN secret keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Multiple secret keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Plaintext tunnel
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing issues
- Automating the setup
- See also
- Configuration files versus the command-line
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenVPN 2.1 specifics
- Complete site-to-site setup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 3-way routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Scalability
- Routing protocols
- See also
- 2. Client-server IP-only Networks
- Introduction
- Setting up the public and private keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using the easy-rsa scripts on Windows
- Some notes on the different variables
- See also
- Simple configuration
- Getting ready
- How to do it...
- How it works...
- There's more...
- 'net30' addresses
- Server-side routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Linear addresses
- Using the TCP protocol
- Server certificates and ns-cert-type server
- Masquerading
- Using 'client-config-dir' files
- Getting ready
- How to do it...
- How it works...
- There's more...
- Default configuration file
- Troubleshooting
- OpenVPN 2.0 'net30' compatibility
- Allowed options in a 'client-config-dir' file
- Routing: subnets on both sides
- Getting ready
- How to do it...
- How it works...
- There's more...
- Masquerading
- Client-to-client subnet routing
- See also
- Redirecting the default gateway
- Getting ready
- How to do it...
- How it works...
- There's more...
- Redirect-gateway parameters
- Split tunneling
- See also
- Using an 'ifconfig-pool' block
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuration files on Windows
- Topology subnet
- Client-to-client access
- Using the TCP protocol
- Using the status file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Status parameters
- Disconnecting clients
- Explicit-exit-notify
- Management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Server-side management interface
- See Also
- Proxy-arp
- Getting ready
- How to do it...
- How it works...
- There's more...
- User 'nobody'
- TAP-style networks
- Broadcast traffic might not always work
- See also
- 3. Client-server Ethernet-style Networks
- Introduction
- Simple configurationnon-bridged
- Getting ready
- How to do it...
- How it works...
- There's more...
- Differences between TUN and TAP
- Using the TCP protocol
- Making IP fowarding permanent
- See also
- Enabling client-to-client traffic
- Getting ready
- How to do it...
- How it works...
- There's more...
- Broadcast traffic may affect scalability
- Filtering traffic
- TUN-style networks
- BridgingLinux
- Getting ready
- How to do it...
- How it works...
- There's more...
- Fixed addresses & the default gateway
- Name resolution
- See also
- BridgingWindows
- Getting ready
- How to do it...
- How it works...
- See also
- Checking broadcast and non-IP traffic
- Getting ready
- How to do it...
- How it works...
- External DHCP server
- Getting ready
- How to do it...
- How it works...
- There's more...
- DHCP server configuration
- DHCP relay
- Tweaking the /etc/sysconfig/network-scripts
- Using the status file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Difference with TUN-style networks
- Disconnecting clients
- See also
- Management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Client side management interface
- See also
- 4. PKI, Certificates, and OpenSSL
- Introduction
- Certificate generation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- xCA: a GUI for managing a PKI (Part 1)
- Getting ready
- How to do it...
- How it works...
- There's more...
- xCA : a GUI for managing a PKI (Part 2)
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenSSL tricks: x509, pkcs12, verify output
- Getting ready
- How to do it...
- How it works...
- Revoking certificates
- Getting ready
- How to do it...
- How it works...
- There's more...
- What is needed to revoke a certificate
- See also
- The use of CRLs
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Checking expired/revoked certificates
- Getting ready
- How to do it...
- How it works...
- There's more...
- Intermediary CAs
- Getting ready
- How to do it...
- How it works...
- There's more...
- Multiple CAs: stacking, using --capath
- Getting ready
- How to do it...
- How it works...
- There's more...
- Stacking CRLs
- Using the --capath directive
- 5. Two-factor Authentication with PKCS#11
- Introduction
- Initializing a hardware token
- Getting ready
- How to do it...
- How it works...
- There's more...
- Public and private objects
- OpenSC versus Aladdin PKI Client driver
- Getting a hardware token ID
- Getting ready
- How to do it...
- How it works...
- There's more...
- What about automatic selection?
- PKCS#11 libraries
- Using a hardware token
- Getting ready
- How to do it...
- How it works...
- There's more...
- What is different?
- Using the OpenSC driver
- Using the management interface to list PKCS#11 certificates
- Getting ready
- How to do it...
- How it works...
- See also
- Selecting a PKCS#11 certificate using the management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Generating a key on the hardware token
- Getting ready
- How to do it...
- How it works...
- Private method for getting a PKCS#11 certificate
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Pin caching example
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 6. Scripting and Plugins
- Introduction
- Using a client-side up/down script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Environment variables
- Calling the 'down' script before the connection terminates
- Advanced: verify the remote hostname
- Windows login greeter
- Getting ready
- How to do it...
- How it works...
- There's more...
- Spaces in filenames
- setenv or setenv-safe
- Security considerations
- Using client-connect/client-disconnect scripts
- Getting ready
- How to do it...
- How it works...
- There's more...
- 'client-disconnect' scripts
- Environment variables
- Absolute paths
- Using a 'learn-address' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- User 'nobody'
- The 'update' action
- Using a 'tls-verify' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using an 'auth-user-pass-verify' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Specifying the username and password in a file on the client
- Passing the password via environment variables
- Script order
- Getting ready
- How to do it...
- How it works...
- There's more...
- Script security and logging
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using the 'down-root' plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using the PAM authentication plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 7. Troubleshooting OpenVPN: Configurations
- Introduction
- Cipher mismatches
- Getting ready
- How to do it...
- How it works...
- There's more...
- TUN versus TAP mismatches
- Getting ready
- How to do it...
- How it works...
- Compression mismatches
- Getting ready
- How to do it...
- How it works...
- There's more...
- Key mismatches
- Getting ready
- How to do it...
- How it works...
- See also
- Troubleshooting MTU and tun-mtu issues
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting network connectivity
- Getting ready
- How to do it...
- How it works...
- There's more...
- Troubleshooting 'client-config-dir' issues
- Getting ready
- How to do it...
- How it works...
- There's more...
- More verbose logging
- Other frequent client-config-dir mistakes
- See also
- How to read the OpenVPN log files
- Getting ready
- How to do it...
- How it works...
- There's more...
- 8. Troubleshooting OpenVPN: Routing
- Introduction
- The missing return route
- Getting ready
- How to do it...
- How it works...
- There's more...
- Masquerading
- Adding routes on the LAN hosts
- See also
- Missing return routes when 'iroute' is used
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- All clients function except the OpenVPN endpoints
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Source routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing and permissions on Windows
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting client-to-client traffic routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Understanding the 'MULTI: bad source' warnings
- Getting ready
- How to do it...
- How it works...
- There's more...
- Other occurrences of the 'MULTI: bad source' message
- See also
- Failure when redirecting the default gateway
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 9. Performance Tuning
- Introduction
- Optimizing performance using 'ping'
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Optimizing performance using 'iperf'
- Getting ready
- How to do it...
- How it works...
- There's more...
- Client versus server 'iperf' results
- Network latency
- Gigabit networks
- OpenSSL cipher speed
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Compression tests
- Getting ready
- How to do it...
- How it works...
- There's more...
- Pushing compression options
- Adaptive compression
- Traffic shaping
- Getting ready
- How to do it...
- How it works...
- There's more...
- Tuning UDP-based connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Tuning TCP-based connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- Analyzing performance using tcpdump
- Getting ready
- How to do it...
- How it works...
- See also
- 10. OS Integration
- Introduction
- Linux: using NetworkManager
- Getting ready
- How to do it...
- How it works...
- There's more...
- Setting up routes using NetworkManager
- DNS settings
- Scripting
- Linux: using 'pull-resolv-conf'
- Getting ready
- How to do it...
- How it works...
- There's more...
- MacOS: using Tunnelblick
- Getting ready
- How to do it...
- How it works...
- There's more...
- Name resolution
- Scripting
- Windows Vista/7: elevated privileges
- Getting ready
- How to do it...
- How it works...
- There's more...
- Windows: using the CryptoAPI store
- Getting ready
- How to do it...
- How it works...
- There's more...
- The CA certificate file
- Certificate fingerprint
- Windows: updating the DNS cache
- Getting ready
- How to do it...
- How it works...
- There's more...
- Windows: running OpenVPN as a service
- Getting ready
- How to do it...
- How it works...
- There's more...
- Automatic service startup
- OpenVPN User name
- See also
- Windows: public versus private network adapters
- Getting ready
- How to do it...
- How it works...
- See also
- Windows: routing methods
- Getting ready
- How to do it...
- How it works...
- There's more...
- 11. Advanced Configuration
- Introduction
- Including configuration files in config files
- Getting ready
- How to do it...
- How it works...
- Multiple remotes and remote-random
- Getting ready
- How to do it...
- How it works...
- There's more...
- Mixing TCP and UDP-based setups
- Advantage of using TCP-based connections
- Automatically reverting to the first OpenVPN server
- See also
- Details of ifconfig-pool-persist
- Getting ready
- How to do it...
- How it works...
- There's more...
- Specifying the update interval
- Caveat: the duplicate-cn option
- When 'topology net30' is used
- Connecting using a SOCKS proxy
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performance
- Note #1 on SOCKS proxies via SSH
- Note #2 on SOCKS proxies via SSH
- SOCKS proxies using plain-text authentication
- See also
- Connecting via an HTTP proxy
- Getting ready
- How to do it...
- How it works...
- There's more...
- http-proxy options
- Ducking firewalls
- Performance
- See also
- Connecting via an HTTP proxy with authentication
- Getting ready
- How to do it...
- How it works...
- There's more...
- NTLM proxy authorization
- New features in OpenVPN 2.2
- See also
- Using dyndns
- Getting ready
- How to do it...
- How it works...
- There's more...
- Failover
- NetworkManager and 'ddclient'
- See also
- IP-less setups (ifconfig-noexec)
- Getting ready
- How to do it...
- How it works...
- There's more...
- Point-to-point and TUN-style networks
- Routing and firewalling
- 12. New Features of OpenVPN 2.1 and 2.2
- Introduction
- Inline certificates
- Getting ready
- How to do it...
- How it works...
- Connection blocks
- Getting ready
- How to do it...
- How it works...
- There's more...
- Allowed directives inside connection blocks
- Pitfalls when mixing TCP and UDP-based setups
- See also
- Port sharing with an HTTPS server
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing features: redirect-private, allow-pull-fqdn
- Getting ready
- How to do it...
- How it works...
- There's more...
- The route-nopull directive
- The 'max-routes' directive
- Handing out the public IPs
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- OCSP support
- Getting ready
- How to do it...
- How it works...
- See also
- New for 2.2: the 'x509_user_name' parameter
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenVPN 2.1 behaviour
- Index
Packt Publishing - inne książki
-
Mastering Data transformation is essential for enhancing their data models and business intelligence. The Definitive Guide to Power Query equips you with the knowledge and skills to master the tool while leveraging its remarkable capabilities.
The Definitive Guide to Power Query (M). Mastering complex data transformation with Power Query The Definitive Guide to Power Query (M). Mastering complex data transformation with Power Query
Gregory Deckler, Rick de Groot, Melissa de Korte, Brian Julius
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network Open VPN Solutions, Jan Just Keijser (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.