Mga bossing baka may interesado dyan ..I
made my own wi-free/proxpn server.Pwede mo connect my mobile/3G usb
using Proxpn/openvpn client sa server at access my Server-side LAn
resources and of course free Internet..requirements:
1. First you need to check if your ip is routable or natted..go to your router internet status and go to http://whatismyipaddress.com .. dapat parehas yung ip ng router at sa whatismyipaddress site..if not di pwede gawin..
| This image has been resized. Click this bar to view the full image. The original image is sized 1115x590. |
2.Next if may public ip ka,,magport forward tayo dun sa router natin
para sa listening port ng vpn server natin,,default ay 1194 udp
proto,,iset sa 443 tcp or 53 udp..exmple ko server ip ko 10.0.1.1
http://www.symbianize.com/attachment.php?
3.Install natin openvpn server if windows pwede rin or linux..gamit ko linux server.
a.
linux server 1.First, become root (sudo su -) and then install the following:
#sudo echo "1" > /proc/sys/net/ipv4/ip_foward <-- ipforward gawin natin router yung server natin
#iptables -t nat -A POSTROUTING -s 172.168.0.0/24 -o eth0 -j MASQUERADE < -- Natting enable
#apt-get install openvpn dnsmasq openssl
#mkdir /etc/openvpn
#cp /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /etc/openvpn/
#cd /etc/openvpn/
#mkdir keys
#nano vars <---- enter nyo details ng server
sample vars
Quote:
# These are the default values for fields # which will be placed in the certificate. # Don't leave any of these fields blank. export KEY_COUNTRY="PH" export KEY_PROVINCE="MNL" export KEY_CITY="MNL" export KEY_ORG="MYVPNSERVER" export KEY_EMAIL="youremail@gmail.com" |
#./clean-all
#source ./vars
#./build-ca <--eto yung CA = cert authority,,press enter lang sa default settings common name ex. Admin
#./build-key-server server <-- server key enter common name ex. myvpnserver
#./build-key remoteclient <-- client key enter common name ex. remoteclient
#./build-dh <-- takes time w8 niyo lang
#cp ca.crt /etc/openvpn/keys
#cp server.crt /etc/openvpn/keys
#cp server.key /etc/openvpn/keys
#nano server.conf <-- config settings ng vpn server
sample server.conf
Quote:
#
# Local address to listen on. i.e. the OpenVPN server's LAN address local 10.0.1.1
# The OpenVPN listening port port 53
# Protocol used to transmit between OpenVPN nodes proto udp
# Interface for the OpevVPN tunnel dev tun
# Required keys and certificates ca /etc/openvpn/keys/ca.crt cert /etc/openvpn/keys/server.crt key /etc/openvpn/keys/server.key # This file should be kept secret dh /etc/openvpn/dh1024.pem
# vpn subnet. server 172.16.0.0 255.255.255.0
# Create a file for persistent IP addresses. Helpful for intermittent connections. ifconfig-pool-persist /etc/openvpn/ipp.txt
# Periodically check connectivity through the tunnel and restart if connectivity # is lost keepalive 10 600 ping-timer-rem
# Cipher to use for encryption cipher BF-CBC # Blowfish (default) auth SHA1 max-clients 4
# Downgrade to an unpriviledged user for security after initialization user nobody group nogroup
# Use a persistent key and tunnel interface. Helpful if running as an # unpriviledged user and the connection goes down. persist-key persist-tun comp-lzo
# Log location and verbosity level status /var/log/openvpn-status.log verb 5
# Fork to the backgroud on successful initialization daemon
# Symmetric cipher - Must be the same as the server's
#Redirect Internet Client Traffic <-- share your internet aka FBT push "redirect-gateway def1" push "dhcp-options DNS 208.67.222.222" plugin /usr/lib/openvpn/openvpn-auth-pam.so login <-- username and password |
#service openvpn restart <-- if fail check nyo syslog
| This image has been resized. Click this bar to view the full image. The original image is sized 751x477. |
#adduser remoteclient <-- pam authentication eto yung paglogin sa vpn server set nyo password
2.next yung client niyo set natin..if PRoxpn or openvpn client gamit
punta lang sa config file at copy niyo yung ca.crt remoteuser.key remoteuser.cert galing sa server na ginawa nyo..
sample Proxpn.ovpn config file
Quote:
client dev tun remote your.publicip.address < if like nyo domain name,register nyo sa DDYNS.org if dynamic ip kayo sa isp
ca ca.crt cert remoteclient.crt key remoteclient.key
cipher BF-CBC auth SHA1
proto udp port 53 #proto tcp << laruin nyo dito kung ano open port ng globe or smart o yung mobile operator nyo..pwede ring icmp port.pakigoogle nalang pero yung 53 or 443 suree gagana yun #port 443
verb 4 comp-lzo
persist-tun persist-key keepalive 15 65 ping-timer-rem auth-user-pass
route-method exe <route-delay 2
|
b.
xp server 1. Same method lng sa linux sa paggawa ng CA cert at key files..
Download http://openvpn.se/files/install_pack....3-install.exe
cd C:\Program Files\OpenVPN\easy-rsa
C:\Program Files\OpenVPN\easy-rsa> init-config
C:\Program Files\OpenVPN\easy-rsa> edit vars.bat
Quote:
# These are the default values for fields # which will be placed in the certificate. # Don't leave any of these fields blank.pwede nyo palitan value KEY_COUNTRY="PH" KEY_PROVINCE="MNL" KEY_CITY="MNL" KEY_ORG="MYVPNSERVER" KEY_EMAIL="youremail@gmail.com" |
2.Create crt and key files
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> clean-all
C:\Program Files\OpenVPN\easy-rsa> build-ca
3.Copy nyo CA crt
C:\Program Files\OpenVPN\easy-rsa> copy keys\ca.crt ..\config\
4. Generate server.key at server.crt
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> build-key-server server
5.DH creation
C:\Program Files\OpenVPN\easy-rsa> build-dh
6. Copy nyo crt at keys at pem file
C:\Program Files\OpenVPN\easy-rsa> copy keys\server.crt ..\config\
C:\Program Files\OpenVPN\easy-rsa> copy keys\server.key ..\config\
C:\Program Files\OpenVPN\easy-rsa> copy keys\dh1024.pem ..\config\
7. regedit xp ip forward
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters
Value: IPEnableRouter
Type: REG_DWORD
Data: 0x00000001 (1)
8. Create nyo server.conf
Quote:
# Local address to listen on. i.e. the OpenVPN server's LAN address local 10.0.1.1 # ip ng xp server nyo
# The OpenVPN listening port port 53
# Protocol used to transmit between OpenVPN nodes proto udp
# Interface for the OpevVPN tunnel dev tun
# Required keys and certificates ca "c:\program files\openvpn\easy-rsa\keys\ca.crt" cert "c:\program files\openvpn\easy-rsa\keys\server.crt" key "c:\program files\openvpn\easy-rsa\keys\server.key" # This file should be kept secret dh "c:\program files\openvpn\easy-rsa\keys\dh1024.pem"
# vpn subnet. server 172.16.0.0 255.255.255.0
# Periodically check connectivity through the tunnel and restart if connectivity # is lost keepalive 10 600 ping-timer-rem
# Cipher to use for encryption cipher BF-CBC # Blowfish (default) auth SHA1 max-clients 4
persist-key persist-tun comp-lzo
# Log location and verbosity level verb 5
#Redirect Internet Client Traffic <-- share your internet aka FBT push "redirect-gateway def1" push "dhcp-options DNS 208.67.222.222" |
9. restart service
net stop openvpnservice
net start openvpnservice
10. Create nyo client crt at key
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> build-key remoteclient
11. Copy nyo remoteclient.key remoteclient.crt at ca.crt sa
config ng Proxpn or openvpn sa client na coconecta sa server nyo
12.Create Proxpn.ovpn
Quote:
client dev tun remote your.publicip.address << yung public ip nyo
ca ca.crt cert remoteclient.crt key remoteclient.key
cipher BF-CBC auth SHA1
proto udp port 53 #proto tcp #port 443
verb 4 comp-lzo
persist-tun persist-key keepalive 15 65 ping-timer-rem auth-user-pass
route-method exe route-delay 2 |
eto working linux server ko sa hauz dsl gamit ko with routable public
ip,nasa office ako gamit 3g modem cleint ko proxpn ,since 512 kbps yung
upload speed ng isp ko,,nasa 256-300 kbps lang download speed
attainable dahil sa overhead pa..pwede rin cell mobile client if android
or winmo
| This image has been resized. Click this bar to view the full image. The original image is sized 1280x1024. |
config.zippaki check ip address pagmay connection na kayo..loc ksa.