Portál AbcLinuxu, 12. května 2025 02:18
brana:~ # ip r snebo
10.8.0.0/24 dev tap0 scope link
10.8.0.0/24 dev tap0 proto kernel scope link src 10.8.0.1
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.10
169.254.0.0/16 dev eth0 scope link
127.0.0.0/8 dev lo scope link
default via 192.168.1.2 dev eth0
route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.8.0.0 0.0.0.0 255.255.255.0 U 0 0 0 tap0
10.8.0.0 0.0.0.0 255.255.255.0 U 0 0 0 tap0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 192.168.1.2 0.0.0.0 UG 0 0 0 eth0
local 192.168.1.10
port 9987
proto udp
dev tap0
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key # This file should be kept secret
dh /etc/openvpn/keys/dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
route-up "route delete -net 10.8.0.0/24"
route-up "route add -net 10.8.0.0/24 tap0"
ifconfig 10.8.0.1 10.8.0.2
push "route 10.8.0.0 255.255.255.0 10.8.0.1 "
keepalive 10 120
comp-lzo
max-clients 10
persist-key
persist-tun
status openvpn-status.log
log openvpn.log
log-append openvpn.log
verb 6
clientZkusil jsem přidat i
dev tap0
proto udp
pull
remote www.server.cz 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
cert klient5.crt
key klient5.key
ns-cert-type server
comp-lzo
verb 3
echo 1 > /proc/sys/net/ipv4/ip_forward
Děkuji za jakoukoliv pomoc.
Řešení dotazu:
# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
client-to-client
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.