📜 ⬆️ ⬇️

VPN Digest: Introductory and practical materials on Habré and not only

We are developing our virtual infrastructure service and we offer to use a ready-made implementation of virtual networks (VLANs) for servers leased from us. Our task regarding working with such technologies is to provide an opportunity and help configure everything on our own, for example, a VPN on a physical or virtual server (VPS / VDS) .

In addition to the preparation of their own thematic manuals and the development of technical services support, we decided to use our blog on Habré. For this, we selected the most noticeable and interesting materials that were published on this site. We have added this list to English-language sources.


/ photo by Steven Guzzardi CC
')
Beginners VPN: Everything You Need to Know
A good "tutorial" for those who are just beginning to get acquainted with the principles of the VPN (and that is not included in the tasks of VPN). Authors deal with paid services, security issues and the use of VPN on different platforms.

Comparative overview of VPN technology implementations: What to choose
Our own review of today's most common software solutions for creating virtual private networks. This information may be useful as a starting point for exploring the topic of Virtual Private Network.

Additions to the VPN software implementations overview: Simple words
In this article, we looked at the following software solutions for creating virtual private networks: AnyConnect VPN, OpenConnect VPN, SoftEther VPN, and Tinc.

A little about the technology of anonymity on the Internet
Introductory review of VPN solutions, proxy, Tor, combined use cases and examples of other ways to ensure anonymity on the Web.

VPN goals and objectives: why it is needed
Here are the basic protocols (plus OpenVPN) and the basic steps that are needed to configure. Great for beginners.

Introducing VPN: Basics
Material on VPN principles, VPN types, protocols and VPN encryption.

Small Business VPN
A little more detailed analysis of the main features that will allow to organize remote work of employees of a small company.

What's inside: an introduction to IPSec VPN, PPTP VPN, and SSL VPN.

VPN: past, present, future
A translation prepared by the authors of the blog of the company Celecom, and the original was written by Adrien Bridgewater from Computer Weekly. It is about how the development of cloud technology affects the development of VPN.

Anonymity online: just about the complex
A bit of “ancient”, but somehow a good series of publications by Pandos , which told about data leakage, Tor, VPN, Whonix and much more.

What you need to know before moving to VPN
The authors of corporate media at Kaspersky Lab share near-technical and legal aspects directly related to the VPN technology, and provide as a useful source a comparative label describing popular VPN providers.




/ photo Hernán Piñera CC

Network for the smallest: VPN
A detailed guide from eGuariot and theGluck , which is one of 9 parts of a series of materials on the topic. This material discusses possible connectivity options, Site-to-Site VPN based on GRE and IPSec, a dynamic multipoint virtual network (DMVPN).

Configuring Site-to-Site VPN with pfSense 2.3
This is a way to implement technology OpenVPN, designed to create a secure virtual tunnel. This manual will help you to raise Site-to-Site VPN using the pfSense software router, using the example of connecting a private network of 1cloud servers and an external network (physical or virtual).

Additional OpenVPN security features
If you are using OpenVPN, we recommend that you pay attention to the additional security tools offered for this product.

This material implies that you have a ready-to-work OpenVPN basic configuration ( instructions for setting up an OpenVPN server for Windows Server 2008/2012).

SBC + VPN + Tor + obfsproxy in your pocket (from the sandbox)
Good practical analysis from Revery , which tells about setting up a mobile solution with the ability to "wrap" traffic in a VPN, then in Tor and obfusts it.

Checklist of Windows / Linux server security settings
This checklist will help you with the configuration and initial verification of the security of your Windows or Linux infrastructure. It lists the available basic measures to prevent possible attacks that do not require special knowledge and skills.

We implement secure VPN protocol
The first part of the good material on the topic, which was prepared by Sergey Matveev, Python and Go, the developer ivi.ru. He does not propose to remake the protocol itself, but simply describes its vision of the possibilities for improvement ( part 2 ).

Transparent bypass in home network
An interesting guide that Zolg prepared. He suggested redirecting only blocked resources to VPN / Tor, passing the rest in the usual way.

Kill switch for OpenVPN based on iptables
WGH 's story about how to avoid getting active applications to the Internet, including open browser tabs, bypassing the VPN connection (while the VPN connection is not yet established).

Automatic password retrieval for VPN on Mikrotik
Post 12pz21 on how he set up an automatic update of the connection parameters on Mikrotik. In the material: a little about the parser and the script to create a VPN connection.

MikroTik and 192.168.0.0/24
The story of vasilevkirill about how he got at first glance with the simple task of “raising two providers and setting up a VPN between two offices,” and what came of it.

PS Of course, this selection is only the basis, which should be gradually supplemented. Your suggestions as to what else can be included in the selection can be cast directly into the comments. Well, or in a personal, as it is more convenient.

PPS Our Ultimate SSL Digest .

Source: https://habr.com/ru/post/316266/


All Articles