A
A
Alex2011-01-05 15:40:38
Android
Alex, 2011-01-05 15:40:38

VPN server on VDS

There is a VDS hosting. Debian. There is a desire to raise a VPN on it to protect against sniffing in open WiFi networks.
The scenario I see is something like this: I connect to public wifi (clients: Android2.2, iOS4, Windows7), I connect to the VPN, all traffic is encrypted and goes through it.

Accordingly, there is a task of choosing and configuring a VPN such that it would be possible to connect to it using regular means of clients (Win, iOS, Android).

* The following configurations are available on Android: pptp, l2tp, l2tp/IPSec PSK, l2tp/IPSec CRT.
* On iOS, L2TP, PPTP, Cisco IPSec VPN is supported.
* On Windows, a standard client (you can deliver something, I guess).
* Simultaneous clients can be up to 4x.
* VPN setup scheme: router, login/password access.

As an alternative, consider a PPTP server with configured forwarding:
* www.ylsoftware.com/news/407
* www.ylsoftware.com/news/538

Thank you.

Answer the question

In order to leave comments, you need to log in

7 answer(s)
T
try4tune, 2011-01-05
@try4tune

Open VPN? I don’t know how it works with devices, but I set it up for myself not so long ago. Pretty easy.

V
vixh, 2011-01-05
@vixh

on the VDS, you need to enable the TAP / TUN interface, but not the fact that one of these L2TP, PPTP will work on it. Neither pptp nor l2tp worked for me. Raised OpenVPN but the iPhone does not work with it.

I
iwfyb, 2011-01-05
@iwfyb

+1 to OpenVPN

I
impass, 2011-01-05
@impass

If you don’t want to bother, then PPTP is unambiguous. But it has a number of limitations, starting with the fact that in most cases it will not be possible to change the standard connection port.

R
Rulin, 2011-01-06
@Rulin

On my VPS (debian) I raised OpenVPN quite quickly, although I had to tinker with routing a bit (I had never routed anything before), the main thing is that everything works very reliably without crashes

A
andoriyu, 2011-01-07
@andoriyu

The easiest way is pptp. In the case of freebsd, this is the mpd daemon, copy-paste mpd.conf.example, and adding lines with login and password to mpd.secret. But PPTP uses GRE, and now there is still a place where it is cut. With L2TP over IPsec, everything is a little more complicated (because these are 2 separate processes that are not connected in any way), but it works 99% and is modern :)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question