Tag

VPN

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 28, 2025 · Information Security

How to Build an OpenVPN Server on Public Cloud: Step‑by‑Step Guide

This guide walks you through installing OpenVPN on a public cloud, setting up Easy‑RSA for certificate management, configuring the server and client, creating authentication scripts, and connecting Windows or macOS clients, complete with commands and configuration examples.

EasyRSALinuxOpenVPN
0 likes · 12 min read
How to Build an OpenVPN Server on Public Cloud: Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Mar 25, 2025 · Operations

How to Set Up OpenVPN Server and Client on Linux: Step‑by‑Step Guide

This tutorial explains how to install, configure, and run OpenVPN on Linux, covering VPN concepts, types, OpenVPN features, server‑side certificate creation, key generation, configuration files, and client setup, with step‑by‑step commands and troubleshooting tips for secure remote access.

LinuxOpenVPNVPN
0 likes · 11 min read
How to Set Up OpenVPN Server and Client on Linux: Step‑by‑Step Guide
DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPPPTP
0 likes · 4 min read
Common Types of VPN and Their Characteristics
Cloud Native Technology Community
Cloud Native Technology Community
May 9, 2024 · Cloud Native

Step-by-Step Deployment of K3s with Kube‑OVN, Multus, VPN and Cloud‑Hypervisor for a Hybrid Container‑VM Environment

This guide walks through deploying a lightweight K3s cluster unified with virtual machines using Kube‑OVN for multi‑tenant VPC isolation, configuring shared internet via VPN, installing cloud‑hypervisor, setting up Multus for multi‑NIC containers, and provisioning a management web‑app with Tomcat and OpenVPN, providing a complete cloud‑native lab environment.

K3SKube-OVNKubernetes
0 likes · 22 min read
Step-by-Step Deployment of K3s with Kube‑OVN, Multus, VPN and Cloud‑Hypervisor for a Hybrid Container‑VM Environment
Wukong Talks Architecture
Wukong Talks Architecture
Sep 18, 2023 · Information Security

Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration

This article explains the concept and practical applications of forward proxy, outlines its benefits for enterprise network security and access control, compares it with reverse proxy, and provides detailed Nginx configuration examples—including how to expose the client’s real IP—along with common tools and real‑world scenarios.

Access ControlNginxProxy Configuration
0 likes · 12 min read
Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration
Efficient Ops
Efficient Ops
Aug 1, 2022 · Operations

MPLS VPN Revamps ICBC R&D Network: Decentralization, Cost Savings, and Scalability

ICBC’s Software Development Center overhauled its star‑topology network by deploying MPLS VPN, eliminating a central hub, reducing costs, establishing optimal point‑to‑point paths, and enabling seamless expansion, thereby boosting reliability, performance, and supporting future R&D growth across multiple locations.

Cost ReductionMPLSVPN
0 likes · 7 min read
MPLS VPN Revamps ICBC R&D Network: Decentralization, Cost Savings, and Scalability
YunZhu Net Technology Team
YunZhu Net Technology Team
Jan 7, 2022 · Operations

Huawei DSVPN Solution: Architecture, Configuration Steps, and Validation

This article explains the limitations of traditional IPSec VPNs for growing enterprises, introduces Huawei's DSVPN dynamic VPN technology, provides detailed configuration procedures for Hub and Spoke devices—including interface, routing, firewall, and security policies—and demonstrates verification of end‑to‑end connectivity.

DSVPNDynamic VPNHuawei
0 likes · 14 min read
Huawei DSVPN Solution: Architecture, Configuration Steps, and Validation
Laravel Tech Community
Laravel Tech Community
May 24, 2020 · Information Security

Using VPNs in China: Legal Risks and Recent Enforcement Cases

The article explains that using VPNs to access foreign networks in China is illegal under current regulations, recounts recent enforcement actions—including fines and administrative warnings against individuals and vendors—and warns developers and overseas students of the severe penalties that can follow illegal VPN usage.

ChinaInternet CensorshipVPN
0 likes · 7 min read
Using VPNs in China: Legal Risks and Recent Enforcement Cases
Java Architecture Diary
Java Architecture Diary
Jan 31, 2020 · Operations

How to Build a Private Virtual LAN with ZeroTier in Minutes

ZeroTier lets you create a peer‑to‑peer virtual network that bridges devices across different physical locations without a public IP, and this guide walks you through its core concepts, registration, network creation, client installation, joining, IP assignment, connectivity testing, and optional Moon relay setup.

Moon relayNetworkingVPN
0 likes · 4 min read
How to Build a Private Virtual LAN with ZeroTier in Minutes
Efficient Ops
Efficient Ops
Jan 30, 2020 · Operations

Essential Checklist for Remote Work VPN and Video Conference Operations

This guide outlines the critical considerations for VPN licensing, bandwidth, IP address capacity, troubleshooting, video‑conference licensing, backup solutions, emergency on‑call procedures, and business system accessibility to ensure smooth remote work operations.

IT OperationsVPNemergency response
0 likes · 4 min read
Essential Checklist for Remote Work VPN and Video Conference Operations
Practical DevOps Architecture
Practical DevOps Architecture
Jul 25, 2019 · Information Security

Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces

This guide explains the security risks of transparent Internet data transmission, introduces IPSec's authentication, encryption, integrity, and anti‑replay features, and provides step‑by‑step Huawei and Cisco router configurations—including interface setup, IKE proposals, IPSec profiles, and verification commands—to securely connect branch and headquarters networks via a VPN.

CiscoHuaweiIPSec
0 likes · 13 min read
Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces
Architecture Digest
Architecture Digest
May 6, 2018 · Backend Development

Design and Prototype of a Distributed VPN Using Go and KCP

This article describes the motivation, requirements, solution research, and detailed design of a lightweight distributed VPN built with Go, employing KCP as the transport protocol, and includes prototype source code for both hub and peer components.

Distributed SystemsGoKCP
0 likes · 12 min read
Design and Prototype of a Distributed VPN Using Go and KCP
DevOps
DevOps
Oct 30, 2017 · Cloud Computing

Configuring Azure Virtual Network (VNet) Peering for Cross‑Region Resource Connectivity

This article explains how to connect Azure virtual networks using VNet peering, detailing user access methods, peering benefits and limitations, and step‑by‑step configuration of three resource‑manager‑based VNets with gateways, ExpressRoute and VPN, culminating in connectivity verification via Windows Server VMs.

AzureCloud NetworkingExpressRoute
0 likes · 5 min read
Configuring Azure Virtual Network (VNet) Peering for Cross‑Region Resource Connectivity
Architecture Digest
Architecture Digest
Feb 18, 2017 · Information Security

Enterprise IT Infrastructure Planning and Network Security Architecture Proposal

This document outlines a comprehensive enterprise IT infrastructure plan covering network topology, hardware selection, security measures, VPN solutions, and wireless deployment to support a growing organization with minimal operational overhead and high reliability.

IT infrastructureVPNWireless Deployment
0 likes · 17 min read
Enterprise IT Infrastructure Planning and Network Security Architecture Proposal
Practical DevOps Architecture
Practical DevOps Architecture
Nov 25, 2016 · Information Security

Troubleshooting L2TP VPN Authentication Issue on AR2240 with Windows 8 Clients

The article details the AR2240 L2TP VPN configuration, outlines a step‑by‑step debugging process that identified a username formatting error on Windows 8 clients, and provides the corrective action of prefixing the username with a backslash to achieve successful connection.

AR2240AuthenticationL2TP
0 likes · 3 min read
Troubleshooting L2TP VPN Authentication Issue on AR2240 with Windows 8 Clients
Practical DevOps Architecture
Practical DevOps Architecture
May 11, 2015 · Operations

Configuring L2TP VPN on Huawei Devices

This guide provides a step‑by‑step configuration for setting up an L2TP VPN on Huawei equipment, covering ACL rules, IP pools, user authentication, interface settings, virtual templates, PPP parameters, static routing, and related commands.

HuaweiL2TPVPN
0 likes · 2 min read
Configuring L2TP VPN on Huawei Devices