Welcome to the Slackware Documentation Project

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
howtos:network_services:tunnel_interfaces [2013/11/23 14:56 (UTC)]
ricky_cardo [Tunnel Interfaces]
howtos:network_services:tunnel_interfaces [2013/11/23 15:45 (UTC)]
ricky_cardo [Tunnel Interfaces]
Line 24: Line 24:
 # #
 target=74.79.121.210 target=74.79.121.210
 +port=22
 # #
 ###########################################################​ ###########################################################​
Line 32: Line 33:
 /​usr/​bin/​sudo /​sbin/​modprobe tun /​usr/​bin/​sudo /​sbin/​modprobe tun
 #load remote module #load remote module
-/​usr/​bin/​ssh $target "/​usr/​bin/​sudo /​sbin/​modprobe tun"+/​usr/​bin/​ssh ​-p $port $target "/​usr/​bin/​sudo /​sbin/​modprobe tun"
 /bin/sleep 1 /bin/sleep 1
  
-/​usr/​bin/​sudo /​usr/​bin/​autossh -M 0 -o "​ServerAliveInterval 60" -o "​ServerAliveCountMax 3" -fw 0:0 $target /bin/true+/​usr/​bin/​sudo /​usr/​bin/​autossh ​-p $port -M 0 -o "​ServerAliveInterval 60" -o "​ServerAliveCountMax 3" -fw 0:0 $target /bin/true
 /bin/sleep 4 /bin/sleep 4
-/​usr/​bin/​ssh $target "/​usr/​bin/​sudo /​sbin/​ifconfig tun0 192.168.5.2 pointopoint 192.168.5.1 netmask 255.255.255.252 broadcast 192.168.5.3"​+/​usr/​bin/​ssh ​-p $port $target "/​usr/​bin/​sudo /​sbin/​ifconfig tun0 192.168.5.2 pointopoint 192.168.5.1 netmask 255.255.255.252 broadcast 192.168.5.3"​
 /​usr/​bin/​sudo /​sbin/​ifconfig tun0 192.168.5.1 pointopoint 192.168.5.2 netmask 255.255.255.252 broadcast 192.168.5.3 /​usr/​bin/​sudo /​sbin/​ifconfig tun0 192.168.5.1 pointopoint 192.168.5.2 netmask 255.255.255.252 broadcast 192.168.5.3
 /​usr/​bin/​sudo /​usr/​sbin/​iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE /​usr/​bin/​sudo /​usr/​sbin/​iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
Line 43: Line 44:
 /​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT /​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT
  
-/​usr/​bin/​ssh $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE"​ +/​usr/​bin/​ssh ​-p $port $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE"​ 
-/​usr/​bin/​ssh $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i eth0 -o tun0 -m state --state RELATED,​ESTABLISHED -j ACCEPT"​ +/​usr/​bin/​ssh ​-p $port $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i eth0 -o tun0 -m state --state RELATED,​ESTABLISHED -j ACCEPT"​ 
-/​usr/​bin/​ssh $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT"​+/​usr/​bin/​ssh ​-p $port $target "/​usr/​bin/​sudo /​usr/​sbin/​iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT"​
  
 </​file>​ </​file>​

In Other Languages
QR Code
QR Code howtos:network_services:tunnel_interfaces (generated for current page)