VPN digest: Introductory and practical materials on Habré and not only

    We are developing our service for the provision of virtual infrastructure and we offer ready-made implementation of virtual networks (VLANs) for the servers we rent. Our task regarding working with similar technologies is to provide an opportunity and help to configure everything independently, for example, a VPN on a physical or virtual server (VPS / VDS) .

    In addition to preparing their own thematic guides and developing the service of those. support, we decided to use our blog on Habré. For this, we selected the most noticeable and interesting materials that were published on this site. We have supplemented this list with English sources.


    / Photo by Steven Guzzardi CC

    VPN for Beginners: Everything You Need to Know
    A good “tutorial” for those who are just starting to get acquainted with the principles of VPN operation (and what is not included in the VPN tasks). Authors deal with paid services, security issues and the use of VPN on different platforms.

    Comparative overview of VPN technology implementations: What to choose
    Our own review of the most common software solutions for creating virtual private networks. This information may be useful as a starting point for exploring the topic of Virtual Private Network.

    VPN Software Implementation Overview Additions: In Simple Words
    In this article, we examined the following software solutions for creating virtual private networks: AnyConnect VPN, OpenConnect VPN, SoftEther VPN, and Tinc.

    A bit about Internet anonymity technologies
    An introductory overview of VPN solutions, proxies, Tor, combined options for their use and examples of other ways to ensure anonymity on the Web.

    Goals and objectives of the VPN: Why do you need it
    Here are the basic protocols (plus OpenVPN) and the basic steps that are required to configure. Great for beginners.

    Introducing VPN: The Basics
    Material about the principles of VPN, types of VPN, protocols and VPN encryption.

    VPN for small business
    A little more detailed analysis of the main features that will allow you to organize the remote work of employees of a small company.

    What's Inside: Introducing IPSec VPN, PPTP VPN, and SSL VPN.

    VPN: past, present, future
    The translation was prepared by the authors of Celecom’s blog, and the original was written by Adrien Bridgewater of Computer Weekly. It is about how the development of cloud technology affects the development of VPN.

    Online Anonymity: Just About Complexity
    A little “ancient”, but somehow a good series of Pandos publications that talked about data leakage, Tor, VPN, Whonix and much more.

    What you need to know before switching to VPN
    The authors of Kaspersky Lab's corporate media share the technical and legal aspects that are directly related to VPN technology and provide a comparative tablet with descriptions of popular VPN providers as a useful source .




    / photo Hernán Piñera CC

    Networks for the smallest: VPN
    A detailed guide from eucariot and theGluck , which is one of 9 parts of a series of related materials. This article discusses possible connection options, Site-to-Site VPNs based on GRE and IPSec, Dynamic Multipoint Virtual Network (DMVPN).

    Configuring Site-to-Site VPN using pfSense 2.3
    This is a method for implementing OpenVPN technology, designed to create a secure virtual tunnel. This guide will help you upgrade Site-to-Site VPN using the pfSense software router, using the example of combining a private network of 1cloud servers and an external network (physical or virtual).

    Additional OpenVPN Security Features
    If you use OpenVPN, we recommend that you pay attention to the additional security tools offered for this product.

    This material assumes that you have a basic OpenVPN configuration ready for use ( instructions for setting up an OpenVPN server for Windows Server 2008/2012).

    SBC + VPN + Tor + obfsproxy in your pocket (from the sandbox)
    A good practical analysis from Revery , which talks about setting up a mobile solution with the ability to "wrap" traffic in a VPN, then in Tor and obfuscate it.

    Windows / Linux Server Security Checklist
    This checklist will help you with the configuration and initial security checks of your Windows or Linux infrastructure. It lists the available basic measures to prevent possible attacks that do not require special knowledge and skills.

    We implement a secure VPN protocol
    The first part of the good material on the topic, which was prepared by Sergey Matveev, Python and Go developer ivi.ru. He does not suggest redoing the protocol itself, but simply describes his vision of opportunities for revision ( part 2 ).

    Transparent bypass of locks in the home network
    An interesting guide prepared by Zolg . He suggested redirecting only blocked traffic to VPN / Tor, skipping the rest in the usual way.

    Kill switch for iptables based OpenVPN
    WGH 's story on how to avoid gaining Internet access for active applications, including open browser tabs, bypassing the VPN connection (while the VPN connection has not yet been established).

    Automatically obtain a password for VPN on Mikrotik
    A 12pz21 post on how he configured automatic updating of connection parameters on Mikrotik. In the material: a little about the parser and the script for creating a VPN connection.

    MikroTik and 192.168.0.0/24
    Vasilevkirill 's story about how he got at first glance with the simple task of “raising two providers and setting up a VPN between two offices”, and what came of it.

    PS Of course, this selection is just the foundation that needs to be gradually supplemented. You can throw your suggestions regarding what else can be included in the selection directly into the comments. Well, or in PM, to whom it is more convenient.

    PPS Our "ultimate" SSL digest .

    Also popular now: