Соединение двух сетей VPN различные Схемы IP

Для исследования, какой tasksel / использование загрузки:

$ tasksel --task-packages mail-server                             ~
dovecot-imapd
procmail
dovecot-common
postfix
libpth20
libmysqlclient16
libgpgme11
mutt
libpq5
dovecot-pop3d
bsd-mailx
ssl-cert
mysql-common

Большинство из них является нейтральной безопасностью - кроме голубятни. Голубятней является превосходный и очень безопасный IMAP (почта серверной стороны) сервис. Но, это не принадлежит на типичном веб-сервере и не имеет никакого отношения к передающей почте.

То, что решило Вашу проблему, просто, что taskel выполнил следующую команду для Вас:

sudo dpkg-reconfigure postfix

Начиная с Ваших почтовых работ теперь, просто удалите пакеты голубятни:

sudo aptitude purge dovecot-common dovecot-imapd dovecot-pop3d

Удачи!

1
задан 7 August 2012 в 21:38
1 ответ

Many of the details of how to set things up here are specific to your Watchguard box. I've never worked with those devices, so I'll speak in generalities. I'll also assume that you've figured out how to configure a site-to-site VPN tunnel between the Watchguards (which I'll refer to as "routers" from here on out).

  1. A site-to-site VPN tunnel needs to be established between routers
  2. A static route needs to be set on Site A's router to route traffic destined to 192.168.1.0/24 through the VPN to site B
  3. A static route needs to be set on Site B'S router to route traffic destined to 192.168.0.0/24 through the VPN to site A
  4. Firewall rules between sites should be set up using a "default deny" policy, which requires you to explicitly specify Access Lists for what IP addresses and ports are open between sites. For instance, if Site A users only need access to a file server and a printer in Site B, firewall rules should be put in place that only permit that traffic, and no other traffic. This limits collateral damage if, perchance, a workstation gets infected with a virus, it would not be able to spread through the VPN to systems in the other site.
  5. You probably want some sort of monitoring mechanism to alert you if the tunnel drops

Steps 2 and 3 will likely be set up automatically by the router when you configure the VPN tunnel.

Be aware that intra-site network performance will likely suffer quite a bit after this change. It's true, the available bandwidth of the cable connections is higher than the T1. However, your latency will likely increase by an order of magnitude (which is a huge deal for protocols like CIFS, which are very chatty and suffer greatly over high-latcency connections), and the reliability of the WAN will go down significantly. Even if these are "business class" cable internet connections, they're of a different class of service than a T1 is.

2
ответ дан 3 December 2019 в 21:45

Теги

Похожие вопросы