Ubuntu中创建虚拟网卡验证客户端是否真的通过VPN

前端之家收集整理的这篇文章主要介绍了Ubuntu中创建虚拟网卡验证客户端是否真的通过VPN前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
参考: https://blog.csdn.net/zgf19930504/article/details/51955067

1 先使用ifconfig查看网卡名称

  1. $ ifconfig
  2. ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
  3. inet 192.168.3.39 netmask 255.255.255.0 broadcast 192.168.3.255
  4. inet6 fe80::279b:4479:ea46:ae99 prefixlen 64 scopeid 0x20<link>
  5. ether 00:0c:29:ee:4b:bc txqueuelen 1000 (Ethernet)
  6. RX packets 44187 bytes 21079541 (21.0 MB)
  7. RX errors 0 dropped 0 overruns 0 frame 0
  8. TX packets 29266 bytes 9993375 (9.9 MB)
  9. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  10.  
  11.  
  12. lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
  13. inet 127.0.0.1 netmask 255.0.0.0
  14. inet6 ::1 prefixlen 128 scopeid 0x10<host>
  15. loop txqueuelen 1000 (Local Loopback)
  16. RX packets 810 bytes 71857 (71.8 KB)
  17. RX errors 0 dropped 0 overruns 0 frame 0
  18. TX packets 810 bytes 71857 (71.8 KB)
  19. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

我的网卡名称为ens33.


2 修改文件添加网卡

修改文件/etc/network/interfaces,添加网卡,网卡名为:原来网卡(ens33):1,可以创建多个,修改:后面的数字即可。

  1. $ sudo vim /etc/network/interfaces
原始内容为:
  1. # interfaces(5) file used by ifup(8) and ifdown(8)
  2. auto lo
  3. iface lo inet loopback
改为:
  1. # interfaces(5) file used by ifup(8) and ifdown(8)
  2. auto lo
  3. iface lo inet loopback
  4.  
  5. auto ens33:1
  6. iface ens33:1 inet static
  7. address 123.1.0.123
  8. netmask 255.255.255.0

3 使用ifconfig查看结果

  1. $ sudo /etc/init.d/networking restart
  2. $ ifconfig
  3. ens33: flags=4163<UP,MULTICAST> mtu 1500
  4. inet 192.168.3.39 netmask 255.255.255.0 broadcast 192.168.3.255
  5. inet6 fe80::279b:4479:ea46:ae99 prefixlen 64 scopeid 0x20<link>
  6. ether 00:0c:29:ee:4b:bc txqueuelen 1000 (Ethernet)
  7. RX packets 44442 bytes 21113893 (21.1 MB)
  8. RX errors 0 dropped 0 overruns 0 frame 0
  9. TX packets 29484 bytes 10015338 (10.0 MB)
  10. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  11.  
  12.  
  13. ens33:1: flags=4163<UP,MULTICAST> mtu 1500
  14. inet 123.1.0.123 netmask 255.255.255.0 broadcast 123.1.0.255
  15. ether 00:0c:29:ee:4b:bc txqueuelen 1000 (Ethernet)
  16.  
  17.  
  18. lo: flags=73<UP,RUNNING> mtu 65536
  19. inet 127.0.0.1 netmask 255.0.0.0
  20. inet6 ::1 prefixlen 128 scopeid 0x10<host>
  21. loop txqueuelen 1000 (Local Loopback)
  22. RX packets 870 bytes 76225 (76.2 KB)
  23. RX errors 0 dropped 0 overruns 0 frame 0
  24. TX packets 870 bytes 76225 (76.2 KB)
  25. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

4 访问123.1.0.123,查看是否可以访问

先用Ubuntu访问http://123.1.0.123,确定是可以访问到内容

Android设备未连接VPN的情况下访问http://123.1.0.123,访问不通

Android设备连接VPN后访问http://123.1.0.123,可以成功访问

PS:在这里我是先安装了apache(sudo apt-get install apache2 apache2-doc),访问http://123.1.0.123和访问http://127.0.0.1的效果相同。

猜你在找的Ubuntu相关文章