Jump to content

Recommended Posts

  • Superior Administrator
Posted

Preparing

Upgrade the system

# apt-get update && apt-get -y upgrade

 

Install (if it’s not installed yet) build-essential for compilation purpose

# apt-get -y install build-essential

 

And other required packages

# apt-get -y install wget curl gcc make wget tzdata git libreadline-dev libncurses-dev libssl-dev zlib1g-dev

 

Installing SoftEther VPN

Download the last stable version (marked rtm) or stable-beta, and save it in /tmp

 

# wget "https://www.softether-download.com/files/softether/v4.25-9656-rtm-2018.01.15-tree/Linux/SoftEther_VPN_Server/64bit_-_Intel_x64_or_AMD64/softether-vpnserver-v4.25-9656-rtm-2018.01.15-linux-x64-64bit.tar.gz" -O /tmp/softether-vpnserver.tar.gz

 

Uncompress the sources

# tar -xzvf /tmp/softether-vpnserver.tar.gz -C /usr/local/

 

Remove unused file

# rm /tmp/softether-vpnserver.tar.gz

 

Install from the sources

 

# cd /usr/local/vpnserver/
# make

 

During the installation process, we will have to type 1 to read the Licence Agreement, type 1 again to confirm that we have read the License Agreement and finally type 1 to agree with the License Agreement.

 

Screen-Shot-2018-08-22-at-08.49.01-768x367.png

 

Kawin uses key i_read_and_agree_the_license_agreement, that does not require confirmation

 

# make i_read_and_agree_the_license_agreement

 

Change file permission

 

# chmod 0600 *
# chmod 0700 vpnserver
# chmod 0700 vpncmd

  • Like 2
  • Replies 2
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

  • Superior Administrator
Posted

Server checking

Before going further, let’s check that the VPN server can operate normally

To do that run the vpncmd command and use the check VPN tool.

 

Screen-Shot-2018-08-22-at-08.44.33-768x915.png

 

Service configuration

Link binary files

 

# ln -s /usr/local/vpnserver/vpnserver /usr/local/bin/vpnserver
# ln -s /usr/local/vpnserver/vpncmd /usr/local/bin/vpncmd

 

Create the file /lib/systemd/system/vpnserver.service

# vim /lib/systemd/system/vpnserver.service

 

and add following

 

[unit]
Description=SoftEther VPN Server
After=network.target
ConditionPathExists=!/usr/local/vpnserver/do_not_run
[service]
Type=forking
ExecStart=/usr/local/vpnserver/vpnserver start
ExecStop=/usr/local/vpnserver/vpnserver stop
KillMode=process
Restart=on-failure
WorkingDirectory=/usr/local/vpnserver
# Hardening
PrivateTmp=yes
ProtectHome=yes
ProtectSystem=full
ReadOnlyDirectories=/
ReadWriteDirectories=-/usr/local/vpnserver
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW CAP_SYS_NICE CAP_SYS_ADMIN CAP_SETUID
[install]
WantedBy=multi-user.target

 

Now the VPN server starts automatically on boot, and we are able to manage the vpnserver using systemctl

 

# systemctl start vpnserver
# systemctl status vpnserver
# systemctl stop vpnserver

 

Reload, enable and start the service

 

# systemctl daemon-reload
# systemctl enable vpnserver
# systemctl restart vpnserver

  • Like 1

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...
×
GloTorrents Community Forum
Home
Activities
Sign In
Search
More
×