• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Connection to Cloud Infrastructure by VPN Tunnel

By Abhishek Ghosh August 5, 2013 7:29 pm Updated on August 5, 2013

Secure Connection to Cloud Infrastructure by VPN Tunnel

Advertisement

Secure connection to Cloud Infrastructure by using VPN Tunnel – like we already said on our Secure Cloud Computing Guide, we pointed the importance of the connecting device. Practically it is a part of Comprehensive Cloud Security Strategy. It is obvious that, for this article; we have to take that the reader is used with the common computing terminologies like VPN (Virtual Private Network), Mobile Virtual Private Network, how you will setup VPN on Mac, Linux and Windows etcetera. Also, there is a more detailed article on VPN. If you have less knowledge or grasp on these basics, we will advice to read them first, indeed it is a good idea to buy some specific books to get more knowledge, otherwise the actual purpose of this article on secure connection to Cloud Infrastructure by using VPN Tunnel will remain as a theory to you. We basically can create a secure channel between our office or home and the cloud infrastructure through the creation of VPN Tunnel.

 

Why a Secure Connection to Cloud Infrastructure by VPN Tunnel is Thought as a Way ?

 

One of the major problems within the company, when discussing the ability to migrate the IT infrastructure from in-house to cloud computing services, is the communication channel used to exchange such data which are related to the security. With regard to the security of the stored data, you can use encryption systems; but, basically you have to have confidence in your service provider whose staff is the only one to actually have the tools to access your data in an almost transparent way.

With regard to the communication channel on which pass our data, it is not always possible to use protocols that make use of encryption (for example – SSL / TLS) and therefore, it is necessary to build a secure communication channel on which, transition of our data will take place. The problem arises, for example, if we want to mount a volume on our PC in the office on our server storage using NFS or CIFS. To overcome the above problem we can create a VPN tunnel between our cloud infrastructure and workstations physically present in our office : this is the crux of this article – Secure Connection to Cloud Infrastructure by VPN Tunnel.

Advertisement

---

 

Ways to Secure Connection to Cloud Infrastructure by VPN Tunnel

 

The reason why Dropbox get some much curse is practically to some extent for the desktop clients. These kind of service made the file transfer a bit easier but actually the user takes the shortcut to lack of security. Mounting is more intense work from networking point of view.

A VPN or Virtual Private Network is a private network, usually created between two points using a transmission system and public (Internet in this case) net, whose aim is to offer the same opportunities that you would have with a transmission line created in the private and hoc. Previously, when designing cloud infrastructure companies, they had expected the presence of a cloud server to act as a gateway to other servers that host the various services (web servers, mail servers, database servers, etc.), right on gateway can install PPTPD, or the daemon that allows you to create a VPN connection. Anyway, we can access via SSH to the gateway and install PPTPD simply using aptitude in case of Debian based Linux :

 

Vim
1
apt-get install -y pptpd bcrelay

 

This will install bcrelay, ppp, pptpd. You might not need to use pptpd bcrelay, instead pptpd only (depending on the flavor). Now you just have time to configure the software, proceed by opening the file /etc/ppp/chap-secrets and enter the data related to users who want to give permission to connect to the VPN, use vi or nano to open that file :

 

Vim
1
myusernameabhishek pptpd mys3cr3tpass 11.12.0.2

Vim
1
myfriendsuserghosh pptpd hisp@ssword 14.15.0.3

 

With the above configuration it will give access to 2 users, each identified with a special password. We shall now proceed to configure PPTP, opening the main configuration file /etc/pptpd.conf, and choosing the IP range to be assigned to clients that will connect remotely to our cloud infrastructure:

 

Vim
1
localip 11.12.0.1

Vim
1
rackspaceip 72.73.0.2-10

Now you just have to configure the ip of the dns server that will be used by clients (you), open the file /etc/ppp/pptp-options and you will see there are commented lines like ms-dns, insert the ip of dns server 2 (you can use the dns of Google), MS-CHAP V2 PPTP VPN is never known to be safe but better than CHAP, make sure it looks like this (this the end of that file) :

 

Vim
1
ms-dns 8.8.8.8

Vim
1
#ms-dns 8.8.4.4

Vim
1
proxyarp

Vim
1
nodefaultroute

Vim
1
lock

Vim
1
nobsdcomp

Vim
1
mtu 1490

Vim
1
mru 1490

 

Restart pptpd :

 

Vim
1
/etc/ init.d/pptpd restart

 

To access the private network to the cloud gateway server is offline, you must perform forwarding packets and then activate forwarding packets by adding the following line to /etc/sysctl.conf  by uncommenting and making it true (0 to 1):

 

Vim
1
net.ipv4.ip_forward=1

 

sysctrl -p will restart the service after saving. We add the following rules to iptables firewall:

 

Vim
1
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

Vim
1
iptables -A FORWARD -i eth0 -o ppp0 -m state “state

Vim
1
RELATED,ESTABLISHED -j ACCEPT

Vim
1
iptables -A FORWARD -i ppp0 -o eth0 -j ACCEPT

 

You will get the output like this (this is Ubuntu’s output) shown in my Github gist.

At this point the gateway server is ready to receive connections from the PC, you just have to configure their VPN client in your office. Obviously, you will need to configure VPN client (your computer for example to accept the handshake), typically for Debian like Linux, it will be :

 

Vim
1
apt-get install pptp-linux

 

Now we just have to enter the user credentials needed to connect, as well as initially showed for the server, going to edit the file /etc/ppp/chap-secrets:

 

Vim
1
Abhishek VPNRackspace "passwordhere" *

 

Now we just have to enter the user credentials needed to connect, as well as initially showed for the server, going to edit the file /etc/ppp/chap-secrets:

 

Vim
1
pty "pptp IP.RACK.SERVER.CLOUD --nolaunchpppd"

Vim
1
name "Abhishek"

Vim
1
remotename VPNRackspace

Vim
1
require-mppe-128

Vim
1
usepeerdns

Vim
1
file /etc/ppp/options.pptp

 

Running the pon, poff command will simply connect to remote server. You can run man command to check pon / poff etc. details. The thing is basically same in OS X too. But we can use a GUI like written here : https://www.bol.ucla.edu/services/vpn/pptp/docs/macosx.html

Secure Connection to Cloud Infrastructure by VPN Tunnel

We will not say about Microsoft Windows PC. For the most costly Operating System, there should be some official support. Plus there are so many Microsoft MVPs, they must know these basics – Microsoft’s way of ‘community participation’.

Abhishek-Ghosh Tagged With are cloud base IP tunnels subject to FUSF

This Article Has Been Shared 861 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Connection to Cloud Infrastructure by VPN Tunnel

  • Self Hosted WordPress on Cloud Server for Dummies

    Self Hosted WordPress is itself a scary phrase to a non-tech person and add Cloud Server on it. Here is Very Easy Guide to under Self Hosted WordPress.

  • How to Make Cloud Computing Secure ?

    How to Make Cloud Computing Secure ? Keep an eye on the provider’s choice ! Here are a few tips to check while you are in need of Secure Cloud Computing.

  • Eight Tips for Secure Cloud

    Eight Tips for Secure Cloud are for are using the extremely useful services whose security are still regarded as uncertain. What users can do in this situation?

  • Ubuntu with GUI on Rackspace Cloud Server as VNC Remote Desktop

    Ubuntu with GUI on Rackspace Cloud Server as VNC Remote Desktop is a guide to install and work on powerful server with up to 48 GB of RAM and GUI from devices.

  • Is Everything is Safe in the Cloud ?

    Is Everything is Safe in the Cloud ? We are representing here few popular systems and highlighting especially the security aspects of the Public Cloud services.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Configuration Management February 5, 2023
  • What is ChatGPT? February 3, 2023
  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Secure Connection to Cloud Infrastructure by VPN Tunnel," in The Customize Windows, August 5, 2013, February 6, 2023, https://thecustomizewindows.com/2013/08/secure-connection-to-cloud-infrastructure-by-vpn-tunnel/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT