mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-22 17:39:53 +03:00
Compare commits
24 Commits
0701ee7b3f
...
086fb7165c
Author | SHA1 | Date | |
---|---|---|---|
|
086fb7165c | ||
|
315ffffeec | ||
|
141060101d | ||
|
7006539732 | ||
|
8ad34b2012 | ||
|
186d48fba2 | ||
|
37231ac006 | ||
|
9378c341f7 | ||
|
99e277aa71 | ||
|
bcb896b178 | ||
|
6e5395cc8d | ||
|
9ce27f363e | ||
|
d568cc1727 | ||
|
c9b5e25c87 | ||
|
7f074d0c0b | ||
|
f8c5fa5384 | ||
|
06e79fd75d | ||
|
d30949038f | ||
|
c621a8e74d | ||
|
1b0aa5e434 | ||
|
51898b80a2 | ||
|
ed282ad977 | ||
|
7e30a8e52a | ||
|
a09446c1f3 |
2
.github/workflows/macos.yml
vendored
2
.github/workflows/macos.yml
vendored
@ -7,7 +7,7 @@ jobs:
|
|||||||
build_and_test:
|
build_and_test:
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
os: [macos-13, macos-12, macos-11]
|
os: [macos-14, macos-13, macos-12]
|
||||||
name: ${{ matrix.os }}
|
name: ${{ matrix.os }}
|
||||||
runs-on: ${{ matrix.os }}
|
runs-on: ${{ matrix.os }}
|
||||||
steps:
|
steps:
|
||||||
|
@ -3,7 +3,7 @@ cmake_minimum_required(VERSION 3.10)
|
|||||||
set(BUILD_NUMBER CACHE STRING "The number of the current build.")
|
set(BUILD_NUMBER CACHE STRING "The number of the current build.")
|
||||||
|
|
||||||
if ("${BUILD_NUMBER}" STREQUAL "")
|
if ("${BUILD_NUMBER}" STREQUAL "")
|
||||||
set(BUILD_NUMBER "5184")
|
set(BUILD_NUMBER "5185")
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if (BUILD_NUMBER LESS 5180)
|
if (BUILD_NUMBER LESS 5180)
|
||||||
@ -53,7 +53,7 @@ if(UNIX)
|
|||||||
#
|
#
|
||||||
# use rpath for locating installed libraries
|
# use rpath for locating installed libraries
|
||||||
#
|
#
|
||||||
set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib")
|
set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}")
|
||||||
set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE)
|
set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE)
|
||||||
|
|
||||||
include(CheckIncludeFile)
|
include(CheckIncludeFile)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"environments": [ { "BuildNumber": "5184" } ],
|
"environments": [ { "BuildNumber": "5185" } ],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"name": "x64-native",
|
"name": "x64-native",
|
||||||
|
@ -1517,7 +1517,9 @@ void IPCProcessL3EventsEx(IPC *ipc, UINT64 now)
|
|||||||
// We save the router advertisement data for later use
|
// We save the router advertisement data for later use
|
||||||
IPCIPv6AddRouterPrefixes(ipc, &p->ICMPv6HeaderPacketInfo.OptionList, src_mac, &ip_src);
|
IPCIPv6AddRouterPrefixes(ipc, &p->ICMPv6HeaderPacketInfo.OptionList, src_mac, &ip_src);
|
||||||
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, src_mac, true);
|
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, src_mac, true);
|
||||||
|
if (p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer != NULL) {
|
||||||
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, true);
|
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, true);
|
||||||
|
}
|
||||||
ndtProcessed = true;
|
ndtProcessed = true;
|
||||||
header_size = sizeof(ICMPV6_ROUTER_ADVERTISEMENT_HEADER);
|
header_size = sizeof(ICMPV6_ROUTER_ADVERTISEMENT_HEADER);
|
||||||
break;
|
break;
|
||||||
@ -2354,7 +2356,14 @@ void IPCIPv6AddRouterPrefixes(IPC *ipc, ICMPV6_OPTION_LIST *recvPrefix, UCHAR *m
|
|||||||
IntToSubnetMask6(&newRA->RoutedMask, recvPrefix->Prefix[i]->SubnetLength);
|
IntToSubnetMask6(&newRA->RoutedMask, recvPrefix->Prefix[i]->SubnetLength);
|
||||||
CopyIP(&newRA->RouterAddress, ip);
|
CopyIP(&newRA->RouterAddress, ip);
|
||||||
Copy(newRA->RouterMacAddress, macAddress, 6);
|
Copy(newRA->RouterMacAddress, macAddress, 6);
|
||||||
|
if (recvPrefix->SourceLinkLayer != NULL)
|
||||||
|
{
|
||||||
Copy(newRA->RouterLinkLayerAddress, recvPrefix->SourceLinkLayer->Address, 6);
|
Copy(newRA->RouterLinkLayerAddress, recvPrefix->SourceLinkLayer->Address, 6);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
Zero(newRA->RouterLinkLayerAddress, 6);
|
||||||
|
}
|
||||||
Add(ipc->IPv6RouterAdvs, newRA);
|
Add(ipc->IPv6RouterAdvs, newRA);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -2657,7 +2666,7 @@ void IPCIPv6SendUnicast(IPC *ipc, void *data, UINT size, IP *next_ip)
|
|||||||
}
|
}
|
||||||
|
|
||||||
destMac = ra.RouterMacAddress;
|
destMac = ra.RouterMacAddress;
|
||||||
if (!IsMacUnicast(destMac) && !IsMacInvalid(ra.RouterMacAddress))
|
if (!IsMacUnicast(destMac) && !IsMacInvalid(ra.RouterLinkLayerAddress))
|
||||||
{
|
{
|
||||||
destMac = ra.RouterLinkLayerAddress;
|
destMac = ra.RouterLinkLayerAddress;
|
||||||
}
|
}
|
||||||
|
@ -9340,20 +9340,75 @@ UINT ServeDhcpDiscoverEx(VH *v, UCHAR *mac, UINT request_ip, bool is_static_ip)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
UINT ret = 0;
|
||||||
DHCP_LEASE *d = SearchDhcpLeaseByIp(v, request_ip);
|
DHCP_LEASE *d = SearchDhcpLeaseByIp(v, request_ip);
|
||||||
|
|
||||||
if (d != NULL)
|
if (d != NULL)
|
||||||
{
|
{
|
||||||
// The requested IP address is used already
|
// If an entry for the same IP address already exists,
|
||||||
return 0;
|
// check whether it is a request from the same MAC address
|
||||||
}
|
if (Cmp(mac, d->MacAddress, 6) == 0)
|
||||||
|
|
||||||
// For static IP, the requested IP address must NOT be within the range of the DHCP pool
|
|
||||||
if (Endian32(request_ip) < Endian32(v->DhcpIpStart) || Endian32(request_ip) > Endian32(v->DhcpIpEnd))
|
|
||||||
{
|
{
|
||||||
return request_ip;
|
// Examine whether the specified IP address is within the range of assignment
|
||||||
|
if (Endian32(v->DhcpIpStart) > Endian32(request_ip) ||
|
||||||
|
Endian32(request_ip) > Endian32(v->DhcpIpEnd))
|
||||||
|
{
|
||||||
|
// Accept if within the range
|
||||||
|
ret = request_ip;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
// Duplicated IPV4 address found. The DHCP server replies to DHCPREQUEST with DHCP NAK.
|
||||||
|
char ipstr[MAX_HOST_NAME_LEN + 1] = { 0 };
|
||||||
|
char macstr[128] = { 0 };
|
||||||
|
IPToStr32(ipstr, sizeof(ipstr), request_ip);
|
||||||
|
BinToStr(macstr, sizeof(macstr), d->MacAddress, 6);
|
||||||
|
Debug("Virtual DHC Server: Duplicated IP address detected. Static IP: %s, Used by MAC:%s\n", ipstr, macstr);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// Examine whether the specified IP address is within the range of assignment
|
||||||
|
if (Endian32(v->DhcpIpStart) > Endian32(request_ip) ||
|
||||||
|
Endian32(request_ip) > Endian32(v->DhcpIpEnd))
|
||||||
|
{
|
||||||
|
// Accept if within the range
|
||||||
|
ret = request_ip;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// Propose an IP in the range since it's a Discover although It is out of range
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (ret == 0)
|
||||||
|
{
|
||||||
|
// If there is any entry with the same MAC address
|
||||||
|
// that are already registered, use it with priority
|
||||||
|
DHCP_LEASE *d = SearchDhcpLeaseByMac(v, mac);
|
||||||
|
|
||||||
|
if (d != NULL)
|
||||||
|
{
|
||||||
|
// Examine whether the found IP address is in the allocation region
|
||||||
|
if (Endian32(v->DhcpIpStart) > Endian32(d->IpAddress) ||
|
||||||
|
Endian32(d->IpAddress) > Endian32(v->DhcpIpEnd))
|
||||||
|
{
|
||||||
|
// Use the IP address if it's found within the range
|
||||||
|
ret = d->IpAddress;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (ret == 0)
|
||||||
|
{
|
||||||
|
// For static IP, the requested IP address must NOT be within the range of the DHCP pool
|
||||||
|
if (Endian32(v->DhcpIpStart) > Endian32(request_ip) ||
|
||||||
|
Endian32(request_ip) > Endian32(v->DhcpIpEnd))
|
||||||
|
{
|
||||||
|
ret = request_ip;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Take an appropriate IP addresses that can be assigned newly
|
// Take an appropriate IP addresses that can be assigned newly
|
||||||
@ -9709,6 +9764,9 @@ void VirtualDhcpServer(VH *v, PKT *p)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
{
|
||||||
|
// Reply of DHCP_REQUEST must be either DHCP_ACK or DHCP_NAK.
|
||||||
|
if (opt->Opcode == DHCP_REQUEST)
|
||||||
{
|
{
|
||||||
// There is no IP address that can be provided
|
// There is no IP address that can be provided
|
||||||
DHCP_OPTION_LIST ret;
|
DHCP_OPTION_LIST ret;
|
||||||
@ -9743,6 +9801,7 @@ void VirtualDhcpServer(VH *v, PKT *p)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Release the memory
|
// Release the memory
|
||||||
Free(opt);
|
Free(opt);
|
||||||
|
@ -4854,7 +4854,7 @@ CMD_ConnectionList_Help 现在,先获取与 VPN Server 连接的 TCP/IP 一
|
|||||||
CMD_ConnectionList_Args ConnectionList
|
CMD_ConnectionList_Args ConnectionList
|
||||||
|
|
||||||
|
|
||||||
# ConnectionList 命令
|
# ConnectionGet 命令
|
||||||
CMD_ConnectionGet 获取连接到 VPN Server 的 TCP 信息一览表
|
CMD_ConnectionGet 获取连接到 VPN Server 的 TCP 信息一览表
|
||||||
CMD_ConnectionGet_Help 获取与 VPN Server 连接的 TCP/IP 连接的详细信息。\n可以获得 [连接名],[连接种类],[连接主机名],[连接主机 IP],[联机主机端口 TCP],[连接时间],[服务器品牌],[服务器版本],[服务器铭牌号],[客户机品牌],[客户机版本],[客户机铭牌号] 等信息。 \n要运行此命令,需要管理员权限。
|
CMD_ConnectionGet_Help 获取与 VPN Server 连接的 TCP/IP 连接的详细信息。\n可以获得 [连接名],[连接种类],[连接主机名],[连接主机 IP],[联机主机端口 TCP],[连接时间],[服务器品牌],[服务器版本],[服务器铭牌号],[客户机品牌],[客户机版本],[客户机铭牌号] 等信息。 \n要运行此命令,需要管理员权限。
|
||||||
CMD_ConnectionGet_Args ConnectionGet [name]
|
CMD_ConnectionGet_Args ConnectionGet [name]
|
||||||
@ -7044,7 +7044,7 @@ CMD_RemoteDisable_Args RemoteDisable
|
|||||||
|
|
||||||
###################################################
|
###################################################
|
||||||
# #
|
# #
|
||||||
# 下面这是VPN工具用的指令 #
|
# 下面这是VPN Tools用的指令 #
|
||||||
# #
|
# #
|
||||||
###################################################
|
###################################################
|
||||||
|
|
||||||
|
@ -4839,7 +4839,7 @@ CMD_ConnectionList_Help Use this to get a list of TCP/IP connections that are cu
|
|||||||
CMD_ConnectionList_Args ConnectionList
|
CMD_ConnectionList_Args ConnectionList
|
||||||
|
|
||||||
|
|
||||||
# ConnectionList command
|
# ConnectionGet command
|
||||||
CMD_ConnectionGet Get Information of TCP Connections Connecting to the VPN Server
|
CMD_ConnectionGet Get Information of TCP Connections Connecting to the VPN Server
|
||||||
CMD_ConnectionGet_Help Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. \nYou can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. \nTo execute this command, you must have VPN Server administrator privileges.
|
CMD_ConnectionGet_Help Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. \nYou can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. \nTo execute this command, you must have VPN Server administrator privileges.
|
||||||
CMD_ConnectionGet_Args ConnectionGet [name]
|
CMD_ConnectionGet_Args ConnectionGet [name]
|
||||||
|
@ -4558,7 +4558,7 @@ CMD_SyslogGet_COLUMN_2 syslog Server Host Name
|
|||||||
CMD_SyslogGet_COLUMN_3 syslog Server Port Number
|
CMD_SyslogGet_COLUMN_3 syslog Server Port Number
|
||||||
|
|
||||||
|
|
||||||
# ConnectionList command
|
# ConnectionGet command
|
||||||
CMD_ConnectionList Get List of TCP Connections Connecting to the VPN Server
|
CMD_ConnectionList Get List of TCP Connections Connecting to the VPN Server
|
||||||
CMD_ConnectionList_Help Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the SessionList command. \nYou can get the following: Connection Name, Connection Source, Connection Start and Type.\nTo execute this command, you must have VPN Server administrator privileges.
|
CMD_ConnectionList_Help Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the SessionList command. \nYou can get the following: Connection Name, Connection Source, Connection Start and Type.\nTo execute this command, you must have VPN Server administrator privileges.
|
||||||
CMD_ConnectionList_Args ConnectionList
|
CMD_ConnectionList_Args ConnectionList
|
||||||
@ -4851,7 +4851,7 @@ CMD_HubList_Args ListaHub
|
|||||||
# Hub command
|
# Hub command
|
||||||
CMD_Hub Select Virtual Hub to Manage
|
CMD_Hub Select Virtual Hub to Manage
|
||||||
CMD_Hub_Help Use this to select the Virtual Hub to be the target of administration. For an administration utility with the status of being connected to a VPN Server, before executing a command to set or manage a Virtual Hub, you must use the Hub command to select the Virtual Hub to manage. \nWhen in the status of being connected to a VPN Server in Virtual Hub Admin Mode, you can select a single Virtual Hub to be the target of administration but you cannot select other Virtual Hubs. When having the status of being connected to the VPN Server in Server Admin Mode, you can make all Virtual Hubs the target of administration. \nTo get a list of Virtual Hubs that currently exist on the VPN Server, use the HubList command. \nFor the VPN Bridge, you can only select the Virtual Hub that has the name "BRIDGE".
|
CMD_Hub_Help Use this to select the Virtual Hub to be the target of administration. For an administration utility with the status of being connected to a VPN Server, before executing a command to set or manage a Virtual Hub, you must use the Hub command to select the Virtual Hub to manage. \nWhen in the status of being connected to a VPN Server in Virtual Hub Admin Mode, you can select a single Virtual Hub to be the target of administration but you cannot select other Virtual Hubs. When having the status of being connected to the VPN Server in Server Admin Mode, you can make all Virtual Hubs the target of administration. \nTo get a list of Virtual Hubs that currently exist on the VPN Server, use the HubList command. \nFor the VPN Bridge, you can only select the Virtual Hub that has the name "BRIDGE".
|
||||||
CMD_Hub_Args Hub [nome]
|
CMD_Hub_Args Hub [name]
|
||||||
CMD_Hub_[name] Specify the name of the Virtual Hub to manage. If this parameter is left unspecified, the Select Virtual Hub to Manage will be cancelled.
|
CMD_Hub_[name] Specify the name of the Virtual Hub to manage. If this parameter is left unspecified, the Select Virtual Hub to Manage will be cancelled.
|
||||||
CMD_Hub_Unselected The Virtual Hub selection has been unselected.
|
CMD_Hub_Unselected The Virtual Hub selection has been unselected.
|
||||||
CMD_Hub_Selected The Virtual Hub "%S" has been selected.
|
CMD_Hub_Selected The Virtual Hub "%S" has been selected.
|
||||||
@ -5619,7 +5619,7 @@ CMD_UserRadiusSet_ALIAS When this parameter is set, it is possible to make the u
|
|||||||
CMD_UserRadiusSet_Prompt_ALIAS Alias Name for Authentication (Optional):
|
CMD_UserRadiusSet_Prompt_ALIAS Alias Name for Authentication (Optional):
|
||||||
|
|
||||||
|
|
||||||
# UserNTLMSet コマンド
|
# UserNTLMSet command
|
||||||
CMD_UserNTLMSet Set NT Domain Authentication for User Auth Type
|
CMD_UserNTLMSet Set NT Domain Authentication for User Auth Type
|
||||||
CMD_UserNTLMSet_Help Use this to set NT Domain Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. When a user connects to a Virtual Hub using a user name that is set for NT Domain authentication, the user name and the user input password is sent to the Windows NT / 2000 / Server 2003 / Server 2008 / Server 2008 R2 / Server 2012 Domain Controller or Active Directory Server where the server checks the user name and password, then if the verification is successful, that user is allowed VPN connection. \nTo use NT Domain authentication, the VPN Server must be operating on a Windows NT 4.0, Windows 2000, Windows XP, Windows Vista, Windows Server 2008, Windows Server 2008 R2 or Windows Server 2012 operating system that is connected to that domain. For details please contact the VPN Server's administrator. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
|
CMD_UserNTLMSet_Help Use this to set NT Domain Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. When a user connects to a Virtual Hub using a user name that is set for NT Domain authentication, the user name and the user input password is sent to the Windows NT / 2000 / Server 2003 / Server 2008 / Server 2008 R2 / Server 2012 Domain Controller or Active Directory Server where the server checks the user name and password, then if the verification is successful, that user is allowed VPN connection. \nTo use NT Domain authentication, the VPN Server must be operating on a Windows NT 4.0, Windows 2000, Windows XP, Windows Vista, Windows Server 2008, Windows Server 2008 R2 or Windows Server 2012 operating system that is connected to that domain. For details please contact the VPN Server's administrator. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
|
||||||
CMD_UserNTLMSet_Args UserNTLMSet [name] [/ALIAS:alias_name]
|
CMD_UserNTLMSet_Args UserNTLMSet [name] [/ALIAS:alias_name]
|
||||||
@ -6193,7 +6193,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED Connection to VPN Azure Cloud Server is Es
|
|||||||
CMD_VpnAzureGetStatus_PRINT_HOSTNAME Hostname of this VPN Server on VPN Azure Service
|
CMD_VpnAzureGetStatus_PRINT_HOSTNAME Hostname of this VPN Server on VPN Azure Service
|
||||||
|
|
||||||
|
|
||||||
# VpnAzureSetStatus command
|
# VpnAzureSetEnable command
|
||||||
CMD_VpnAzureSetEnable Enable / Disable VPN Azure Function
|
CMD_VpnAzureSetEnable Enable / Disable VPN Azure Function
|
||||||
CMD_VpnAzureSetEnable_Help Enable or disable the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
|
CMD_VpnAzureSetEnable_Help Enable or disable the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
|
||||||
CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no]
|
CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no]
|
||||||
@ -6702,7 +6702,7 @@ CMD_AccountOpensslCertSet_PROMPT_KEYNAME Specify the openssl engine specific key
|
|||||||
CMD_AccountOpensslCertSet_PROMPT_ENGINENAME Specify the openssl engine name:
|
CMD_AccountOpensslCertSet_PROMPT_ENGINENAME Specify the openssl engine name:
|
||||||
|
|
||||||
|
|
||||||
# AccountRetrySet コマンド
|
# AccountRetrySet command
|
||||||
CMD_AccountRetrySet Set Interval between Connection Retries for Connection Failures or Disconnections of VPN Connection Setting
|
CMD_AccountRetrySet Set Interval between Connection Retries for Connection Failures or Disconnections of VPN Connection Setting
|
||||||
CMD_AccountRetrySet_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting attempts to connect to a VPN Server, use this to specify the interval to wait between connection attempts and the limit of how many times to retry connecting when communication with the VPN Server has been disconnected or when the connection process failed. \nIf the user authentication type is Smart Card Authentication, no connection retry will be performed regardless of the Number of Connection Attempts setting.
|
CMD_AccountRetrySet_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting attempts to connect to a VPN Server, use this to specify the interval to wait between connection attempts and the limit of how many times to retry connecting when communication with the VPN Server has been disconnected or when the connection process failed. \nIf the user authentication type is Smart Card Authentication, no connection retry will be performed regardless of the Number of Connection Attempts setting.
|
||||||
CMD_AccountRetrySet_Args AccountRetrySet [name] [/NUM:num_retry] [/INTERVAL:retry_interval]
|
CMD_AccountRetrySet_Args AccountRetrySet [name] [/NUM:num_retry] [/INTERVAL:retry_interval]
|
||||||
|
@ -4839,7 +4839,7 @@ CMD_ConnectionList_Help Use this to get a list of TCP/IP connections that are cu
|
|||||||
CMD_ConnectionList_Args ConnectionList
|
CMD_ConnectionList_Args ConnectionList
|
||||||
|
|
||||||
|
|
||||||
# ConnectionList command
|
# ConnectionGet command
|
||||||
CMD_ConnectionGet Get Information of TCP Connections Connecting to the VPN Server
|
CMD_ConnectionGet Get Information of TCP Connections Connecting to the VPN Server
|
||||||
CMD_ConnectionGet_Help Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. \nYou can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. \nTo execute this command, you must have VPN Server administrator privileges.
|
CMD_ConnectionGet_Help Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. \nYou can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. \nTo execute this command, you must have VPN Server administrator privileges.
|
||||||
CMD_ConnectionGet_Args ConnectionGet [name]
|
CMD_ConnectionGet_Args ConnectionGet [name]
|
||||||
@ -7122,7 +7122,7 @@ CMD_TrafficClient_ERROR_HOSTPORT The host name or port number is incorrectly spe
|
|||||||
# TrafficServer command
|
# TrafficServer command
|
||||||
CMD_TrafficServer Запустить средство тестирования скорости сетевого трафика в режиме сервера
|
CMD_TrafficServer Запустить средство тестирования скорости сетевого трафика в режиме сервера
|
||||||
CMD_TrafficServer_Help Используется для запуска инструмента измерения пропускной способности в режиме сервера. \nДве команды, TrafficClient и TrafficServer, используются для измерения пропускной способности между двумя компьютерами, соединенными сетью IP. \nУкажите номер порта и запустите серверную часть с помощью команды TrafficServer, чтобы прослушивать подключение от TrafficClient другого компьютера. \nВы можете отобразить более подробную информацию об инструменте измерения пропускной способности, введя "TrafficClient ?". \n\nПримечание. Эту команду можно вызвать из утилиты управления командной строкой SoftEther VPN. Вы также можете выполнить эту команду при подключении к текущему VPN-серверу или VPN клиенту в режиме администрирования, но фактически осуществляет связь и измеряет пропускную способность тот компьютер, на котором выполняется команда, а не компьютер с которого выполнено подключение в режиме администрирования.
|
CMD_TrafficServer_Help Используется для запуска инструмента измерения пропускной способности в режиме сервера. \nДве команды, TrafficClient и TrafficServer, используются для измерения пропускной способности между двумя компьютерами, соединенными сетью IP. \nУкажите номер порта и запустите серверную часть с помощью команды TrafficServer, чтобы прослушивать подключение от TrafficClient другого компьютера. \nВы можете отобразить более подробную информацию об инструменте измерения пропускной способности, введя "TrafficClient ?". \n\nПримечание. Эту команду можно вызвать из утилиты управления командной строкой SoftEther VPN. Вы также можете выполнить эту команду при подключении к текущему VPN-серверу или VPN клиенту в режиме администрирования, но фактически осуществляет связь и измеряет пропускную способность тот компьютер, на котором выполняется команда, а не компьютер с которого выполнено подключение в режиме администрирования.
|
||||||
CMD_TrafficServer_Args TrafficServer [порт] [/NOHUP:да|нет]
|
CMD_TrafficServer_Args TrafficServer [port] [/NOHUP:yes|no]
|
||||||
CMD_TrafficServer_[port] Укажите номер порта для прослушивания соединения. Если указанный порт уже используется другой программой или порт не может быть открыт, произойдет ошибка
|
CMD_TrafficServer_[port] Укажите номер порта для прослушивания соединения. Если указанный порт уже используется другой программой или порт не может быть открыт, произойдет ошибка
|
||||||
CMD_TrafficServer_NOHUP Если указано «да», серверная часть игнорирует любой ввод с консоли и никогда не останавливается. Это удобно, если вы хотите запустить TrafficServer в бесконечном режиме.
|
CMD_TrafficServer_NOHUP Если указано «да», серверная часть игнорирует любой ввод с консоли и никогда не останавливается. Это удобно, если вы хотите запустить TrafficServer в бесконечном режиме.
|
||||||
|
|
||||||
|
@ -4855,7 +4855,7 @@ CMD_ConnectionList_Help 現在,先獲取與 VPN Server 連接的 TCP/IP 一
|
|||||||
CMD_ConnectionList_Args ConnectionList
|
CMD_ConnectionList_Args ConnectionList
|
||||||
|
|
||||||
|
|
||||||
# ConnectionList 命令
|
# ConnectionGet 命令
|
||||||
CMD_ConnectionGet 獲取連接到 VPN Server 的 TCP 資訊一覽表
|
CMD_ConnectionGet 獲取連接到 VPN Server 的 TCP 資訊一覽表
|
||||||
CMD_ConnectionGet_Help 獲取與 VPN Server 連接的 TCP/IP 連接的詳細資訊。\n可以獲得 [連接名],[連接種類],[連接主機名稱],[連接主機 IP],[連線主機埠 TCP],[連線時間],[伺服器品牌],[伺服器版本],[伺服器銘牌號],[客戶機品牌],[客戶機版本],[客戶機銘牌號] 等資訊。 \n要運行此命令,需要管理員許可權。
|
CMD_ConnectionGet_Help 獲取與 VPN Server 連接的 TCP/IP 連接的詳細資訊。\n可以獲得 [連接名],[連接種類],[連接主機名稱],[連接主機 IP],[連線主機埠 TCP],[連線時間],[伺服器品牌],[伺服器版本],[伺服器銘牌號],[客戶機品牌],[客戶機版本],[客戶機銘牌號] 等資訊。 \n要運行此命令,需要管理員許可權。
|
||||||
CMD_ConnectionGet_Args ConnectionGet [name]
|
CMD_ConnectionGet_Args ConnectionGet [name]
|
||||||
@ -7046,7 +7046,7 @@ CMD_RemoteDisable_Args RemoteDisable
|
|||||||
|
|
||||||
###################################################
|
###################################################
|
||||||
# #
|
# #
|
||||||
# 下面這是VPN工具用的指令 #
|
# 下面這是VPN Tools用的指令 #
|
||||||
# #
|
# #
|
||||||
###################################################
|
###################################################
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user