Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/02/2017 in all areas

  1. Beav

    New module to resell

    @Blesta Addons @cyandark either of these gentlemen would be more than happy to give you a free quote on custom plugins/modules
    1 point
  2. Hi, We offer Blesta development, You can send me a PM with more information and I will give you a free quote, Also we have support in Spanish. Best Regards.
    1 point
  3. Hi, I decided this week wire my house and build a home network, As part of my home network, I purchased an old Xserve from 2009 and I installed macOS Sierra, But the problems start when I try to access the server outside of my network, I forwarded the ports on my Router but I found another problem, My router is inside a big NAT from my ISP. (I stole a diagram from ServerFault that shows my situation) So I thought in two possible solutions: Get a Dedicated IP from my ISP Use a VPN First of all, I called to my ISP asking for a dedicated IP address, unfortunately they only offer dedicated IP in business plans (that are kinda expensive), so it's not an option for me. So I decided to go with the second option, use a VPN. I purchased a small VPS with two dedicated IP address (x.x.x.x and y.y.y.y) from a very know cloud provider, and then I proceed to install xl2tpd with IPsec in the VPS. Installing XL2TPD with IPsec in CentOS 6 Searching on Google, I found very easy-to-use installation script, that you can find on GitHub here: https://github.com/hwdsl2/setup-ipsec-vpn It's very recommendable first of all update the OS dependencies execution "yum update", and then install IPsec. You can do all this in one step: yum -y update && wget https://git.io/vpnsetup-centos -O vpnsetup.sh && sudo sh vpnsetup.sh && chkconfig ipsec on And that's been all, You will see in the terminal at the end of the installation your VPN access details, Save this in a secure place. Enabling IP Forwarding After the installation I tested the VPN on my computer and my Android Phone, and the navigation works pretty well. So in order to get access to my server from the Internet, I configured the VPN on the server, You can find here a detailed explanation how to configure your new VPN in your OS: https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/clients.md Now when your server is connected to the VPN, we need to check what is the Local IP assigned by the VPN to our server, For explanation purposes I will use the IP z.z.z.z, The installation script by default adds a DROP policy to the Iptables firewall, so first we need to remove them. First we must activate the IP forwarding, to activate it you must modify the following parameters as shown below net.ipv4.ip_forward = 1 net.ipv6.conf.all.accept_ra=2 net.ipv6.conf.eth0.accept_ra=2 These parameters must be modified, or if they do not exist add them at the end, in the file /etc/sysctl.conf Now we will save all the Iptables rules in a file called "rules.v4" mkdir /etc/iptables/ iptables-save > /etc/iptables/rules.v4 Then open the new file with vi or nano. nano /etc/iptables/rules.v4 Now you need to find those lines in the file and remove them and save the file: -A FORWARD -j REJECT --reject-with icmp-host-prohibited -A INPUT -j REJECT --reject-with icmp-host-prohibited After save the file you need to restore them to Iptables, to update the new rules: iptables -F iptables-restore < /etc/iptables/rules.v4 service iptables save service iptables reload Now the final step, you need enable IP Forwarding at the OS level: echo "1" > /proc/sys/net/ipv4/ip_forward && sysctl net.ipv4.ip_forward=1 Now, reboot your VPS. Forward Local IP Now to access your server from the Internet, we need forward the Local IP (z.z.z.z) to the Public IP, I will forward the server to the y.y.y.y IP. This step is easy, we only need add some rules to Iptables, this rules will forward all the ports to the local IP. iptables -t nat -A POSTROUTING -o eth0 -s z.z.z.z -j SNAT --to-source y.y.y.y iptables -t nat -A PREROUTING -i eth0 -d y.y.y.y -j DNAT --to-destination z.z.z.z iptables -A FORWARD -s y.y.y.y -j ACCEPT iptables -A FORWARD -d z.z.z.z -j ACCEPT service iptables save service iptables reload And that is all! Now you can access your amazing server from http://y.y.y.y/
    1 point
  4. Figured it out, still need to assign a staff. So even if i am using the admin(root) account in blesta, i still have to configure a staff in the Support Manager using this account and add the desired departments.
    1 point
  5. Hi there - I've recently had a problem with the Stripe module (running v1.3.1) on 3.6.1 patched and a client has attempted to pay by credit card and I'm receiving this error from stripe: error type: "invalid_request_error" message: "The provided key 'pk_live_********************2nh5' does not have the required permissions for this endpoint on account 'acct_*******************'. Having more permission would allow this request to continue." The key is correct, there is only one user on the account (the administrator) but I cant see a means to be able to specify a user on the payment module in any case. I'm confused! Has there been an API change? or is my account incorrectly configured? Thanks,
    0 points
×
×
  • Create New...