You can also distribute configurations together with Tunnelblick settings as exported Tunnelblick setups. Tunnelblick can export the configurations and settings that are present on a computer including all users' configurations and settings.
This can be used to copy a Tunnelblick setup to a new computer. The export file can be expanded into a. That package has a simple file hierarchy which can be easily edited and then recompressed and the compressed file distributed. A more complex way of distributing configurations along with Tunnelblick is to create a "Deployed" version of Tunnelblick:.
How do I install Tunnelblick? I have installed Tunnelblick - Now what? How do I uninstall Tunnelblick? How do I revert to an earlier version of Tunnelblick? How do I update Tunnelblick? Why does Tunnelblick need root privileges? Why does Tunnelblick change the ownership of the configuration files to root?
Why are routes not restored when closing my VPN connection? Why are some checkboxes or buttons dimmed and disabled? Why are some checkboxes or buttons missing? Where can I go if my question is not answered here? VPNs are primarily used two ways, or sometimes both ways simultaneously: - To securely connect a computer to the Internet, even though it may be connecting through an untrusted network a wireless network at a hotel or airport, for example ; and - To securely connect a computer to a company's internal network or some part of it a branch office, for example.
Please see Privacy and Security for important information before you use Tunnelblick to attempt to make yourself anonymous on the Internet. In addition to Tunnelblick, you need access to a VPN server. Your company may provide one, or you can obtain VPN service from any of several VPN service providers, or you can use another one of your computers or a router to act as a VPN server.
It comes as a ready-to-use application with all necessary binaries and drivers including OpenVPN and Tun and Tap system extensions included. No additional installation is necessary — just add your configuration and encryption information.
Tunnelblick is free software made available under the GNU General Public License, version 2 and may be distributed only in accordance with the terms of that license. The Tunnelblick disk image includes a link to the Tunnelblick Documentation. There is also help available in Tunnelblick's windows by clicking on the question-mark "? An older version of Tunnelblick works on OS X That version is a Universal bit application, so it runs as an application in bit mode on both Intel and PowerPC Macs under bit and bit kernels.
You need a VPN server to connect to. It could be a server at your company or at a VPN service provider, or it could be a VPN that you have set up yourself at home.
Tunnelblick indicates that the VPN is connected by showing the "open" tunnel in your menu bar usually near the Spotlight icon. An easy way to check if web traffic is going through the VPN is to put enable "Check if the apparent public IP address changed after connecting" for the configuration. Be sure to select all configurations that you want to change before making a change. Binaries for all available modern versions of Tunnelblick are available on the Downloads page.
Binaries for all available older versions of Tunnelblick are available on the Deprecated Downloads page. You can build Tunnelblick from the source code on Tunnelblick's GitHub site. See Source. A "deployed" version of Tunnelblick is a customized version of the program, which includes everything you need to connect to a VPN: the program itself, configuration file s , and key and certificate files for encryption.
If you download Tunnelblick from this website , it is not a deployed version. You must also have configuration, key, and certificate files, which should be provided to you by your company or your VPN service provider. However, when the computer has more than 64 users, you must create a file to instruct Tunnelblick how to import the data.
Such a file may also be used to copy the import data from one user to multiple users on the import computer at one time. The file must be a "plain text" UTF-8 file named "username-map. To see the inside of a. The file should consist of one line for each user in the import data whose data you wish to import.
Each line should have the import data username, a colon, and the name of a user on the computer on which the import is being performed. For example,. The configurations and settings for user "liam" on the exporting computer will be imported to user "liam" and to user "noah" on the importing computer.
The configurations and settings for users "emma" and "olivia" on the exporting computer will be imported to user "william" on the importing computer. A consequence of the last two points is that if emma and olivia both have a configuration named "office", any existing configuration that william has will be overwritten by olivia's copy. Technically, it will first be overwritten by emma's copy, and then that will be overwritten by olivia's copy.
Important: Saved usernames and passwords are not exported. Importing Import selected configurations and settings from a ". Here's an example: For each of the usernames in the left column, select "Do not import" or a username, then click "OK" to do the import.
0コメント