安装环境
阿里云CentOS7.2(64bit)

下载并安装libevent-2.0
wget https://github.com/downloads/libevent/libevent/libevent-2.0.21-stable.tar.gz
tar zxvf libevent-2.0.21-stable.tar.gz
cd libevent-2.0.21-stable && ./configure
make && make install
下载编译安装coturn
git clone https://github.com/coturn/coturn
cd coturn
./configure
make
make install
查看是否安装成功
which turnserver

配置文件
在/usr/local/etc/目录下有turnserver.conf.default,复制为turnserver.conf
cd /usr/local/etc/
cp turnserver.conf.default turnserver.conf
首先查看网卡,记录网卡名称和内网地址

签名证书
使用命令安装openssl
yum install openssl
cert和pkey配置的自签名证书用Openssl命令生成:
openssl req -x509 -newkey rsa:2048 -keyout /etc/turn_server_pkey.pem -out /etc/turn_server_cert.pem -days 99999 –nodes
填写相关信息随便写。
生成的两个文件一般在/etc/目录下

修改配置信息
vi /usr/local/etc/turnserver.conf
listening-ip与relay-ip采用内网ip,external-ip是外网的ip
relay-device=eth0 #与前ifconfig查到的网卡名称一致
listening-ip=172.18.77.60 #内网IP
listening-port=3478
tls-listening-port=5349
relay-ip=172.18.77.60
external-ip=47.107.110.xxx #公网IP
relay-threads=50
lt-cred-mech
cert=/etc/turn_server_cert.pem
pkey=/etc/turn_server_pkey.pem
pidfile=”/var/run/turnserver.pid”
min-port=49152
max-port=65535
user=zjf:123456 #用户名密码,创建IceServer时用
#创建IceServer
IceServer turnIceServer = new IceServer("turn:47.107.110.xxx:3478","zjf","123456");
IceServer stunIceServer = new IceServer("stun:47.107.110.212:xxx","","");
开启turnserver,执行命令
turnserver -o -a -f -user=zjf:123456 -r Guangdong

一定要在阿里云后台的安全组规则中添加用到的端口,包括3478端口的tcp/udp,udp一定要配置

如果不是阿里云的话就用命令行打开相关端口,然后重启防火墙即可。
添加
firewall-cmd --zone=public --add-port=3478/udp --permanent
firewall-cmd --zone=public --add-port=3478/tcp --permanent
重新载入
firewall-cmd --reload
重启防火墙
systemctl restart firewalld
在浏览器中打开47.107.110.xxx:3478,如果打开之后是这个页面说明已经配置成功了

ICE测试
https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/
打开上面的测试地址,分别测试stun和turn服务器,只有relay地址回来的是你的ip才算穿透成功。

按钮,开始穿透,然后看一下
只有relay地址回来的是不是你的IP。


网友评论