植物百科网
当前位置: 首页 农业百科

访问公司内网方法(实现如何访问公司内网资源)

时间:2023-05-25 作者: 小编 阅读量: 1 栏目名: 农业百科

出差的或者休假的小伙伴如果说急需公司内部资料文件该如何实现呢,找同事帮忙传递吗?万一同事有事忙或者恰好这会有事出去了呢。这个时候就想能随时随地的访问公司内部的资源就好了。OpenVPN一个实现VPN的开源软件,OpenVPN是一个健壮的、高度灵活的VPN守护进程。它支持SSL/TLS安全、Ethernetbridging、经由代理的TCP或UDP隧道和NAT。另外,它也支持动态IP地址以及DHCP,可伸缩性足以支持数百或数千用户的使用场景,同时可移植至大多数主流操作系统平台上。

出差的或者休假的小伙伴如果说急需公司内部资料文件该如何实现呢,找同事帮忙传递吗?万一同事有事忙或者恰好这会有事出去了呢。这个时候就想能随时随地的访问公司内部的资源就好了。这个时候你要往下看啦接下来的文章也许能帮助到你

前言简介

VPN是什么:

VPN全称(Virtual Private Network)、中文译为:虚拟私人网络,又称为虚拟专用网络,用于在不安全的线路上安全的传输数据。

OpenVPN

一个实现VPN的开源软件,OpenVPN 是一个健壮的、高度灵活的 VPN 守护进程。它支持 SSL/TLS 安全、Ethernet bridging、经由代理的 TCP 或 UDP 隧道和 NAT。另外,它也支持动态 IP 地址以及DHCP,可伸缩性足以支持数百或数千用户的使用场景,同时可移植至大多数主流操作系统平台上。官网:https://openvpn.net, GitHub地址:https://github.com/OpenVPN/openvpn

OpenVPN示意图

环境配置信息

openvpn server 192.168.154.13 10.0.20.20 web-server1: 10.0.20.100# 操作系统版本:CentOS Linux release 7.9.2009

OpenVPN安装

1、安装openvpn

这里采用yum安装方式来安装openvpn

[root@node03 ~]# yum -y install openvpn

2、安装easy-rsa

从GitHub中下载easy-rsa GitHub地址为 https://github.com/OpenVPN/easy-rsa

2.1、下载easy-rsa包 并解压出来

# 创建目录专用于存放软件包[root@node03 ~]# mkdir /app/openvpn -p[root@node03 openvpn]# wget https://github.com/OpenVPN/easy-rsa/archive/refs/heads/master.zip[root@node03 openvpn]# unzip master.zip[root@node03 openvpn]# mv easy-rsa-master easy-rsa

2.2 配置openvpn

# 拷贝openVPN server配置模板文件到/etc/openvpn目录下[root@node03 openvpn]# cp /usr/share/doc/openvpn-2.4.10/sample/sample-config-files/server.conf/etc/openvpn/# 拷贝证书管理工具到/etc/openvpn下命名为easyrsa-server[root@node03 openvpn]# cp -a easy-rsa /etc/openvpn/easyrsa-server[root@node03 ~]# cd /etc/openvpn/easyrsa-server/[root@node03 easyrsa-server]# cp easyrsa3/vars.example /etc/openvpn/easyrsa-server/easyrsa3/vars# 查看目录结构[root@node03 ~]# cd /etc/openvpn/easyrsa-server/easyrsa3[root@node03 easyrsa3]# tree .├── easyrsa├── openssl-easyrsa.cnf├── vars├── vars.example└── x509-types├── ca├── client├── code-signing├── COMMON├── email├── kdc├── server└── serverClient1 directory, 12 files[root@node03 easyrsa3]## 修改vars配置文件根据自己当前环境配置以下几行[root@node03 easyrsa3]# vim varsset_var EASYRSA_REQ_COUNTRY"CN"set_var EASYRSA_REQ_PROVINCE"Beijing"set_var EASYRSA_REQ_CITY"Haidian"set_var EASYRSA_REQ_ORG"mr.luo"set_var EASYRSA_REQ_EMAIL"admin@root.com"set_var EASYRSA_REQ_OU"My OpenVPN"

3、初始化pki环境和CA签发机构

# 使用pwd查看当前所在路径[root@node03 easyrsa3]# pwd/etc/openvpn/easyrsa-server/easyrsa3# 生成pki目录用于保存证书[root@node03 easyrsa3]# ./easyrsa init-pkiNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsinit-pki complete; you may now create a CA or requests.Your newly created PKI dir is: /etc/openvpn/easyrsa-server/easyrsa3/pki# 查看生成后的pki目录下的文件[root@node03 easyrsa3]# ll pki/total 16-rw------- 1 root root 4616 4月9 02:00openssl-easyrsa.cnfdrwx------ 2 root root38 4月9 02:03 privatedrwx------ 2 root root60 4月9 02:58 reqs-rw------- 1 root root 4750 4月9 02:00 safessl-easyrsa.cnf

4、创建CA机构

# 创建ca证书 如果不想在后续签名中输入密码可以加上nopass 创建ca不使用密码[root@node03 easyrsa3]# ./easyrsa build-caNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017Enter New CA Key Passphrase: #输入ca的密码Re-Enter New CA Key Passphrase: #再次输入ca的密码Generating RSA private key, 2048 bit long modulus..........................................................................................e is 65537 (0x10001)You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Common Name (eg: your user, host, or server name) [Easy-RSA CA]: #直接回车CA creation complete and you may now import and sign cert requests.Your new CA certificate file for publishing is at:/etc/openvpn/easyrsa-server/easyrsa3/pki/ca.crt #ca的公钥# 验证CA的公钥[root@node03 easyrsa3]# ll pki/ca.crt -rw------- 1 root root 1172 4月9 02:01 pki/ca.crt# 验证CA的私钥[root@node03 easyrsa3]# ll pki/private/ca.key -rw------- 1 root root 1766 1766 4月9 02:01 pki/private/ca.key

5、创建服务端证书(私钥)

[root@node03 easyrsa3]# ./easyrsa gen-req server nopass #生成server证书且不使用密码Note: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017Generating a 2048 bit RSA private key................................................................................................................................................................................... writing new private key to '/etc/openvpn/easyrsa-server/easyrsa3/pki/easy-rsa-15024.cRlqdd #生成证书的临时文件-----You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Common Name (eg: your user, host, or server name) [server]: #直接回车Keypair and certificate request completed. Your files are:req: /etc/openvpn/easyrsa-server/easyrsa3/pki/reqs/server.req #openvpn server req证书文件key: /etc/openvpn/easyrsa-server/easyrsa3/pki/private/server.key #openvpn 私钥# 验证CA证书[root@node03 easyrsa3]# ll pki/private/总用量 8-rw------- 1 root root 1766 4月9 02:01 ca.key-rw------- 1 root root 1704 4月9 02:03 server.key# 验证req文件[root@node03 easyrsa3]# ll pki/reqs/总用量 4-rw------- 1 root root 887 4月9 02:03 server.req

6、签发服务端证书

使用自建ca签发服务器证书,即生成服务端crt公钥,crt公钥后期将用户发送给客户端,从而实现与openvpn server端加密传输数据。

# 签发服务端证书,备注信息为server[root@node03 easyrsa3]# ./easyrsa sign server serverNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017You are about to sign the following certificate.Please check over the details shown below for accuracy. Note that this requesthas not been cryptographically verified. Please be sure it came from a trustedsource or that you have verified the request checksum with the sender.Request subject, to be signed as a server certificate for 825 days: #证书有效时长subject=commonName= server #通用名称Type the word 'yes' to continue, or any other input to abort.Confirm request details: yes #输入yes继续Using configuration from /etc/openvpn/easyrsa-server/easyrsa3/pki/easy-rsa-15065.QeDHJH/tmp.L2GwROEnter pass phrase for /etc/openvpn/easyrsa-server/easyrsa3/pki/private/ca.key: #输入ca密码后继续Check that the request matches the signatureSignature okThe Subject's Distinguished Name is as followscommonName:ASN.1 12:'server'Certificate is to be certified until May 23 15:44:06 2022 GMT (825 days)Write out database with 1 new entriesData Base UpdatedCertificate created at: /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/server.crt# 验证生成的服务端公钥[root@node03 easyrsa3]# ll /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/server.crt -rw------- 1 root root 4547 4月9 02:04 /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/server.crt

7、创建Diffie-Hellman

密钥交换方法,由惠特菲尔德·迪菲(Bailey Whitfield Diffie)、马丁·赫尔曼(Martin Edward Hellman)于1976年发表,它是一种安全协议,让双方在完全没有对方任何预先信息的条件下通过不安全信道建立起一个密钥,这个密钥一般作为“对称加密”的密钥而被双方在后续数据传输中使用,DH数学原理是base离散对数问题,做类似事情的还有非对称加密类算法,如:RSA。其应用非常广泛,在SSH、VPN、Https…都有应用,堪称现代密码基石。

[root@node03 easyrsa3]# ./easyrsa gen-dhNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017Generating DH parameters, 2048 bit long safe prime, generator 2This is going to take a long time....................................................................................... ............................... ...........**DH parameters of size 2048 created at /etc/openvpn/easyrsa-server/easyrsa3/pki/dh.pem# 验证生成的秘钥文件[root@node03 easyrsa3]# ll /etc/openvpn/easyrsa-server/easyrsa3/pki/dh.pem -rw------- 1 root root 424 4月9 02:04 /etc/openvpn/easyrsa-server/easyrsa3/pki/dh.pem

8、创建客户端证书

# 创建客户端证书的存放目录[root@node03 ~]# mkdir /app/openvpn/client -p# 复制客户端配置文件[root@node03 ~]# cp /etc/openvpn/easyrsa-server/ /app/openvpn/client -a# 生成pki目录[root@node03 easyrsa3]# cd /app/openvpn/client/easyrsa-server/easyrsa3[root@node03 easyrsa3]# ./easyrsa init-pkiNote: using Easy-RSA configuration from: /app/openvpn/client/easyrsa-server/easyrsa3/varsWARNING!!!You are about to remove the EASYRSA_PKI at: /app/openvpn/client/easyrsa-server/easyrsa3/pkiand initialize a fresh PKI here.Type the word 'yes' to continue, or any other input to abort.Confirm removal: yesinit-pki complete; you may now create a CA or requests.Your newly created PKI dir is: /app/openvpn/client/easyrsa-server/easyrsa3/pki# 验证pki目录[root@node03 easyrsa3]# ll pki/总用量 16-rw------- 1 root root 4616 4月9 02:06 openssl-easyrsa.cnfdrwx------ 2 root root42 4月9 02:57 privatedrwx------ 2 root root42 4月9 02:57 reqs-rw------- 1 root root 4820 4月9 02:06 safessl-easyrsa.cnf[root@node03 easyrsa3]# ll ./pki/private/总用量 0[root@node03 easyrsa3]# ll ./pki/reqs/总用量 0# 生成客户端证书[root@node03 easyrsa3]# ./easyrsa gen-req mr.luoNote: using Easy-RSA configuration from: /app/openvpn/client/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017Generating a 2048 bit RSA private key.............................................................................................................................................writing new private key to '/app/openvpn/client/easyrsa-server/easyrsa3/pki/easy-rsa-1774.CZzEA5/tmp.Dfg4Cw'Enter PEM pass phrase: #输入密码Verifying - Enter PEM pass phrase: #再次输入密码-----You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Common Name (eg: your user, host, or server name) [mr.luo]:Keypair and certificate request completed. Your files are:req: /app/openvpn/client/easyrsa-server/easyrsa3/pki/reqs/mr.luo.reqkey: /app/openvpn/client/easyrsa-server/easyrsa3/pki/private/mr.luo.key# 验证用户证书[root@node03 easyrsa3]# tree pki/pki/├── openssl-easyrsa.cnf├── private│ └── mr.luo.key├── reqs│ └── mr.luo.req└── safessl-easyrsa.cnf2 directories, 4 files

9、签发客户端证书

需要进入到openVPN server目录中签发客户端证书

[root@node03 easyrsa3]# cd /etc/openvpn/easyrsa-server/easyrsa3/# server端导入req文件[root@node03 easyrsa3]# ./easyrsa import-req /app/openvpn/client/easyrsa-server/easyrsa3/pki/reqs/mr.luo.req mr.luoNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017The request has been successfully imported with a short name of: mr.luoYou may now use this name to perform signing operations on this request.# server端签发客户端证书[root@node03 easyrsa3]# ./easyrsa sign client mr.luoNote: using Easy-RSA configuration from: /etc/openvpn/easyrsa-server/easyrsa3/varsUsing SSL: openssl OpenSSL 1.0.2k-fips26 Jan 2017You are about to sign the following certificate.Please check over the details shown below for accuracy. Note that this requesthas not been cryptographically verified. Please be sure it came from a trustedsource or that you have verified the request checksum with the sender.Request subject, to be signed as a client certificate for 825 days:subject=commonName= mr.luoType the word 'yes' to continue, or any other input to abort.Confirm request details: yesUsing configuration from /etc/openvpn/easyrsa-server/easyrsa3/pki/easy-rsa-1874.R5ptap/tmp.5mEQRTEnter pass phrase for /etc/openvpn/easyrsa-server/easyrsa3/pki/private/ca.key: #输入ca的密码Check that the request matches the signatureSignature okThe Subject's Distinguished Name is as followscommonName:ASN.1 12:'mr.luo'Certificate is to be certified until Jun3 14:50:52 2022 GMT (825 days)Write out database with 1 new entriesData Base UpdatedCertificate created at: /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/mr.luo.crt# 验证签发后的crt证书[root@node03 easyrsa3]# ll /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/mr.luo.crt -rw------- 1 root root 4432 4月9 02:08 /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/mr.luo.crt

10、复制证书到server目录

对签发的服务端证书进行归档保存

# 先创建相对应的目录[root@node03 easyrsa3]# mkdir /etc/openvpn/certs[root@node03 easyrsa3]# cd /etc/openvpn/certs/[root@node03 certs]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/dh.pem .[root@node03 certs]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/ca.crt .[root@node03 certs]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/server.crt .[root@node03 certs]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/private/server.key .# 验证证书目录下的文件[root@node03 certs]# tree .├── ca.crt├── dh.pem├── server.crt└── server.key0 directories, 4 files

11、客户端公钥和私钥

对签发好的客户端证书进行归档保存

# 创建客户端证书存放目录[root@node03 certs]# mkdir /app/openvpn/client/mr.luo[root@node03 certs]# cd !$cd /app/openvpn/client/mr.luo[root@node03 mr.luo]# ls[root@node03 mr.luo]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/ca.crt.[root@node03 mr.luo]# cp /etc/openvpn/easyrsa-server/easyrsa3/pki/issued/mr.luo.crt.[root@node03 mr.luo]# cp /app/openvpn/client/easyrsa-server/easyrsa3/pki/private/mr.luo.key.[root@node03 mr.luo]# tree .├── ca.crt├── mr.luo.crt└── mr.luo.key0 directories, 3 files

12、server端配置文件

# 先创建相对应的目录并授权相关用户权限root@node03 mr.luo]# mkdir /var/log/openvpn [root@node03 mr.luo]# chown -R openvpn.openvpn /var/log/openvpn/[root@node03 mr.luo]# chown -R openvpn.openvpn /etc/openvpn/# 编辑openVPN配置文件[root@node03 mr.luo]# vim /etc/openvpn/server.conf# 最终配置[root@node03 mr.luo]# grep "^[a-Z]" /etc/openvpn/server.conf local 192.168.154.13 port 1194proto tcpdev tunca /etc/openvpn/certs/ca.crtcert /etc/openvpn/certs/server.crtkey /etc/openvpn/certs/server.keydh /etc/openvpn/certs/dh.pemserver 10.8.0.0 255.255.255.0push "route 10.0.20.0 255.255.255.0"push "route 192.168.154.0 255.255.255.0"keepalive 10 120cipher AES-256-CBCmax-clients 200user openvpngroup openvpnpersist-keypersist-tunstatus openvpn-status.loglog-append/var/log/openvpn/openvpn.logverb 9mute 20

13、配置iptables规则

# 关闭自带的firewalld服务[root@node03 mr.luo]# systemctl stop firewalld[root@node03 mr.luo]# systemctl disable firewalld# 安装iptables服务如果不安装的话它的规则没法保存[root@node03 mr.luo]# yum install iptables-services iptables -y[root@node03 mr.luo]# systemctl enable iptables.service[root@node03 mr.luo]# systemctl start iptables.service# 清空iptables规则[root@node03 mr.luo]# iptables -F[root@node03 mr.luo]# iptables -X[root@node03 mr.luo]# iptables -Z[root@node03 mr.luo]# iptables -t nat -F[root@node03 mr.luo]# iptables -t nat -X[root@node03 mr.luo]# iptables -t nat -Z[root@node03 mr.luo]# iptables -t nat -A POSTROUTING -s 10.8.0.0/16 -j MASQUERADE[root@node03 mr.luo]# iptables -A INPUT -p TCP --dport 1194 -j ACCEPT[root@node03 mr.luo]# iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT[root@node03 mr.luo]# service iptables saveiptables: Saving firewall rules to /etc/sysconfig/iptables:[确定]# 验证防火墙规则[root@node03 mr.luo]# iptables -vnL Chain INPUT (policy ACCEPT 3891 packets, 436K bytes) pkts bytes targetprot opt inoutsourcedestination156K148M ACCEPTtcp--**0.0.0.0/00.0.0.0/0tcp dpt:1194 4408 4939K ACCEPTall--**0.0.0.0/00.0.0.0/0state RELATED,ESTABLISHEDChain FORWARD (policy ACCEPT 276K packets, 162M bytes) pkts bytes targetprot opt inoutsourcedestinationChain OUTPUT (policy ACCEPT 150K packets, 35M bytes) pkts bytes targetprot opt inoutsourcedestination [root@node03 mr.luo]# iptables -t nat -vnLChain PREROUTING (policy ACCEPT 12055 packets, 682K bytes) pkts bytes targetprot opt inoutsourcedestinationChain INPUT (policy ACCEPT 797 packets, 106K bytes) pkts bytes targetprot opt inoutsourcedestinationChain OUTPUT (policy ACCEPT 89 packets, 6583 bytes) pkts bytes targetprot opt inoutsourcedestinationChain POSTROUTING (policy ACCEPT 89 packets, 6583 bytes) pkts bytes targetprot opt inoutsourcedestination8562445K MASQUERADEall--**10.8.0.0/160.0.0.0/0# 开启路由转发功能[root@node03 mr.luo]# vim /etc/sysctl.conf net.ipv4.ip_forward = 1[root@node03 mr.luo]# sysctl -pnet.ipv4.ip_forward = 1# 启动openVPN服务,并设置开机自启动[root@node03 mr.luo]# systemctl start openvpn@server[root@node03 mr.luo]# systemctl enable openvpn@server

14、安装window客户端

安装好之后在安装目录中有个sample-config目录,在里头找到client.opvn模板复制一份到config目录下然后修改其配置文件

client #声明自己是个客户端dev tun #接口类型,必须和服务端保持一致proto tcp #使用的协议,必须和服务端保持一致remote 192.168.154.13 1194 #server端的ip和端口,可以写域名但是需要可以解析成IPresolv-retry infinite nobind persist-key #persist-tunca ca.crtcert mr.luo.crtkey mr.luo.keyremote-cert-tls server #指定采用服务器校验方式#tls-auth ta.key 1cipher AES-256-CBCverb 3

2、从服务器中下载客户端所用的证书文件到config目录中

3、随后启动客户端与服务器端进行连接通信

输入在服务器端设置好的密码即可

客户端登录界面

4、登录后显示的信息

登录成功

5、最后就可以实现与公司之间的内网信息互通啦

    推荐阅读
  • 空气含量中最多的气体(空气含量中最多的气体介绍)

    空气中含量最多的气体是氮气,氮气约占空气体积分数的百分比约为78%。通过实验测定,空气的成分按体积计算,氮气大约占78%、氧气占21%、稀有气体0.94%、二氧化碳0.03%、其他气体和杂质0.03%,也就是说空气中含量最多的物质是氮气。氮气化学性质很不活泼,在高温高压及催化剂条件下才能和氢气反应生成氨气;在放电的情况下才能和氧气化合生成一氧化氮;即使Ca、Mg、Sr和Ba等活泼金属也只有在加热的情形下才能与其反应。

  • 文思豆腐羹如何做好吃(文思豆腐羹用什么豆腐)

    文思豆腐是一道有名的淮扬菜,需要的就是精湛的刀工,这样做出的文思豆腐会有嫩滑的口感,打造入口即化的口感。文思豆腐羹如何做好吃文思豆腐羹材料和做法步骤一、文思豆腐羹材料准备好豆腐400克,鸡脯肉,火腿还有香菇,再有准备好生菜,冬笋,调料需要准备盐和味精。

  • 结构性存款可以买理财吗(结构性存款是存款吗)

    雪球产品就是今年年初监管向信托公司进行窗口指导,要求叫停的产品。简单的说,这是一种高风险的金融衍生品,它通过持有一定结构的金融衍生品,来实现在某一特定情况下获利。这样的投资结构就能保证我不论涨,还是跌,只要在一定幅度内都可以盈利。交易期权等金融衍生品,是非常高风险的投资。

  • 正言厉色意思(正言厉色的意思)

    下面内容希望能帮助到你,我们来一起看看吧!正言厉色意思正言厉色,汉语成语,拼音是zhènɡyánlìsè,意思是形容板着脸,神情非常严厉。出自《汉书·王莽传》。宝玉突然想出一个主意,一本正经地给她讲扬州黛山林子洞耗子精偷香芋的故事,黛玉见他正言厉色,以为真有其事,后来才发现原来是在取笑她。

  • 面谈调薪酬有什么技巧(跟老板谈调薪的技巧有哪些)

    如果你在老板心目中分量很大,一般老板都会给你加薪的。和老板谈加薪时目的一定要明确,让老板知道你只是为了加薪,而不是辞职走人。和老板谈加薪后,一定要给老板一个考虑的时间,不要咄咄逼人,逼着老板加薪。老板也要有足够的思考时间,来考虑你是否值得加薪,给你加薪后对公司有没有什么影响。不仅口头上要表示感谢,工作中要更加努力,让老板觉得给你加薪是值得的。

  • 杏花有没有香味(杏花闻起来会特别香吗)

    杏树是中国著名的观赏树木,可配植于庭前、墙隅、道路旁、水边,也可群植、片植于山坡、水畔,是春季主要的观赏树种。杏花直径2至3厘米,先于叶开放。花梗短,长1至3毫米,被短柔毛。花萼紫绿色,萼筒圆筒形,外面基部被短柔毛。萼片卵形至卵状长圆形,先端急尖或圆钝,花后反折。花瓣圆形至倒卵形,白色或带红色,具短爪。

  • 减肥减肚子的方法(怎么减肚子呢)

    减肥减肚子的方法食用健康食品:酸奶与发酵的牛奶能激活消化必须的物质,有助于改善肠道微生物系统,从而防止腹部隆起。走路、喝水、按摩:走路及喝水有利腹部扁平。

  • 新坑翡翠手镯多少钱(新坑翡翠手镯的价格)

    新坑翡翠手镯多少钱?新坑翡翠手镯多少钱翡翠手镯作为大件翡翠制品,用料特别多,只有大块、质量好的翡翠原石才能打造成手镯,因此翡翠手镯的价格都比较高,商家们拿到质量比较好的原石也尽可能打造成手镯。具体到新坑种翡翠,因为大多数新坑种翡翠透明度都不高,质地也不够细腻,因此种水一般都是以糯种或豆种为主,极少出现冰种或冰种以上的种水,这样的翡翠价格价格自然不会太高,一个品质比较好的糯种翡翠手镯大概在十万以内。

  • 宁波毛蚶做法水煮几分钟(毛蚶煮多长时间可以吃)

    宁波毛蚶做法水煮几分钟毛蚬是很多人喜欢吃的食物,不过建议大家在做之前都要先用开水煮以下。强精益气,提高精液质量,增强精子活力。适用于治疗肾阳虚所致的阳痿、腰痛、小便频数及补五脏之气不足。可治疗全身水肿,小便不利等。能软化和保护血管,有降低人体中血脂和胆固醇的作用。

  • 2022洛阳湿地公园最新名单 洛阳生态公园最新消息

    国家级湿地自然保护区河南黄河湿地国家级自然保护区,面积24000公顷。国家级湿地公园嵩县陆浑湖国家湿地公园,面积4222.39公顷伊川伊河国家湿地公园,面积1384.36公顷。