Configuration examples: Difference between revisions
Jump to navigation
Jump to search
Paul Wouters (talk | contribs) No edit summary |
Paul Wouters (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted. | Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted. | ||
[[ host to host VPN ]] | [[ host to host VPN ]] | ||
Line 11: | Line 9: | ||
[[ Using XAUTH with Google Authenticator ]] | [[ Using XAUTH with Google Authenticator ]] | ||
Revision as of 01:29, 2 April 2014
Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted.