Configuration examples: Difference between revisions
Jump to navigation
Jump to search
Paul Wouters (talk | contribs) No edit summary |
Paul Wouters (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted. | Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted. | ||
= VPN server to VPN server configurations = | |||
[[ host to host VPN ]] | [[ host to host VPN ]] | ||
Line 9: | Line 11: | ||
[[ subnet to subnet VPN with PSK ]] | [[ subnet to subnet VPN with PSK ]] | ||
= VPN server for VPN client configurations = | |||
[[ VPN server for remote clients using IKEv2 ]] | [[ VPN server for remote clients using IKEv2 ]] | ||
[[ VPN server for remote clients using IKEv1 XAUTH ]] | [[ VPN server for remote clients using IKEv1 XAUTH with Certificates ]] | ||
[[ VPN server for remote clients using IKEv1 XAUTH with PSK ]] | |||
[[ libreswan as client to a Cisco (ASA or VPN3000) server ]] | [[ libreswan as client to a Cisco (ASA or VPN3000) server ]] |
Revision as of 18:36, 20 January 2016
Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted.
VPN server to VPN server configurations
VPN server for VPN client configurations
VPN server for remote clients using IKEv2
VPN server for remote clients using IKEv1 XAUTH with Certificates
VPN server for remote clients using IKEv1 XAUTH with PSK
libreswan as client to a Cisco (ASA or VPN3000) server
IKEv1 XAUTH with Google-Authenticator One Time Passwords (OTP)
IKEv1 XAUTH with FreeOTP and FreeIPA
Using libreswan in OpenStack as VPNaaS