Configuration examples: Difference between revisions

From Libreswan
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:


Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted.
Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted.
* Libreswan IPsec on both sides of the tunnel


[[ host to host VPN ]]
[[ host to host VPN ]]
Line 11: Line 9:


[[ Using XAUTH with Google Authenticator ]]
[[ Using XAUTH with Google Authenticator ]]
* Libreswan IPsec server with third party clients
* Libreswan IPsec client with third party servers

Revision as of 02:29, 2 April 2014

Below are the most common type of IPsec configurations people use. While written for libreswan, the instructions will work for openswan as well unless specifically noted.

host to host VPN

subnet to subnet VPN

VPN server for roaming phones and laptops

Using XAUTH with Google Authenticator