01-19-2007
hello,
first : define the traffic that will goto your VPN box --> this data goes to this network handle by vpn ip addr.
second : establish a working vpn routers/route/networks.
good luck,
cheers..
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
How can i set an permanent route so that itīs still here after a reboot ?
i have a gateways file
Thanks
:confused: :confused: :confused: (1 Reply)
Discussion started by: redcrosskbg
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I'm trying to connect to a network device, with the connection follwoing the UNIX routing table we set up. Its to go via a specific network Gateway and out throught a specific Lan card (Lan4). However when trying to conenct it keeps going through Lan3 and will not get to its destination.... (3 Replies)
Discussion started by: nhatch
3 Replies
3. IP Networking
Is ther a way to retain say, a default gateway entered in a routing table after a reboot? I end up always having to re-enter my default gateway after I reboot my system.
Thanks! (4 Replies)
Discussion started by: thundrrod
4 Replies
4. IP Networking
hi all,
how to access ip routing table throgh program,
how should i integrate my rip routing table with the ip routing table :) (0 Replies)
Discussion started by: vinodkumar
0 Replies
5. AIX
i have AIX Unix with "dynamic routing table" service enabled, but i do not need this service. How i can disable this service.
thanks (1 Reply)
Discussion started by: jdsnbr
1 Replies
6. IP Networking
hi all...
i need to know, where is locate the routing table on sun solaris, how i can saved the configuration....
because when i restart the server, lost the configuration....
thank you...
Regards... (3 Replies)
Discussion started by: chanfle
3 Replies
7. Linux
Hello,
how to make entries in routing table perminent (1 Reply)
Discussion started by: teenasuresh
1 Replies
8. Red Hat
I have below routing table in linux kernel 2.6.9
# netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.155.24.0 0.0.0.0 255.255.252.0 U 0 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U ... (5 Replies)
Discussion started by: chuikingman
5 Replies
9. IP Networking
Hello.
Is there any way to restore back the default ip routing table ?
For example, my current routing table is something like
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
109.123.95.0 0.0.0.0 255.255.255.0 U 0 ... (0 Replies)
Discussion started by: anid
0 Replies
10. HP-UX
Hi all,
Could someone please explain to me how I should read this routing table,
# netstat -rn
Routing tables
Destination Gateway Flags Refs Interface Pmtu
127.0.0.1 127.0.0.1 UH 0 lo0 32808
10.222.47.82 10.222.47.82 UH... (3 Replies)
Discussion started by: rachael
3 Replies
LEARN ABOUT DEBIAN
secvpn
SECVPN(1) General Commands Manual SECVPN(1)
NAME
secvpn - Control the Secure Virtual Private Network
SYNOPSIS
secvpn [-v][-n][-s][-r] start|stop|routedel|routeadd|test|status [Host]
DESCRIPTION
Secvpn builds a virtual private network (vpn) as defined in /etc/network/secvpn.conf. The vpn uses encryption based on ssh security.
Before secvpn can be used you have to create some prerequisites. See PREREQUISITES below.
The following subcommands may be used with secvpn:
start is used to start the vpn. Secvpn will add new ppp interfaces necessary to make the vpn work, but will not automatically add routes
(see the routeadd option below). If the recursive option is set, secvpn will log into the passive hosts and run "secvpn -r start" on
them too.
stop is used to stop the vpn.
routeadd
is used to setup new routing entries based on secvpn.conf. Secvpn will first add the route active->passive, then tell the passive
host to add the route back. The route in the passive host will be added according to the configuration file there (in the passive
host), so if the configuration files differ, things will not work.
routedel
will delete the routing entries built with routeadd.
test checks whether the ppp interface is used to reach O_CRYPT_IP.
status same as test, but checks all vpns if no host is named (instead of only active vpns as 'test' does).
OPTIONS
-v verbose output
-n do nothing
-s be silent
-r work recursive
PREREQUISITES
Before secvpn can be used you have to enable passwordless ssh access for user "secvpn" from the initiator secvpn pc to the target secvpn
pc. Use authorized_ keys or RhostsRSAAuthentication with the .shosts file. Have a look to the ssh - manpages for more information.
Before secvpn can be used you have to give root rights for specific commands to the user "secvpn". This can be done with the followin com-
mand:
echo "secvpn ALL=NOPASSWD: /usr/sbin/secvpn, /usr/sbin/pppd" >>/etc/sudoers
Before secvpn can be used you have to edit /etc/secvon.conf. See secvpn.conf(4).
EXAMPLES
There are 3 examples in /usr/share/doc/secvpn/examples:
Example1: secvpn acts as router connection 2 subnets
Example2: secvpn having one lan-card and connect 2 subnets
Example3: secvpn having one lan-card and connect 11 subnets in a tree structure
OTHER
To have real security it is necessary to secure each secvpn host and to have firewalls on each secvpn host allowing only selected IP-
Adresses and Ports to pass through the VPN.
AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000-2005
COPYRIGHT
Copyright: Most recent version of the GPL.
On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in "/usr/share/common-licenses/GPL".
SEE ALSO
secvpn(1) secvpnmon(1) ssh(1) timeout(1) secvpn.conf(4)
secvpn August 2000 SECVPN(1)