Sponsored Content
Operating Systems AIX Help Me - AIX server connect to a VPN network Post 302546098 by DGPickett on Wednesday 10th of August 2011 11:14:19 AM
Old 08-10-2011
Conceptually, VPN is a few layers down from telnet and ssh, telnet is a client app, because it connects to an already running server on tcp port 23 as I recall, tcp runs over IP. VPN is the creation of an IP device that routing rules can send packets down, and the local IP stack can accept packets from, similar to a NIC card for Ethernet, but the media is software. PacKets that go in are IPSEC encrypted and sent back to the IP stack to be routed out over other networks. VPN occupies the IPSEC protocol, a child of the IP protocol, a brother to TCP, UDP and ICMP. When IP packets arrive that are IPSEC protocol, they go into the VPN driver; it decrypts them and sends them back through the IP stack. So, you can run anything on VPN, but it is a much bigger deal than running scp.

Perhaps the boss needs some education, as you can achieve file transfer just fine with scp (ssh2 or at least ssh). I am on VPN right now, so I can do all protocols from home as if I was on the office LAN. (My bits are worn down by the time they arrive. :-) That is a lot of exposure if it is not a same company secure site. The encryption and compression of scp is about the same as VPN, but is it a trivial client install not a huge issue with routing and all. Routing? Yes, both hosts have to have network routes that get their packets into the VPN pipe end near them. The VPN pipe might be on the same host, like here on my laptop, or it may be on a firewall of DMZ host or intra-net border router (to get on a lan segment where there is routing to the other host).

Setting up the VPN used to be a proprietary process, even though the end product is standard. A VPN might be permanently set up by admins on routers, or it may be dynamically set us like on my laptop this AM, and probably my CISCO VPN setup client, achieves this differently than other brands, or even other CISCO VPNs at other companies. I suspect they use a ssh tcp server to authenticate and negotiate dynamic client VPN setup. There might be standards now, as I have not been in the firewall biz for quite a while.
This User Gave Thanks to DGPickett For This Post:
 

10 More Discussions You Might Find Interesting

1. Solaris

Solaris 10 - vpn server

I would like to setup my solaris 10 x86 system as a vpn server. I can't seem to find any good links on setting it up. Do you guys have some links that could walk me thru on setting up the vpn server so that windows clients can connect to it? (4 Replies)
Discussion started by: kungpow
4 Replies

2. AIX

Unable to connect to AIX server through xmanager

Hi, I have xmanager installed on my windows PC. But I am not able to connect to AIX server. It's giving the error as follows: The X11 forwarding request was rejected. Graphics mode is not coming up in AIX server. Please help as I have to install oracle patchset urgently. (1 Reply)
Discussion started by: dwiravi
1 Replies

3. Shell Programming and Scripting

vpn connect/disconnect shell script

Hi I am not so good in scripting..trying ot learn it...need guidance of the experts in shell scripting.. Let me explain the scenario first.. a server MX1 is connected to another server MX2 through vpn..every 5 minute a script runs to test vpn connectivity between the 2 servers.when the vpn... (12 Replies)
Discussion started by: renuka
12 Replies

4. Ubuntu

Ubuntu 10.04 - Unable to connect to Cisco VPN

Hi all, I am trying to configure and connect Cisco VPN on Ubuntu 10.04. I've imported .pcf file. The new vpn conn appears in the VPN Connections option. Now when I select it, it doesn't connect. Nothing happens. I am not able to connect to VPN at all. I tried using kvpnc as well but it... (10 Replies)
Discussion started by: morningSunshine
10 Replies

5. AIX

AIX Remote Connect Fail With “No more multiple IP addresses to connect” Error

We have a production server at a client site running AIX. And recently when users are trying to connect to it via telnet, it prompts "No more multiple IP addresses to connect". Can I know what does this error mean? and how to rectify this? Thanks. (2 Replies)
Discussion started by: a_sim
2 Replies

6. UNIX for Dummies Questions & Answers

VPN on an online server

Hi there, Believe it or not, the word VPN doesn't give any search result in the forum. I'm trying to get started with VPN. I'm currently in the process of setting up a server. I found a lot of howtos on the web. There's still one thing that I'm not sure of. My plan is to setup the VPN... (4 Replies)
Discussion started by: chebarbudo
4 Replies

7. AIX

Command to connect to remote AIX server

Hi All, Im looking for a command that can remotely connect to another AIX machine and execute scripts present in that server(Possible scenarios are a complete a restart of 3 servers in a cluster through a single script execution present in one of the servers). Im relatively new to AIX and... (5 Replies)
Discussion started by: Vishakh
5 Replies

8. AIX

Connect to a SQL server from AIX

Hello aix community, After scouring the internet to find a step by step process, I've exhausted my efforts. Although I have learned a lot which brings me to this forum. I'm totally new and hope to ask the right questions. What is the easiest way to connect to a SQL server from aix? ... (2 Replies)
Discussion started by: TechStudent36
2 Replies

9. AIX

Connect from AIX 5.x to windows Server 2000 Shared Folder

Hi, I followed this procedure in order to mount in AIX a shared folder in windows server 2000. https://www-304.ibm.com/support/docview.wss?uid=isg3T1012550 Ive tested the shared folder from other windows Server, and its fine. What Ive do in AIX is: Logon as root Under /Home/spss/ I... (2 Replies)
Discussion started by: trevian3969
2 Replies

10. Shell Programming and Scripting

Choosing VPN server based on server response times

Hello all, I am using the VPN provider Private Internet Access. I am using the Raspberry Pi 4 with 4GB of RAM, performance on this upgraded board is great. Anyways I am connecting to its service using systemd's openvpn-client @ US_New_York_City.service I wonder if I can create a... (5 Replies)
Discussion started by: haloslayer255
5 Replies
vpnd(5) 						      BSD File Formats Manual							   vpnd(5)

NAME
vpnd -- Mac OS X VPN Remote Access Server File DESCRIPTION
This manual page describes the configuration elements contained in the /Library/Preferences/SystemConfiguration/com.apple.RemoteAccessServers.plist file. Should this file not be present on the target OS X Sys- tem, a template file has been provided in this manual page. The user can manipulate the contents of this file using a PLIST file editor (provided with any Mac OS X system), or any text editor. In this case, the user is assumed to have some basic understanding of Property Lists, and how to manipulate them. The goal of this page is to provide documentation on this configuration file's database structure and data fields, to facilitate the configu- ration and deployment of L2TP or PPTP VPN Servers by invoking vpnd without specifying any specific server profile. /ActiveServers Lists the server identifiers that are currently available for use. These servers will be started in the abscense of vpnd -i <server_id> parameter. /Servers Defines the following dictionaries: DNS, IPv4, Interface, PPP, Radius, Server (common); IPSec, L2TP (for L2TP tunnels only) /Servers/<server_id> Indicates a user-defined named VPN profile configuration, identified with the <server_id> parameter defined in vpnd(8) There are 2 default server configurations available: com.apple.ppp.l2tp and com.apple.ppp.pptp /Server/<server_id>/DNS Contains two Arrays of Strings: OfferedSearchDomains - which lets the server specify what DNS domain(s) a VPN client should belong to OfferedServerAddresses - which specify the primary and (optional) secondary DNS servers a VPN client will use to resolve FQDN's. /Servers/<server_id>/IPv4 Contains 4 arrays of Strings, and one String: DestAddressRanges - which specifies the start and end IP addresses range. The Server will give an IP address to a connecting PPP-VPN client after the successful negotiation of IPCP from this range. OfferedRouteAddresses - which lists the network address(es) to each route the Server will serve to any connecting VPN client. OfferedRouteMasks - which lists the network mask(s) to each route the Server will serve to any connecting VPN client. OfferedRouteTypes - which lists the attribute flag(s) to each route the Server will serve to any connecting VPN client. Valid types include: Public - VPN Client will forward traffic destined to VPN subnet to its Public interface. Private - VPN Client will forward traffic destined to VPN subnet to its Private interface. Default value is Public. ConfigMethod - The method through which a VPN IP interface will configure its IP address; default value is "Manual". /Servers/<server_id>/Interface - Specifies the VPN interface's base type: PPP or IPSec and, its subtype: L2TP or PPTP /Server/<server_id>/PPP - Defines Parameters necessary for PPP protocol negotiations for successful VPN functionality. AuthenticatorACLPlugins - Access Control List that determines if a given user accounts has sign-on priviledges to the VPN server. AuthenticatorPlugins - An optional plug-in used to authenticate local users with an account on the target server. Used in conjunction with OpenDirectory/DirectoryServices facilities. AuthenticatorEAPPlugins - User authentication using EAP protocol, with Digital Certificates. L2TP VPN uses Kerberos "EAP-KRB" certificates or RSA "EAP-RSA" SecurID tokens; PPTP VPN uses RSA SecurID tokens only. AuthenticatorProtocol - Protocol(s) in use for carrying out PPP authentication. Valid values are "MSCHAP", "MSCHAPv2", "PAP", "EAP" ACSPEnabled - Enable/Disable ACSP protocol, which passes DHCP-like messages from VPN client to server; used mostly to convey static routes from server to client and DNS domains. DisconnectOnIdle - Enable/Disable flag for PPP Connection Idling. If Enabled, PPP connection will terminate after not seeing any application data going through the VPN interface. DisconnectOnIdleTimer - Time to wait (in seconds) before PPP connection goes down without any data passing through the VPN interface. IPCPCompressionVJ - Enable/Disable IPCP Van-Jacobson Compression Algorithm. Recommended setting is Disable(0). LCPEchoEnabled - Enable/Disable Link Control Protocol (LCP) Echoing feature. LCPEchoFailure - Number of LCP Echo Requests sent without any response from the PPP peer before declaring PPP link failure (and subsequent teardown) LCPEchoInterval - Time interval in seconds elapsed between consecutive LCP Echo Requests sent to the PPP peer. LogFile - VPN log file for PPP VerboseLogging - Enables/Disables extra logging within PPP CCPEnabled (PPTP only) - Enables/Disables CCP negotiation for PPP; default value is true(1) CCPProtocols (PPTP only) - List of protocols supported by CCP layer; default value is "MPPE" MPPEKeySize128 (PPTP only) - Enables/Disables MPPE 128-bit encryption algorithm; default value is true(1) MPPEKeySize40 (PPTP only) - Enables/Disables MPPE 40-bit encryption algorithm; default value is false(0) Note: The previous 2 settings are not necessarily mutually-exclusive! The 2 PPP peers will attempt to negotiate to the strongest encryption policy, whenever possible. /Servers/<server_id>/Radius - Contains an Array with 2 Dictionaries. The entries are Radius servers that a VPN server must authenticate a client user against before completing the PPP negotiation. Each entry indicates the server's IP address, and the shared secret key used for the RADIUS AAA exchange between said server and the VPN server. The first Array entry indicates primary server, the other is secondary server. /Servers/<server_id>/Server - Contains VPN server parameters LogFile - VPN log file for PPP VerboseLogging - Enables/Disables extra logging within PPP MaximumSessions - maximum number of simultaneous VPN tunnel sessions active on the VPN server. This setting is now deprecated; the VPN sub- net determines the maximum number of sessions. LoadBalancingEnabled (L2TP only) - Enable/Disable load balancing feature for L2TP VPN. This feature allows a collection of L2TP VPN servers on a common LAN segment to share a common "virtual" address. A L2TP client can specify this virtual address to connect to the server. The server within the collection that "owns" the virtual address will then redirect the initial L2TP request message to the "least busy" server within the collection (which can include the redirecting VPN server!) LoadBalancingAddress (L2TP only) - L2TP load-balancing virtual IP address /Servers/<server_id>/IPSec - L2TP only; L2TP VPN tunnels are secured using IPSec transport mode, with IKEv1 negotiation. The following parameters configure the ISAKMP Security Association required to run this type of IPSec Security Association. AuthenticationMethod - the method for IKE authentication; default value is "SharedSecret" IdentifierVerification - Used during IKE negotiation; default value set to "NONE" LoadCertificate - X.509/PKI Certificate binary data LocalIdentifier - String identifying the local IPsec entity; not used for L2TP VPN. RemoteIdentifier - String identifying the remote IPsec entity; not used for L2TP VPN. SharedSecret - Shared secret String known between the negotiating L2TP peers. SharedSecretEncryption - Indicates where L2TP secret key information is stored. If set to "Keychain", the SharedSecret key value points to the shared secret key stored in the Keychain. If absent, SharedSecret value is to taken explicitly /Servers/<server_id>/L2TP/Transport - Defines the underlying transport protocol for L2TP; default value is IPSec TEMPLATE CONFIGURATION FILE
To properly extract this file, run the following command: man 5 vpnd | col -b > com.apple.RemoteAccessServers.plist and cut out the non-XML text from the file then copy the file to the proper directory. ---- CUT HERE ---- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>ActiveServers</key> <array> <string>com.apple.ppp.l2tp</string> <string>com.apple.ppp.pptp</string> </array> <key>Servers</key> <dict> <key>com.apple.ppp.l2tp</key> <dict> <key>DNS</key> <dict> <key>OfferedSearchDomains</key> <array> <string>Replace with DNS search domain(s) - remove if not needed</string> </array> <key>OfferedServerAddresses</key> <array> <string>Replace with IPv4 DNS server address(es) - remove if not needed</string> </array> </dict> <key>IPSec</key> <dict> <key>AuthenticationMethod</key> <string>SharedSecret</string> <key>IdentifierVerification</key> <string>None</string> <key>LocalCertificate</key> <data></data> <key>LocalIdentifier</key> <string></string> <key>RemoteIdentifier</key> <string></string> <key>SharedSecret</key> <string>com.apple.ppp.l2tp</string> <key>SharedSecretEncryption</key> <string>Keychain</string> </dict> <key>IPv4</key> <dict> <key>ConfigMethod</key> <string>Manual</string> <key>DestAddressRanges</key> <array> <string>Replace with Starting VPN address - IPv4 address</string> <string>Replace with End VPN address - IPv4 address</string> </array> <key>OfferedRouteAddresses</key> <array> <string>Replace with Offered Routes addresses - remove if not needed</string> </array> <key>OfferedRouteMasks</key> <array> <string>Replace with Offered Route Masks - remove if not needed</string> </array> <key>OfferedRouteTypes</key> <array> <string>Replace with Offered Route Type(s) - remove if not needed</string> </array> </dict> <key>Interface</key> <dict> <key>SubType</key> <string>L2TP</string> <key>Type</key> <string>PPP</string> </dict> <key>L2TP</key> <dict> <key>Transport</key> <string>IPSec</string> </dict> <key>PPP</key> <dict> <key>ACSPEnabled</key> <integer>1</integer> <key>AuthenticatorACLPlugins</key> <array> <string>DSACL</string> </array> <key>AuthenticatorEAPPlugins</key> <array> <string>EAP-KRB</string> </array> <key>AuthenticatorPlugins</key> <array> <string>DSAuth</string> </array> <key>AuthenticatorProtocol</key> <array> <string>MSCHAP2</string> </array> <key>DisconnectOnIdle</key> <integer>1</integer> <key>DisconnectOnIdleTimer</key> <integer>7200</integer> <key>IPCPCompressionVJ</key> <integer>0</integer> <key>LCPEchoEnabled</key> <integer>1</integer> <key>LCPEchoFailure</key> <integer>5</integer> <key>LCPEchoInterval</key> <integer>60</integer> <key>Logfile</key> <string>/var/log/ppp/vpnd.log</string> <key>VerboseLogging</key> <integer>1</integer> </dict> <key>Radius</key> <dict> <key>Servers</key> <array> <dict> <key>Address</key> <string>Replace with Primary Server IPv4 Address</string> <key>SharedSecret</key> <string>Replace with Server Shared Secret string</string> </dict> <dict> <key>Address</key> <string>Replace with Secondary Server IPv4 Address</string> <key>SharedSecret</key> <string>Replace with Secondary Server Shared Secret string</string> </dict> </array> </dict> <key>Server</key> <dict> <key>LoadBalancingAddress</key> <string>Replace with IPv4 address</string> <key>LoadBalancingEnabled</key> <integer>0</integer> <key>Logfile</key> <string>/var/log/ppp/vpnd.log</string> <key>MaximumSessions</key> <integer>128</integer> <key>VerboseLogging</key> <integer>1</integer> </dict> </dict> <key>com.apple.ppp.pptp</key> <dict> <key>DNS</key> <dict> <key>OfferedSearchDomains</key> <array> <string>Replace with DNS search domain(s) - remove if not needed</string> </array> <key>OfferedServerAddresses</key> <array> <string>Replace with IPv4 DNS server address(es) - remove if not needed</string> </array> </dict> <key>IPv4</key> <dict> <key>ConfigMethod</key> <string>Manual</string> <key>DestAddressRanges</key> <array> <string>Replace with Starting VPN address - IPv4 address</string> <string>Replace with End VPN address - IPv4 address</string> </array> <key>OfferedRouteAddresses</key> <array> <string>Replace with Offered Routes addresses - remove if not needed</string> </array> <key>OfferedRouteMasks</key> <array> <string>Replace with Offered Route Masks - remove if not needed</string> </array> <key>OfferedRouteTypes</key> <array> <string>Replace with Offered Route Types - remove if not needed</string> </array> </dict> <key>Interface</key> <dict> <key>SubType</key> <string>PPTP</string> <key>Type</key> <string>PPP</string> </dict> <key>PPP</key> <dict> <key>ACSPEnabled</key> <integer>1</integer> <key>AuthenticatorACLPlugins</key> <array> <string>DSACL</string> </array> <key>AuthenticatorEAPPlugins</key> <array> <string>EAP-RSA</string> </array> <key>AuthenticatorPlugins</key> <array> <string>DSAuth</string> </array> <key>AuthenticatorProtocol</key> <array> <string>MSCHAP2</string> </array> <key>CCPEnabled</key> <integer>1</integer> <key>CCPProtocols</key> <array> <string>MPPE</string> </array> <key>DisconnectOnIdle</key> <integer>1</integer> <key>DisconnectOnIdleTimer</key> <integer>7200</integer> <key>IPCPCompressionVJ</key> <integer>0</integer> <key>LCPEchoEnabled</key> <integer>1</integer> <key>LCPEchoFailure</key> <integer>5</integer> <key>LCPEchoInterval</key> <integer>60</integer> <key>Logfile</key> <string>/var/log/ppp/vpnd.log</string> <key>MPPEKeySize128</key> <integer>1</integer> <key>MPPEKeySize40</key> <integer>0</integer> <key>VerboseLogging</key> <integer>1</integer> </dict> <key>Radius</key> <dict> <key>Servers</key> <array> <dict> <key>Address</key> <string>Replace with Primary Server IPv4 Address</string> <key>SharedSecret</key> <string>Replace with Primary Server Shared Secret string</string> </dict> <dict> <key>Address</key> <string>Replace with Secondary Server IPv4 Address</string> <key>SharedSecret</key> <string>Replace with Secondary Server Shared Secret string</string> </dict> </array> </dict> <key>Server</key> <dict> <key>Logfile</key> <string>/var/log/ppp/vpnd.log</string> <key>MaximumSessions</key> <integer>128</integer> <key>VerboseLogging</key> <integer>1</integer> </dict> </dict> </dict> </dict> </plist> ---- CUT HERE ---- SEE ALSO
vpnd(8) Mac OS X 17 August 2009 Mac OS X
All times are GMT -4. The time now is 05:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy