03-05-2012
Hi Spynappels,
The services that need to be accessible is VPN.
The operating system I'd like to use, is Linux (Centos or Ubuntu).
9 More Discussions You Might Find Interesting
1. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
2. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
3. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
4. UNIX for Advanced & Expert Users
I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies
5. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
6. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies
7. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
8. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
9. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
LEARN ABOUT DEBIAN
l2tpipsecvpn
L2tpIPsecVpn(1) General Commands Manual L2tpIPsecVpn(1)
NAME
L2tpIPsecVpn - L2tp over IPsec VPN Manager applet for the GNOME Desktop
SYNOPSIS
L2tpIPsecVpn [options]
DESCRIPTION
This GUI is not a network manager plugin. However, it provides a systray icon in the indicator applet from which a non privileged user can
establish and bring down L2TP over IPsec VPN connections.
From there the user can add, remove and edit vpn connections.
Editing allows configuring various options for IPsec, L2TP and PPP.
Among others, the user can configure eg. the gateway, the use of either PSK or a certificate for authentication, various L2TP options as
redial- timeout and attempts and of course all important PPP options. It also allows you to configure PPP for tunnel splitting because you
can add routes as you want.
When applying your settings, all necessary configuration files are written accordingly (ipsec.conf, xl2tp.conf, options.xl2tpd, opensc.conf
up and down scripts ...).
It relies on Openswan and xl2tp packages as the underlying protocol handlers.
You can also use certificates on your local machine or, if e.g. OpenSC is installed and configured, even on a smart card to handle PPP
authentication.
The GUI automatically detects when network interfaces are going up or down and can (if so configured) automatically establish or close VPN
connections.
OPTIONS
startConnectionEditor
Starts the connection editor dialog.
applySettings
Write configuration files according to the connection settings, must be started with root privileges, ie use gksudo as non root
user.
deleteAllConfFiles
Delete all configuration files, must be started with root privileges, ie use gksudo as non root user.
AUTHORS
Werner Jaeger
version 1.0.9 11 Oct 2012 L2tpIPsecVpn(1)