Sponsored Content
Full Discussion: Help me understand VPN
Top Forums UNIX for Beginners Questions & Answers Help me understand VPN Post 303045407 by zxmaus on Thursday 19th of March 2020 09:16:35 PM
Old 03-19-2020
in short, vpn clients all do more or less the same - just not in the same speed. They allow you to securely / encrypted connect to a destination - in your case your company, so that your network traffic cannot be read on the way from your client to your destination by a third party.
This User Gave Thanks to zxmaus For This Post:
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Trying to use MySql through a VPN

Hiya All, Problem after problem. I can't fire up MySql on my FC-3 Server at work I need to remote dial in past a VPN I get the following message Below. Is it something Obvious I need to do wrt to Config etc? I can't belive I cannot acces a STD DB past a VPN! other people in work do... (0 Replies)
Discussion started by: marty 600
0 Replies

2. UNIX for Dummies Questions & Answers

help with vpn

We have an older model DG Aviion Unix system and we're trying to switch to VPN but we can't talk to the Unix box... can't ping or telnet to it, but we can talk to all our other systems (PC/NT servers). Is there a network/tcpip setting we're missing? Something we have to change/set, either on... (0 Replies)
Discussion started by: markb
0 Replies

3. UNIX for Dummies Questions & Answers

One VPN question

Hi, My setup is as follows: 1) HeadOffice----->Private subnet: 192.168.0.0 2) Branch1-------->Private subnet: 192.168.200.0 I'm connecting from branch1 to headoffice thru VPN and I'm able to access all PC's except SCO UNIXWARE 7.1.1 box. I have made a search before posting this... (7 Replies)
Discussion started by: tayyabq8
7 Replies

4. IP Networking

Vpn

Hi, I have two unix networks connected via VPN via IPsec. I am using snapgear vpn devices at each location. The two devices can ping one another, as well as the unix network behind the respected devices. The unix machines can ping their local vpn devices. However, I am having issues pinging... (1 Reply)
Discussion started by: l8kerboi23
1 Replies

5. Linux

VPN Solutions

Hello Friends I want to know about VPN Solutions under Linux Please help me :confused: (6 Replies)
Discussion started by: jaibw
6 Replies

6. UNIX for Advanced & Expert Users

VPN and then

Hi, I want to work on a remote unix server, then on a windows XP station I have a Forticlient that makes a VPN to the network on which the server is situated. But then I do not know how to work with. In DOS box (cmd BOX) I issue: telnet myserver but It does not know IT. Any idea ? Many thanks. (2 Replies)
Discussion started by: big123456
2 Replies

7. Solaris

vpn not connecting

Hi, I have been using using internet explorer on windows for connecting with production server using vpn connection. i want to use same vpn to connect from solaris system to the production server.it is not connecting is there solution (0 Replies)
Discussion started by: malikshahid85
0 Replies

8. Cybersecurity

VPN Security

Hello Gurus : I had a question about VPN connection . Say for instance i have to connect from my point A to point B (Is the place where i initiate the VPN connection ) . From there i connect to point C (i.e Bank) . My question is this a secure connection . (from point A to C) Thanks... (3 Replies)
Discussion started by: tsbiju
3 Replies

9. Solaris

Vpn

Hi. Yesterday I installed Solaris 11.3 and I tried to setup a VPN but I didn't find how to make it. I saw the "network manager" where I found the ethernet connection but I didn't find where to add a VPN connection. When I used Debian Linux there was NetworkManagerVPN that with a GUI I... (0 Replies)
Discussion started by: Jena
0 Replies
ppp.Keys(4)						     Kernel Interfaces Manual						       ppp.Keys(4)

NAME
ppp.Keys - PPP encryption keys file format RESTRICTIONS
Encryption is not available in software exported from the USA. The HP command does not support the option; customers may contact to obtain encryption functionality. DESCRIPTION
The keys file named in the option on the command line contains key values used by HP PPP's implementation of link-level encryption. Before transmission, packets with source and destination addresses matching the endpoints on a keys file line are encrypted using DES with the key specified on that keys file line. Upon reception, packets with source and destination addresses matching those on a keys file line are decrypted using DES with the key specified on that keys file line. Format Each key specification is on its own single line of up to 1023 characters. Comments in the keys file begin with a "#" and extend to the end of the line; blank lines, or lines beginning with a "#", are ignored. Fields are separated by horizontal white space (blanks or tabs). The first two words on a key line are compared with the source and destination addresses of each packet to be transmitted and each received packet. The endpoint address specifications may contain either host or network names, or host or network addresses. If a network is spec- ified, either by name or by address, then the corresponding network mask must also be specified if it is of a different size than the default for that class of network. The mask is separated from the network name or address by a slash and may be specified either as a series of decimal numbers separated by periods, or as a single 32-bit hexadecimal number, optionally with a C-style prefix. The remainder of the key line is a 56 bit (14 digit) hexadecimal number (without the C-style prefix), used as the DES key between the spec- ified pair of hosts or networks. The digits may be separated by horizontal white space for readability. If the key contains fewer or more than 14 hexadecimal digits, the line is ignored. If the key is weak or semi-weak, a warning message will be printed in the log file and the specified key will be used for encryption anyway. EXAMPLES
The following keys file provides with keys for use when encrypting or decrypting traffic between the indicated pairs of hosts or networks: # # Keys - PPP encryption keys file # # Format: #endpoint endpoint key frobozz.foo.com glitznorf.baz.edu feed face f00d aa 147.225.0.0 38.145.211.0/0xffffffc0 b1ff a c001 d00d 1 128.49.16.0/0xffffff00 198.137.240.100 0123456789abcd 193.124.250.136 143.231.1.0/0xffffff00 e1c3870e1c3870 RECOMMENDATIONS
Avoid using weak or semi-weak keys. These are weak DES keys: 00000000000000 FFFFFFFFFFFFFF 1E3C78F1E3C78F E1C3870E1C3870 These are semi-weak DES keys: 01FC07F01FC07F FE03F80FE03F80 1FC07F00FE03F8 E03F80FF01FC07 01C007001E0078 E003800F003C00 1FFC7FF0FFC3FF FE3FF8FFE1FF87 003C00F001C007 1E007800E00380 E1FF87FF1FFC7F FFC3FF0FFE3FF8 SECURITY CONCERNS
The keys file should be mode 600 or 400, and owned by root. Packets' IP headers are not encrypted, though their TCP, UDP, or ICMP headers are encrypted along with the user data portion. This allows encrypted packets to traverse normal internetworks, but permits snoopers to analyze traffic by its endpoints. Since the TCP, UDP, or ICMP header is encrypted, protocol-based filters along the packet's path will be unable to discern whether it is SMTP, Telnet, or any other network service. This means that encrypted traffic will only permeate packet-filtering firewalls if the fire- wall allows all traffic between the endpoints, regardless of traffic type. HP PPP/SLIP software for HP-UX systems, when deployed as the endpoint gateways of the encrypted traffic, decrypt incoming encrypted traffic before applying their configured packet filtering rules. AUTHOR
was developed by the Progressive Systems. SEE ALSO
pppd(1), ppp.Auth(4), ppp.Devices(4), ppp.Dialers(4), ppp.Filter(4), ppp.Systems(4). RFC 792, RFC 1548, RFC 1332, RFC 1334. ppp.Keys(4)
All times are GMT -4. The time now is 06:36 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy