03-20-2020
Quote:
Originally Posted by
stomp
There are lots of software packages and some different protocols that are used to operate VPNs.
I see, so then are both WireGuard and OpenConnect doing the same thing? I am just wondering because based on what I read on the OpenConnect homepage it seems like they have tailored their service to work with certain vendors like Cisco, which is the provider we use. I managed to get OpenConnect VPN working but I would rather use WireGuard if I can simply based on the article's description of it. So, as long as they are doing the same thing, why wouldn't I use WireGuard? Is it possible that a VPN can be tailored to work with certain vendors like Cisco? If they can, then perhaps I should be using OpenConnect.
9 More Discussions You Might Find Interesting
1. Cybersecurity
Hiya All,
Problem after problem.
I can't fire up MySql on my FC-3 Server at work
I need to remote dial in past a VPN
I get the following message Below.
Is it something Obvious I need to do wrt to Config etc? I can't belive I cannot acces a STD DB past a VPN! other people in work do... (0 Replies)
Discussion started by: marty 600
0 Replies
2. UNIX for Dummies Questions & Answers
We have an older model DG Aviion Unix system and we're trying to switch to VPN but we can't talk to the Unix box... can't ping or telnet to it, but we can talk to all our other systems (PC/NT servers).
Is there a network/tcpip setting we're missing? Something we have to change/set, either on... (0 Replies)
Discussion started by: markb
0 Replies
3. UNIX for Dummies Questions & Answers
Hi,
My setup is as follows:
1) HeadOffice----->Private subnet: 192.168.0.0
2) Branch1-------->Private subnet: 192.168.200.0
I'm connecting from branch1 to headoffice thru VPN and I'm able to access all PC's except SCO UNIXWARE 7.1.1 box.
I have made a search before posting this... (7 Replies)
Discussion started by: tayyabq8
7 Replies
4. IP Networking
Hi,
I have two unix networks connected via VPN via IPsec. I am using snapgear vpn devices at each location. The two devices can ping one another, as well as the unix network behind the respected devices. The unix machines can ping their local vpn devices. However, I am having issues pinging... (1 Reply)
Discussion started by: l8kerboi23
1 Replies
5. Linux
Hello Friends
I want to know about VPN Solutions under Linux
Please help me :confused: (6 Replies)
Discussion started by: jaibw
6 Replies
6. UNIX for Advanced & Expert Users
Hi,
I want to work on a remote unix server, then on a windows XP station I have a Forticlient that makes a VPN to the network on which the server is situated. But then I do not know how to work with. In DOS box (cmd BOX) I issue:
telnet myserver
but It does not know IT.
Any idea ?
Many thanks. (2 Replies)
Discussion started by: big123456
2 Replies
7. Solaris
Hi,
I have been using using internet explorer on windows for connecting with production server using vpn connection.
i want to use same vpn to connect from solaris system to the production server.it is not connecting
is there solution (0 Replies)
Discussion started by: malikshahid85
0 Replies
8. Cybersecurity
Hello Gurus :
I had a question about VPN connection . Say for instance i have to connect from my point A to point B (Is the place where i initiate the VPN connection ) . From there i connect to point C (i.e Bank) .
My question is this a secure connection . (from point A to C)
Thanks... (3 Replies)
Discussion started by: tsbiju
3 Replies
9. Solaris
Hi.
Yesterday I installed Solaris 11.3 and I tried to setup a VPN but I didn't find how to make it.
I saw the "network manager" where I found the ethernet connection but I didn't find where to add a VPN connection.
When I used Debian Linux there was NetworkManagerVPN that with a GUI I... (0 Replies)
Discussion started by: Jena
0 Replies
LEARN ABOUT DEBIAN
rapolicy
RAPOLICY(1) General Commands Manual RAPOLICY(1)
NAME
rapolicy - compare a argus(8) data file/stream against a Cisco Access Control List.
COPYRIGHT
Copyright (c) 2000-2003 QoSient. All rights reserved.
SYNOPSIS
rapolicy -r argus-file [ra options]
DESCRIPTION
Rapolicy reads argus data from an argus-file list, and tests the argus data stream against a Cisco access control list configuration file,
printing out records that represent activity that would violate the policy. Rapolicy can be used to indicate access control violations, as
well as test new access control definitions prior to installing them in a router.
OPTIONS
Rapolicy, like all ra based clients, supports a large number of options. Options that have specific meaning to rapolicy are:
-f <Cisco ACL file> Print records that violate the policy.
-D 0 (default) Print records that violate the policy.
-D 1 Print records and the violated ruleset.
-D 2 Print all records and the ruleset that matched.
See ra(1) for a complete description of ra options.
EXAMPLE INVOCATION
rapolicy -r argus.file
CISCO ACL SYNTAX
There does not seem to be authoritative Cisco-ACL-Documentation, nor ACL syntax standardization. Because Cisco has been know to improve
its ACL rules syntax, rapolicy is known to work with Cisco ACL router defintions up to July, 2002.
A Cisco ACL configuration file consists of a collection of any number of ACL statements, each on a separte line. The syntax of an ACL
statement is:
ACL = "access-list" ID ACTION PROTOCOL SRC DST NOTIFICATION
ID = Number
ACTION = permit | deny
PROTO = protocol name | protocol number
SRC | DST = ADDRESS [PORTMATCH]
ADDRESS = any | host HOSTADDR | HOSTADDR HOSTMASK
HOSTADDR = ipV4 address
HOSTMASK = matching-mask
PORTMATCH = PORTOP PORTNUM | range PORTRANGE
PORTOP = eq | lt | gt | neq | established
PORTRANGE = PORTNUM PORTNUM
PORTNUM = TCP or UDP port value (unsigned decimal from 0 to 65535)
EXAMPLE CONFIGURATION
This example Cisco Access Control List configuration is provided as an example only. No effort has been made to verify that this example
Access Control List enforces a useful access control policy of any kind.
#allow www-traffic to webserver
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 80
#allow ftp control connection to server
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 21
#allow normal ftp
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 20
#allow ftp passive conncetions in portrange 10000 to 10500
access-list 102 permit tcp any host 193.174.13.99 range 10000 10500
#dummy example
access-list 102 permit tcp host 193.174.13.1 eq 12345 host 193.174.13.2 range 12345 23456
#deny the rest
access-list 102 deny tcp any any
#same thing in other words:
access-list 102 deny tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
AUTHORS
Carter Bullard (carter@qosient.com).
Olaf Gellert (gellert@pca.dfn.de).
SEE ALSO
ra(1), rarc(5), argus(8)
22 July 2002 RAPOLICY(1)