Campagnol VPN 0.3 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News Campagnol VPN 0.3 (Default branch)
# 1  
Old 11-22-2008
Campagnol VPN 0.3 (Default branch)

Campagnol is a distributed IP-based VPN program able to open new connections through NATs or firewalls without any configuration. It uses UDP for the transport layer, and utilizes tunneling and encryption (with DTLS) and the UDP hole punching NAT traversal technique. The established connections are P2P. Image

Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Solaris

Vpn

Hi. Yesterday I installed Solaris 11.3 and I tried to setup a VPN but I didn't find how to make it. I saw the "network manager" where I found the ethernet connection but I didn't find where to add a VPN connection. When I used Debian Linux there was NetworkManagerVPN that with a GUI I... (0 Replies)
Discussion started by: Jena
0 Replies

2. UNIX for Advanced & Expert Users

VPN and then

Hi, I want to work on a remote unix server, then on a windows XP station I have a Forticlient that makes a VPN to the network on which the server is situated. But then I do not know how to work with. In DOS box (cmd BOX) I issue: telnet myserver but It does not know IT. Any idea ? Many thanks. (2 Replies)
Discussion started by: big123456
2 Replies

3. UNIX for Dummies Questions & Answers

help with vpn

We have an older model DG Aviion Unix system and we're trying to switch to VPN but we can't talk to the Unix box... can't ping or telnet to it, but we can talk to all our other systems (PC/NT servers). Is there a network/tcpip setting we're missing? Something we have to change/set, either on... (0 Replies)
Discussion started by: markb
0 Replies
Login or Register to Ask a Question
SECVPN(1)						      General Commands Manual							 SECVPN(1)

NAME
secvpn - Control the Secure Virtual Private Network SYNOPSIS
secvpn [-v][-n][-s][-r] start|stop|routedel|routeadd|test|status [Host] DESCRIPTION
Secvpn builds a virtual private network (vpn) as defined in /etc/network/secvpn.conf. The vpn uses encryption based on ssh security. Before secvpn can be used you have to create some prerequisites. See PREREQUISITES below. The following subcommands may be used with secvpn: start is used to start the vpn. Secvpn will add new ppp interfaces necessary to make the vpn work, but will not automatically add routes (see the routeadd option below). If the recursive option is set, secvpn will log into the passive hosts and run "secvpn -r start" on them too. stop is used to stop the vpn. routeadd is used to setup new routing entries based on secvpn.conf. Secvpn will first add the route active->passive, then tell the passive host to add the route back. The route in the passive host will be added according to the configuration file there (in the passive host), so if the configuration files differ, things will not work. routedel will delete the routing entries built with routeadd. test checks whether the ppp interface is used to reach O_CRYPT_IP. status same as test, but checks all vpns if no host is named (instead of only active vpns as 'test' does). OPTIONS
-v verbose output -n do nothing -s be silent -r work recursive PREREQUISITES
Before secvpn can be used you have to enable passwordless ssh access for user "secvpn" from the initiator secvpn pc to the target secvpn pc. Use authorized_ keys or RhostsRSAAuthentication with the .shosts file. Have a look to the ssh - manpages for more information. Before secvpn can be used you have to give root rights for specific commands to the user "secvpn". This can be done with the followin com- mand: echo "secvpn ALL=NOPASSWD: /usr/sbin/secvpn, /usr/sbin/pppd" >>/etc/sudoers Before secvpn can be used you have to edit /etc/secvon.conf. See secvpn.conf(4). EXAMPLES
There are 3 examples in /usr/share/doc/secvpn/examples: Example1: secvpn acts as router connection 2 subnets Example2: secvpn having one lan-card and connect 2 subnets Example3: secvpn having one lan-card and connect 11 subnets in a tree structure OTHER
To have real security it is necessary to secure each secvpn host and to have firewalls on each secvpn host allowing only selected IP- Adresses and Ports to pass through the VPN. AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000-2005 COPYRIGHT
Copyright: Most recent version of the GPL. On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in "/usr/share/common-licenses/GPL". SEE ALSO
secvpn(1) secvpnmon(1) ssh(1) timeout(1) secvpn.conf(4) secvpn August 2000 SECVPN(1)