Aggregation a fews vpn channels


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Aggregation a fews vpn channels
# 1  
Old 10-03-2008
Aggregation a fews vpn channels

Hello,
How I can aggregate a fews vpn channels in single, on both sides ?
I.e. I have two(or more) vpn tunnels (tun0,tun1) with bandwith of each - 50 kb/s (limited by ISP). I want to have one channel 100 kb/s. I tried to use ifenslave tool, but failed.
System is Debian.
 
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. IP Networking

Link Aggregation

Hi ihave three link of internet and iwant to put one linux front of a firewall that this three linux speard firewall such az load balance and fialover but dont close any port and protocol and only firewall have been internet what way can i use for it ? are there any script and services do that... (0 Replies)
Discussion started by: mnnn
0 Replies

2. Solaris

Link aggregation

Me again :) I'm trying to find a page describing the L2, L3 und L4 modes of dladm. It's nice to read "hashed by ip header", but how should I use that? On the file-server it's ok to have the six interfaces serving six clients each on it's own. But an rsync connection via switch between two... (8 Replies)
Discussion started by: PatrickBaer
8 Replies

3. UNIX for Dummies Questions & Answers

UNIX command for checking active Fibre Channels

Can someone advise what the UNIX command for checking active Fibre Channels is? I have used lcdev and this gives me a nice list of cards available to our box. The particular Fibre Channel I'm interested in is fcs6. This is showing as Available...if that is the case does this also mean that it is... (1 Reply)
Discussion started by: DavoH
1 Replies
Login or Register to Ask a Question
SECVPN(1)						      General Commands Manual							 SECVPN(1)

NAME
secvpn - Control the Secure Virtual Private Network SYNOPSIS
secvpn [-v][-n][-s][-r] start|stop|routedel|routeadd|test|status [Host] DESCRIPTION
Secvpn builds a virtual private network (vpn) as defined in /etc/network/secvpn.conf. The vpn uses encryption based on ssh security. Before secvpn can be used you have to create some prerequisites. See PREREQUISITES below. The following subcommands may be used with secvpn: start is used to start the vpn. Secvpn will add new ppp interfaces necessary to make the vpn work, but will not automatically add routes (see the routeadd option below). If the recursive option is set, secvpn will log into the passive hosts and run "secvpn -r start" on them too. stop is used to stop the vpn. routeadd is used to setup new routing entries based on secvpn.conf. Secvpn will first add the route active->passive, then tell the passive host to add the route back. The route in the passive host will be added according to the configuration file there (in the passive host), so if the configuration files differ, things will not work. routedel will delete the routing entries built with routeadd. test checks whether the ppp interface is used to reach O_CRYPT_IP. status same as test, but checks all vpns if no host is named (instead of only active vpns as 'test' does). OPTIONS
-v verbose output -n do nothing -s be silent -r work recursive PREREQUISITES
Before secvpn can be used you have to enable passwordless ssh access for user "secvpn" from the initiator secvpn pc to the target secvpn pc. Use authorized_ keys or RhostsRSAAuthentication with the .shosts file. Have a look to the ssh - manpages for more information. Before secvpn can be used you have to give root rights for specific commands to the user "secvpn". This can be done with the followin com- mand: echo "secvpn ALL=NOPASSWD: /usr/sbin/secvpn, /usr/sbin/pppd" >>/etc/sudoers Before secvpn can be used you have to edit /etc/secvon.conf. See secvpn.conf(4). EXAMPLES
There are 3 examples in /usr/share/doc/secvpn/examples: Example1: secvpn acts as router connection 2 subnets Example2: secvpn having one lan-card and connect 2 subnets Example3: secvpn having one lan-card and connect 11 subnets in a tree structure OTHER
To have real security it is necessary to secure each secvpn host and to have firewalls on each secvpn host allowing only selected IP- Adresses and Ports to pass through the VPN. AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000-2005 COPYRIGHT
Copyright: Most recent version of the GPL. On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in "/usr/share/common-licenses/GPL". SEE ALSO
secvpn(1) secvpnmon(1) ssh(1) timeout(1) secvpn.conf(4) secvpn August 2000 SECVPN(1)