View previous topic :: View next topic |
Author |
Message |
ojbyer n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 07 Sep 2005 Posts: 41
|
Posted: Tue Aug 15, 2006 2:26 am Post subject: host-to-host ipsec using OpenSwan? |
|
|
I'd like to setup ipsec with all the computers on my LAN to talk to each other. However, every guide I've found talks about network-to-network tunnels or host-to-network tunnels.
Is there any way to setup secure communication between all the hosts on my network without routing all traffic through one computer? |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
think4urs11 Bodhisattva
![Bodhisattva Bodhisattva](/images/ranks/rank-bodhisattva.gif)
![](images/avatars/8534934054bad29b51e5fa.jpg)
Joined: 25 Jun 2003 Posts: 6659 Location: above the cloud
|
Posted: Tue Aug 15, 2006 5:31 am Post subject: |
|
|
basic HowTos for Openswan and (as alternative) OpenVPN
HTH
T. _________________ Nothing is secure / Security is always a trade-off with usability / Do not assume anything / Trust no-one, nothing / Paranoia is your friend / Think for yourself |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
sundialsvc4 Guru
![Guru Guru](/images/ranks/rank_rect_3.gif)
Joined: 10 Nov 2005 Posts: 436
|
Posted: Sun Sep 24, 2006 9:44 pm Post subject: |
|
|
When you configure a VPN tunnel, what you are effectively doing is building a connection between two specific computers (say) on the Internet, which permits a range of "local" addresses on each side to become accessible to users on the "other" network, as though they were, indeed, local. The connection, once made, can be one-way ("I can see you, but you can't see me"), or two-way.
Once the connection is successfully made, the host OS (Linux or otherwise) on each machine "automagically" sends traffic that is destined for the mapped range of local addresses through the tunnel to the other side. The process is entirely transparent, and occurs entirely in the respective kernels.
Subsystems like the OpenSwan or Racoon "ISAKMP" daemons are actually used only for the negotiation process that establishes the connection, whereby the two sides exchange "proposals" to decide how the traffic must be encrypted, how to deal with NAT-traversal through a firewall, and so-forth.
If you're mapping a large local network in this way, the easiest way to do it is with a VPN-enabled router appliance. It works exactly like an ordinary router but it's capable of using VPN encryption for specified links. A Linux (or other) computer can, of course, serve as the gateway instead. The local network's routers need to be told to send the traffic to the Linux box, and the Linux box needs to be told how to forward it. |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|