When you are trying to make two completely different systems work together, it is easy to immediately get lost in technicalities. People forget that there is usually a lot more going on when trying to make two completely different devices communicate correctly to each other. It is very likely that interop involves not only two different devices, but also two different IT departments. After all, people tend to stick to what they know works, and if it was all up to you, you would be working with two of the same devices to hook up together without a hitch. Keep in mind that you not only need to contend with technical issues, but also social issues. For instance, the other department might work different hours to you, or they might be a lot more or less formal than you. Remember to make an effort to interop with these human aspects as well.
Openswan: Building and Integrating Virtual Private Networks
By :
Openswan: Building and Integrating Virtual Private Networks
By:
Overview of this book
<p>With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage? Do you need to send information back to your office while on the road or on board a ship? Or do you just want to securely access your MP3's at home? IPsec is the industry standard for encrypted communication, and Openswan is the de-facto implementation of IPsec for Linux.</p>
<p>Whether you are just connecting your home DSL connection with your laptop when you're on the road to access your files at home, or you are building an industry size, military strength VPN infrastructure for a medium to very large organization, this book will assist you in setting up Openswan to suit those needs.</p>
<p>The topics discussed range from designing, to building, to configuring Openswan as the VPN gateway to deploy IPsec using Openswan. It not only for Linux clients, but also the more commonly used Operating Systems such as Microsoft Windows and MacOSX. Furthermore it discusses common interoperability examples for third party vendors, such as Cisco, Checkpoint, Netscreen and other common IPsec vendors.</p>
<p>The authors bring you first hand information, as they are the official developers of the Openswan code. They have included the latest developments and upcoming issues. With experience in answering questions on a daily basis on the mailing lists since the creation of Openswan, the authors are by far the most experienced in a wide range of successful and not so successful uses of Openswan by people worldwide.</p>
Table of Contents (22 chapters)
Building and Integrating Virtual Private Networks with Openswan
Credits
About the Authors
Acknowledgements
About the Reviewers
Preface
Free Chapter
Introduction
Practical Overview of the IPsec Protocol
Building and Installing Openswan
Configuring IPsec
X.509 Certificates
Opportunistic Encryption
Dealing with Firewalls
Interoperating with Microsoft Windows and Apple Mac OS X
Interoperating with Other Vendors
Encrypting the Local Network
Enterprise Implementation
Debugging and Troubleshooting
Unresolved and Upcoming Issues
Networking 101
Openswan Resources on the Internet
IPsec-Related Requests For Comments (RFCs)
Customer Reviews