Book Image

Openswan: Building and Integrating Virtual Private Networks

By : Ken Bantoft, Paul Wouters
Book Image

Openswan: Building and Integrating Virtual Private Networks

By: Ken Bantoft, Paul Wouters

Overview of this book

<p>With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage? Do you need to send information back to your office while on the road or on board a ship? Or do you just want to securely access your MP3's at home? IPsec is the industry standard for encrypted communication, and Openswan is the de-facto implementation of IPsec for Linux.</p> <p>Whether you are just connecting your home DSL connection with your laptop when you're on the road to access your files at home, or you are building an industry size, military strength VPN infrastructure for a medium to very large organization, this book will assist you in setting up Openswan to suit those needs.</p> <p>The topics discussed range from designing, to building, to configuring Openswan as the VPN gateway to deploy IPsec using Openswan. It not only for Linux clients, but also the more commonly used Operating Systems such as Microsoft Windows and MacOSX. Furthermore it discusses common interoperability examples for third party vendors, such as Cisco, Checkpoint, Netscreen and other common IPsec vendors.</p> <p>The authors bring you first hand information, as they are the official developers of the Openswan code. They have included the latest developments and upcoming issues. With experience in answering questions on a daily basis on the mailing lists since the creation of Openswan, the authors are by far the most experienced in a wide range of successful and not so successful uses of Openswan by people worldwide.</p>
Table of Contents (22 chapters)
Building and Integrating Virtual Private Networks with Openswan
Credits
About the Authors
Acknowledgements
About the Reviewers
Preface

RFCs Related to L2TP, Often Used in Combination with IPsec


RFC 2341

Cisco Layer Two Forwarding (Protocol) "L2F". (A predecessor to L2TP)

RFC 2637

Point-to-Point Tunneling Protocol (PPTP). (A predecessor to L2TP)

RFC 2661

Layer Two Tunneling Protocol "L2TP"

RFC 2809

Implementation of L2TP Compulsory Tunneling via RADIUS

RFC 2888

Secure Remote Access with L2TP

RFC 3070

Layer Two Tunneling Protocol (L2TP) over Frame Relay

RFC 3145

L2TP Disconnect Cause Information

RFC 3193

Securing L2TP using IPsec

RFC 3301

Layer Two Tunneling Protocol (L2TP): ATM access network

RFC 3308

Layer Two Tunneling Protocol (L2TP) Differentiated Services

RFC 3355

Layer Two Tunneling Protocol (L2TP) Over ATM Adaptation Layer 5 (AAL5)

RFC 3371

Layer Two Tunneling Protocol "L2TP" Management Information Base

RFC 3437

Layer Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation

RFC 3438

Layer Two Tunneling Protocol (L2TP) Internet Assigned Numbers: Internet Assigned Numbers Authority (IANA) Considerations Update

RFC 3573

Signaling of Modem-On-Hold status in Layer 2 Tunneling Protocol (L2TP)

RFC 3817

Layer 2 Tunneling Protocol (L2TP) Active Discovery Relay for PPP over Ethernet (PPPoE)