Book Image

OpenVPN: Building and Integrating Virtual Private Networks

Book Image

OpenVPN: Building and Integrating Virtual Private Networks

Overview of this book

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption. This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, the book moves on to cover using OpenVPN, from installing it on various platforms, through configuring basic tunnels, to more advanced features, such as using the application with firewalls, routers, proxy servers, and OpenVPN scripting. While providing only necessary theoretical background, the book takes a practical approach, presenting plenty of examples.
Table of Contents (17 chapters)
OpenVPN
Credits
About the Author
About the Reviewers
Preface
Index

Linux and Firewalls


Now that OpenVPN is configured safely, how about the system that it runs on? On Linux there are several excellent firewall solutions that can be used with OpenVPN. On the following pages we will deal with two firewalls, which offer graphical interfaces for configuration—Shorewall (with Webmin) and the SuSEfirewall as delivered with OpenSuSE 10.

Debian Linux and Webmin with Shorewall

Webmin is an excellent GUI for Linux system management, if your preference is for web-based administration. Webmin can be found on www.webmin.com and offers almost full control over your Linux systems. It brings a small web server of its own and supports SSL encryption, user management, and more. However, I do not want to conceal the fact that there are Perl scripts that set system variables in files at /etc, which is not considered best practice. However, as always, security and usability are enemies and the compromises may vary. If we use Webmin, we must secure access to it. A good idea...