VPN IPSEC on Red Hat 5

Posted on 2011-05-02
Last Modified: 2012-08-13
I'd like to connect to remote sites. It has to be transparent for users
Question by:Jey1980
    LVL 18

    Accepted Solution


    Here's a deployment guide for IPSec and VPN's in Red Hat:

    IPsec Installation:

    Regards, Tobias
    LVL 39

    Expert Comment

    In stead of racoon you can also look into the openswan ipsec tools.

    Author Closing Comment

    Generally fine, but does it work with other IPsecs
    LVL 39

    Expert Comment

    yes, IPSEC is a combination of protocols...

    ESP / AH = for exchange of encrypted messages (IPv4).
    IKE (UDP/500 & UDP/4500) for  dynamic key exchange. This generates a session key for the ESP exchange.

    Many implementations do exist and are required to at least implement a minimal set of compatible items.
    Also the standards define how to act on unknown en special options. So they should all work together.

    Freeswan was one of the first implementations that could negotiate with almost all other implementations. Openswan is a continuation of the Freeswan effort.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Suggested Solutions

    I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
    ​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now