-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-06:06.kmem Security Advisory
The FreeBSD Project
Topic:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-06:07.pf Security Advisory
The FreeBSD Project
Topic:
On 1/24/2006 3:59 PM gahn wrote:
Hi:
We intend to build IPSec based VPN server on FreeBSD
platform so that we can access internal network of a
lab. The remote side will use VPN client and could be
from anywhere of the Internet, or may be from the
another site of the company. From the hnadbook,
On Tue, Jan 24, 2006 at 06:19:15PM -0800, gahn wrote:
[]
As to the roaming users, very unlikely there will be
dial-up line, but those users could be on road and
using ISPs to connect the internal lab. both sites are
labs.
I will try the roaming clients---freebsd vpn server
first.
Wednesday, January 25, 2006, 3:21:08 PM, you wrote:
On Tue, Jan 24, 2006 at 06:19:15PM -0800, gahn wrote:
[]
As to the roaming users, very unlikely there will be
dial-up line, but those users could be on road and
using ISPs to connect the internal lab. both sites are
labs.
I will try
On Mon, 23 Jan 2006, Vaida Bogdan wrote:
I don't need openvpn, I need IPSEC (KAME). So none of the proposed
solutions work.
I am the FreeBSD Client in the configuration so I can't change the
server vpn implementation.
Some basic questions: are your certificates self-signed? are your
fred,
i am very gateful for the help.
best
--- F. Senault [EMAIL PROTECTED] wrote:
Wednesday, January 25, 2006, 3:21:08 PM, you wrote:
On Tue, Jan 24, 2006 at 06:19:15PM -0800, gahn
wrote:
[]
As to the roaming users, very unlikely there will
be
dial-up line, but those users
Thanks Vanhu:
could you give me some tips on this knowhow?
--- VANHULLEBUS Yvan [EMAIL PROTECTED] wrote:
IPsec with dynamic remote IPs is not as difficult,
especially with
racoon's generate_policy option, but you'll need to
know what you are
doing: Aggressive mode + PSK is known to be
Hi all:
I ahve some basic questions regarding the mpd.conf:
set radius retries 3
set radius timeout 3
set radius server 192.168.128.101 testing123 1812 1813
set radius me 1.1.1.1
set bundle enable radius-auth radius-fallback
Here my radius server is 192.168.128.101 and interanl
interface of