By Ken Bantoft and Paul Wouters. Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage?
|Published (Last):||3 July 2009|
|PDF File Size:||19.54 Mb|
|ePub File Size:||20.74 Mb|
|Price:||Free* [*Free Regsitration Required]|
Chapter 2 explains in non-mathematical terms how the IPsec protocols work. It is written especially with the system administrator in mind, and should appeal to both experts and beginners in the world of cryptography. Chapter 3 contains all you need to know to install Openswan on your Linux distribution. Chapter 4 is a step by step tutorial on how to configure the most common type of VPN connections using Openswan.
These include net-to-net, host-to-net, roaming users and head office to branch offices. In other words, all the possible Openswan-to-Openswan connections. Chapter 5 introduces X. It explains how X. This method of allows one to automate host-to-host encryption for machines without any specific configuration by the end-user. The goal of OE is to make IPsec the de-facto standard for all communication on the internet. Chapter 7 goes right down to the packet level and discusses common problems that you might face on your IPsec gateway.
These include special firewalling rules, handling broken IPsec implementations and the various MTU related issues that can come up. It helps you decide on whether you would prefer X.
It also explains how to configure X. It closes with a description on how to configure commonly used third-party software packages for Openswan. Chapter 10 explores how to use IPsec to encrypt all traffic between local machines. It specifically focuses on Chapter 11 discusses the advanced use of Openswan.
Chapter 12 is the culmination of two years of end-user support on the public mailing lists. It discusses the common mistakes and issues that people who are not working with IPsec on a daily basis tend to run into. Unless you are doing something extremely specific to your particular setup, your problem will be shown in this chapter, along with the explanation of what went wrong and how to remedy your situation. Appendix A is our last minute update to the current events of Openswan.
It discusses bleeding edge Linux kernel issues, the latest security vulnerabilities and upcoming features for end-users and developers that did not exist when the authors were writing the bulk of this book.
It also discusses known but unsolved bugs existing at the time this book went to the printer. With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping.
Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage?
Do you need to send information back to your office while on the road or on board a ship? Or do you just want to securely access your MP3's at home? IPsec is the industry standard for encrypted communication, and Openswan is the de-facto implementation of IPsec for Linux. Whether you are just connecting your home DSL connection with your laptop when you're on the road to access your files at home, or you are building an industry size, military strength VPN infrastructure for a medium to very large organization, this book will assist you in setting up Openswan to suit those needs.
Furthermore it discusses common interoperability examples for third party vendors, such as Cisco, Checkpoint, Netscreen and other common IPsec vendors. The authors bring you first hand information, as they are the official developers of the Openswan code.
They have included the latest developments and upcoming issues. With experience in answering questions on a daily basis on the mailing lists since the creation of Openswan, the authors are by far the most experienced in a wide range of successful and not so successful uses of Openswan by people worldwide. Ken Bantoft started programming in , and successfully avoided doing it as a full time job until He opted instead to focus on Unix, Networking, and Linux integration.
He has been writing since , when his first article about network security was published in LinuxJournal in Since then, he has written mostly for the Dutch spin-off of the German 'c't magazine', focusing on Linux, networking and the impact of the digital world on society. When you visit any website, it may store or retrieve information on your browser,usually in the form of cookies.
This information does not usually identify you, but it does help companies to learn how their users are interacting with the site. We respect your right to privacy, so you can choose not to accept some of these cookies.
Choose from the different category headers to find out more and change your default settings. Please note if you have arrived at our site via a cashback website, turning off targeting or performance cookies will mean we cannot verify your transaction with the referrer and you may not receive your cashback. These cookies are essential for the website to function and they cannot be turned off.
They are usually only set in response to actions made by you on our site, such as logging in, adding items to your cart or filling in forms.
If you browse our website, you accept these cookies. These cookies allow us to keep track of how many people have visited our website, how they discovered us, and how they interact with the site.
All the information used is aggregated, and completely anonymous. These cookies are placed on our site by our trusted third-party providers. They help us to personalise our adverts and provide services to our customers such as live chat.
If you have arrived at our site via a cashback website, turning off Targeting Cookies will mean we cannot verify your transaction with the referrer and you may not receive your cashback. Sign In Register. Toggle Nav. Browse All. All Books. Best Sellers. Top Searches:. All Videos. Skip to the end of the images gallery. Skip to the beginning of the images gallery.
Read Now Look inside. More Information Learn Chapter 1 presents some historical context of IPsec and Openswan, and discusses the legal aspects about using and selling cryptography such as Openswan, and discusses some of the aspects of weighing encryption privacy and law enforcement.
About With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping.
Table of contents. Where to Firewall? Do Not Lock Yourself Out! Authors Ken Bantoft Ken Bantoft started programming in , and successfully avoided doing it as a full time job until Add to Cart. What do I get with a Packt subscription? What do I get with a Video? Download this Video course in MP4 format DRM FREE - read and interact with your content when you want, where you want, and how you want Immediately access your video course for viewing or download through your Packt account.
What do I get with an eBook? Add To Cart. Start a FREE day trial. Related Products. Your Privacy 2. Strictly Necessary Cookies 3. Performance Cookies 4. Targeting Cookies Your Privacy. Strictly Necessary Cookies Always active. Performance Cookies. Targeting Cookies. Allow all Save. The Need for Cryptography. A History of the Internet. History of Internet Engineering. The War on Crypto. Free Software. The History of Openswan. Using Openswan. A Very Brief Overview of Cryptography.
IPsec: A Suite of Protocols. Kernel Mode: Packet Handling. Usermode: Handling the Trust Relationships.
Building and Integrating Virtual Private Networks with Openswan
Openswan: Building and Integrating Virtual Private Networks