Announcement

Collapse
No announcement yet.

IPsec for Untangle (http://www.openswan.org/)

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • IPsec for Untangle (http://www.openswan.org/)

    Trying to leverage the power of this great community. Many people have asked for Ipsec. Maybe one or more members of our community could take on this challenge and have a possible solution.

    Great place to start would be http://www.openswan.org/
    to be understood, you must first understand. :)
    Attention: Support and help on the Untangle Forums is provided by volunteers and community members like yourself. If you need Untangle support please call or email [email protected]

  • #2
    You mean IPsec for the VPN access?
    --------------------------------
    Juan Machado
    --------------------------------

    Comment


    • #3
      Yes, please
      Thomas Belote
      Untangle

      Comment


      • #4
        I may take a stab at it once I finish PPTP
        Vote here to have wireless included in Untangle.

        Comment


        • #5
          Originally posted by Silver Bullet View Post
          I may take a stab at it once I finish PPTP
          are you trying poptop?

          If so, instead of putting it in the alpaca UI, we should put it in the rack, which will be possible as of 6.0 (as its a web UI also)
          Attention: Support and help on the Untangle Forums is provided by volunteers and community members like yourself.
          If you need Untangle support please call or email [email protected]

          Comment


          • #6
            I have pptpd installed and working....mostly.

            I am going to have to get the iptables rules figured out to allow the traffic to the internal machines. I can connect and authenticate externally and ping the internal address of the Untangle server... just not anything else. I had a brief email conversation with an UT iptables pro... just haven't had time to play with it since that conversation.

            I was planning on getting a couple scripts put out this week for the other things I have in the Tips forums, but as soon as I got back in town yesterday I had to leave again this morning.

            I'll get pptp implemented if I can just get the time to sit down and do it.

            Any way I can get a sneak peak at 6.0 to see how I need to start planning a migration of this and other apps?
            Vote here to have wireless included in Untangle.

            Comment


            • #7
              Is anyone interested in helping to test openswan?
              Vote here to have wireless included in Untangle.

              Comment


              • #8
                YES, I was just about to try to add it to ours. I'd love to have this replace (quickly) a separate router which terminates several ipsec VPN tunnels. I've fairly familiar with ipsec and openswan in particular, and we're a new partner as well.

                Comment


                • #9
                  Originally posted by hcst View Post
                  YES, I was just about to try to add it to ours. I'd love to have this replace (quickly) a separate router which terminates several ipsec VPN tunnels. I've fairly familiar with ipsec and openswan in particular, and we're a new partner as well.
                  Welcome to the forums!

                  I just rebuilt my Untangle server the other day and I want to document the process I used to install PPTP and also see if I can get it to use the LDAP server Untangle is using for authentication. Once I get that done, I am going to get back on the openswan implementation and I'll hit you up. Thanks for offering to help test it.
                  Vote here to have wireless included in Untangle.

                  Comment


                  • #10
                    IPSec would put Untangle in the "Super Awesome" category. As mentioned before, for people who are familiar with it as well as already have site-to-site implementations.

                    Originally posted by dmorris View Post
                    are you trying poptop?

                    If so, instead of putting it in the alpaca UI, we should put it in the rack, which will be possible as of 6.0 (as its a web UI also)
                    So are you saying that in version 6.0, you can install applications that can be thrown into the rack, i.e. A different Anti-Spam solution, another AV application, etc, etc, etc.

                    Slightly off topic but I was wondering, since there are two AV solutions you can have in the rack, why not a second Anti-spam solution as well (hopefully free)?

                    Comment


                    • #11
                      I'm just getting into VPN and am still learning the details.

                      From my reading using VPN with SSL or IPsec would have little practical difference in abilities. From your reactions though, I probably have incomplete information.

                      Could you give me a quick rundown on why IPSec would be better than OpenVPN's SSL method?

                      Comment


                      • #12
                        I wouldn't say better. Mind you, I don't have experience with OpenVPN but that right there is the problem. Most hardware manufacturers that sell VPN products use IPSec. It's just the nature of the beast. Let say you needed to connect your Untangle up to a Cisco device, a Watchguard device, or even (gasp!) a Sonicwall. You would need to have IPSec capabilities. Also, many businesses and even government agencies specifically state that communications MUST be done over IPSec VPN's. Honestly, it's been around longer, it's pretty solid, and there are a lot of people who know how to work with it, even between multiple vendors. That can't be said about the other VPN types, to include OpenVPN.

                        Comment


                        • #13
                          Thanks for the reminder. I've read posts about that (some probably from you!), and I should have remembered.

                          Comment


                          • #14
                            Also, OpenVPN is very easy to punch through firewalls, etc. IPSec is much more difficult. However, this is the first time I've actually run into something running OpenVPN -- whereas I seem to be spending an incredible amount of time lately configuring and working with IPSEC VPNs between a wide variety of routers.

                            Comment


                            • #15
                              Originally posted by hcst View Post
                              Also, OpenVPN is very easy to punch through firewalls, etc. IPSec is much more difficult. However, this is the first time I've actually run into something running OpenVPN -- whereas I seem to be spending an incredible amount of time lately configuring and working with IPSEC VPNs between a wide variety of routers.
                              Yeah, it's one of the downsides to IPSec. It doesn't like NAT all too well either.

                              Comment

                              Working...
                              X
                              😀
                              🥰
                              🤢
                              😎
                              😡
                              👍
                              👎