IPSec Virtual private network Configuration and Setup with step by step with details are given below:

What is IPSec?

  • IPsec is a set of extensions to the IP protocol family
  • It provides cryptographic security services

IPSec Working principle

IPSec works at layer 3 of the OSI model and provides the following services.

  • Confidentiality
  • Integrity
  • Authenticity
  • Replay protection

How IPSec works?

  • The IPSec VPN tunnel can be created between two Firewalls , for data transfer and resource sharing between the two networks.

The firewall has to be configured with the static public IP address of the remote firewall and the network address of the network behind the remote firewall. If a resource from the remote network has to be accessed, the local firewall would encrypt the request and send it through the VPN tunnel to the remote firewall, which would decrypt the request and permit the access to requested resource.

What is VPN?

The VPN is abbreviated as virtual private network.It extends a non-public network across a public network over the internet. It permits a laptop to send and receive knowledge across shared or public networks as if it’s directly connected to the non-public network, whereas profiting from the practicality, security and management policies of the non-public network.
A VPN is formed by establishing a virtual point-to-point affiliation through the utilization of dedicated connections, virtual tunneling protocols, or traffic encryptions.A virtual private network affiliation across the net is analogous to a Wide Area Network (WAN) link between sites. From a user perspective, the extended network resources area unit accessed within the same manner as resources accessible inside the private network.
VPN permit staff to firmly access their company’s computer network whereas traveling outside the workplace. Similarly, VPNs firmly connect geographically disparate offices of a company, making one cohesive network. VPN technology is additionally utilized by net users to attach to proxy servers for the aim of protective individuality and placement.

Types of VPN

  • the protocols accustomed tunnel the traffic.
  • the tunnel’s termination purpose location on the client edge or network-provider edge.
  • whether or not they provide site-to-site or remote-access property.
  • the degree of security provided.
  • the OSI layer they gift to the connecting network, like Layer a pair of circuits or Layer three network property.

VPN Authentication Principle
Tunnel endpoints should be documented before secure VPN tunnels will be established. User-created remote-access VPN might use passwords, biometrics, two-factor authentication or alternative cryptological strategies. Network-to-network tunnels usually use passwords or digital certificates. They for good store the key to permit the tunnel to determine mechanically, while not intervention from the user.

IPSec VPN (Virtual Private Network) Configuration & Setup

Step-I(Run the following command to configure VPN)
# system-config-network

Go to device –> select Ipsec (give nick name as VPN1)
Ipsec Connection Type–> Network to Network encryption –>VPN
Ipsec Encryption Mode –> Automatic encryption mode –> select via IKA (racon)

Step-II(Ipsec Local Area Network)
For Ipsec
local network address to
local network gateway
For Ipsec Remote Area Network
Remote IP Address
local network address to
local network gateway
Step-III(Ipsec key Generate)

Authenticate Key ***** –> Generate

Step-IV(Form client ping to remote client pvt ip)
# ping remote lan ip

That’s all for now.

How to Configure Linux Mail Server Qmail on CentOS / RHEL

Previous article

How to Configure SAN Storage Server on CentOS / RHEL

Next article

You may also like


Leave a reply

Your email address will not be published. Required fields are marked *

More in Linux