summaryrefslogtreecommitdiff
path: root/doc/src/quickstart-configs.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/src/quickstart-configs.html')
-rw-r--r--doc/src/quickstart-configs.html144
1 files changed, 0 insertions, 144 deletions
diff --git a/doc/src/quickstart-configs.html b/doc/src/quickstart-configs.html
deleted file mode 100644
index b2ad21bcc..000000000
--- a/doc/src/quickstart-configs.html
+++ /dev/null
@@ -1,144 +0,0 @@
-<html>
-<head>
- <meta http-equiv="Content-Type" content="text/html">
- <title>Quick FreeS/WAN installation and configuration</title>
- <meta name="keywords"
- content="Linux, IPsec, VPN, security, FreeSWAN, installation, quickstart">
- <!--
-
- Written by Sandy Harris for the Linux FreeS/WAN project
- Revised by Claudia Schmeing for same
- Freely distributable under the GNU General Public License
-
- More information at www.freeswan.org
- Feedback to users@lists.freeswan.org
-
- This is a new file derived from:
- RCS ID: $Id: quickstart-configs.html,v 1.1 2004/03/15 20:35:24 as Exp $
- Last changed: $Date: 2004/03/15 20:35:24 $
- Revision number: $Revision: 1.1 $
-
- CVS revision numbers do not correspond to FreeS/WAN release numbers.
- -->
-</head>
-<BODY>
-<H1><A name="quick_configs">FreeS/WAN quick start examples</A></H1>
-<P>These are sample
-<A href="manpage.d/ipsec.conf.5.html">ipsec.conf(5)</A>
-configuration files for opportunistic encryption, with comments. Much of
-this configuration will be unnecessary with the new defaults proposed
-for FreeS/WAN 2.x.</P>
-<P>Full instructions are in our
-<A href="quickstart.html#quickstart">quickstart guide</A>.
-
-<H2><A name="qc.opp.client">Configuration for Initiate-only Opportunistic Encryption</A></H2>
-<P>The ipsec.conf file for an initiate-only opportunistic setup is:</P>
-<PRE># general IPsec setup
-config setup
- # Use the default interface
- interfaces=%defaultroute
- # Use auto= parameters in conn descriptions to control startup actions.
- plutoload=%search
- plutostart=%search
- uniqueids=yes
-
-# defaults for subsequent connection descriptions
-conn %default
- # How to authenticate gateways
- authby=rsasig
- # default is
- # load connection description into Pluto's database
- # so it can respond if another gatway initiates
- # individual connection descriptions may override this
- auto=add
-
-# description for opportunistic connections
-conn me-to-anyone
- left=%defaultroute # all connections should use default route
- right=%opportunistic # anyone we can authenticate
- leftrsasigkey=%dnsondemand # NEW: look up keys in DNS as-needed
- rightrsasigkey=%dnsondemand # (not at connection load time)
- rekey=no # let unused connections die
- keylife=1h # short
- auto=route # set up for opportunistic
- leftid=@xy.example.com # our identity for IPSec negotiations
- # must match DNS and ipsec.secrets</PRE>
-
-<P>Normally, you need to do only two things:</P>
-<UL>
- <LI>edit <VAR>leftid=</VAR></LI>
- <LI>set <VAR>auto=route</VAR></LI>
-</UL>
-<P>
- However, some people may need to customize the <VAR>interfaces=</VAR> line
- in the "config setup" section. All other sections are identical for any
- standalone machine doing opportunistic encryption.</P>
-<P>The @ sign in the <VAR>leftid=</VAR> makes the ID go "over the wire"
- as a Fully Qualified Domain Name (FQDN). Without it, an IP address would
- be used and this won't work.</P>
-<P>The conn is not used to supply either public key. Your private key
- is in <A href="manpage.d/ipsec.secrets.5.html">ipsec.secrets(5)</A>
- and, for opportunistic encryption, the public keys for remote gateways
- are all looked up in DNS.</P>
-<P>FreeS/WAN authenticates opportunistic encryption by <A href="#gen_rsa">RSA
- signature</A> only, so "public key" and "private key" refer to these keys.</P>
-<P>While the <VAR>left</VAR> and <VAR>right</VAR> designations
- here are arbitrary, we follow a convention of using <VAR>left</VAR> for
- local and <VAR>right</VAR> for remote.</P>
-
-<P><A href="quickstart.html#config.opp.client">Continue configuring
-initiate-only opportunism.</A>
-
-<H2><A name="qc.incoming.opp.conf">ipsec.conf for Incoming Opportunistic Encryption</A></H2>
-Use the ipsec.conf above, except that the section describing opportunistic
-connections is now:</P>
-<PRE>
-# description for opportunistic connections
-conn me-to-anyone
- left=%defaultroute # all connections should use default route
- right=%opportunistic # anyone we can authenticate
- leftrsasigkey=%dnsondemand # NEW: look up keys in DNS as-needed
- rightrsasigkey=%dnsondemand # (not at connection load time)
- rekey=no # let unused connections die
- keylife=1h # short
- auto=route # set up for opportunistic</PRE>
-
-<P>Note that <VAR>leftid=</VAR> has been removed. With no explicit setting,
-<VAR>leftid=</VAR> defaults to the IP of your public interface.</P>
-
-<P><A href="quickstart.html#incoming.opp.conf">Continue configuring
-full opportunism.</A>
-
-
-<H2><A name="qc.gate.opp.conf">ipsec.conf for Opportunistic Gateway</A></H2>
-Use the ipsec.conf above, plus these connections:
-
-<PRE>conn subnet-to-anyone # must be above me-to-anyone
- also=me-to-anyone
- leftsubnet=42.42.42.0/24
-
-conn me-to-anyone # just like for full opportunism
- left=%defaultroute
- right=%opportunistic
- leftrsasigkey=%dnsondemand
- rightrsasigkey=%dnsondemand
- keylife=1h
- rekey=no
- auto=route # be sure this is enabled
- # Note there is NO leftid= </PRE>
-
-
-<P>Note that a subnet described in ipsec.conf(5) need not correspond to a
- physical network segment. This is discussed in more detail in our
-<A href="adv_config.html">advanced configuration</A> document.</P>
-
-<P>If required, a gateway can easily provide this service for more than one
- subnet. You just add a connection description for each.</P>
-
-<P><A href="quickstart.html#config.opp.gate">Continue configuring an
-opportunistic gateway.</A>
-
-
-</BODY>
-</HTML>
-