/usr/share/doc/secvpn/examples/secvpn.conf.2 is in secvpn 2.23.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 | #
# Example 2: secvpn having one lan-card and connect 2 subnets
#
# Secure Subnet 1 / / Secure Subnet 2
# / Unsecure /
# [hosts1] [secvpn1] [router1] / Internet / [router2] [secvpn2] [hosts2]
# X.X.X.n X.X.X.2 X.X.X.1 / ISDN / Y.Y.Y.1 Y.Y.Y.2 Y.Y.Y.n
# / /
# ToDo:
# The hosts1 should be able to communicate secure with hosts2 over an
# unsecure network. Firewalls will only allow an ssh connection from
# X.X.X.2 to Y.Y.Y.2 using port 22. To make it easy netmasks always are
# defined as 255.255.255.0.
# secvpn1 and secvpn2 only have one LAN-Card. Hosts1/hosts2 have
# routing entries using secvpn1/secvpn2 to reach hosts2/hosts1.
#
#
THIS_IS="`hostname`"
VPNS="secvpn1->secvpn2"
CRYPT_MASK="255.255.255.0"
SSHPORT="22"
secvpn1()
{
GOOD_ONES="X.X.X.0/24"
GOOD_IP="X.X.X.2"
}
secvpn2()
{
GOOD_ONES="Y.Y.Y.0/24"
GOOD_IP="Y.Y.Y.2"
}
vpn_secvpn1_secvpn2()
{
# -----------
# | secvpn1 |----------------+
# ----------- |
# | |
# | # ppp-DEV
T_BAD_IP="X.X.X.2"; T_CRYPT_IP="10.1.1.1"
# | |
# | # ppp-DEV
O_BAD_IP="Y.Y.Y.2"; O_CRYPT_IP="10.1.1.2"
# | |
# ----------- |
# | secvpn2 |----------------+
# -----------
}
|