O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IPsec Virtual Private Networks (VPNs)

IPsec may be configured to implement Virtual Private Networks (VPNs). A VPN may be used to securely link two or more networks over an insecure network (such as the Internet). For a minimal configuration, you need two Solaris 8 systems, each with two network interfaces. These two systems will serve as VPN gateways. Here is a step-by-step guide to setting up a Solaris 8-based VPN:

1.
Disable all insecure and unneeded network services on both systems. (You may leave those that use strong encryption and authentication, such as Secure Shell.)
2.
Disable IP forwarding.
3.
Enable IP strict destination multihoming.
4.
Configure Security Associations on both systems.
5.
Configure the IPsec tunnel between the systems. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required