| Line 326: |
Line 326: |
| | * Secure NAT settings wtill be used to set Virtual DHCP server settings | | * Secure NAT settings wtill be used to set Virtual DHCP server settings |
| | | | |
| − | {| class="wikitable" style="text-align: center; width: 85%" | + | {| class="wikitable" style="text-align: center; width: 35%" |
| | |+ Ports used by Softether for this configuration | | |+ Ports used by Softether for this configuration |
| | ! Type | | ! Type |
| Line 346: |
Line 346: |
| | And then use the following config below on your Cisco device instead of what is listed on the SoftEther site to get L2TPv3 working: | | And then use the following config below on your Cisco device instead of what is listed on the SoftEther site to get L2TPv3 working: |
| | | | |
| − | {| class="wikitable" style="text-align: center; width: 85%" | + | {| class="wikitable" style="text-align: center; width: 65%" |
| | |+ Information used in this example | | |+ Information used in this example |
| | ! Local IP addess | | ! Local IP addess |
| Line 435: |
Line 435: |
| | * Now connect a device to FastEthernet0/1. It should get a DHCP lease from SoftEther and be on the network. | | * Now connect a device to FastEthernet0/1. It should get a DHCP lease from SoftEther and be on the network. |
| | | | |
| − | =====Troubelshooting===== | + | =====Troubleshooting===== |
| | To troubleshoot the tunnel use the following commands: | | To troubleshoot the tunnel use the following commands: |
| | | | |
| Line 532: |
Line 532: |
| | | | |
| | == VPNC == | | == VPNC == |
| − | VPNC is an open-source VPN client that is compatible with Cisco VPN setups. | + | VPNC <ref>VPNC Project Homepage [https://www.unix-ag.uni-kl.de/~massar/vpnc/]</ref> is an open-source VPN client. |
| − | VPNC is much easier to configure than the Cisco client and works on almost every flavor of *NIX systems including *BSD, Linux, and even OS/X.
| + | |
| | + | {| class="wikitable" style="text-align: center; width: 25%" |
| | + | |+ Works with the following |
| | + | ! System |
| | + | |- |
| | + | | Cisco VPN concentrator 3000 Series |
| | + | |- |
| | + | | Cisco IOS routers |
| | + | |- |
| | + | | Cisco PIX / ASA Zecurity Appliances |
| | + | |- |
| | + | | Juniper/Netscreen |
| | + | |} |
| | + | |
| | + | * And is available for the following operating systems: |
| | + | {| class="wikitable" style="text-align: center; width: 15%" |
| | + | |+ Supported Operating Systems |
| | + | ! Name |
| | + | |- |
| | + | | Linux |
| | + | |- |
| | + | | FreeBSD |
| | + | |- |
| | + | | OpenBSD |
| | + | |- |
| | + | | NetBSD |
| | + | |- |
| | + | | DragonFly BSD |
| | + | |- |
| | + | | Darwin / Mac OS X |
| | + | |- |
| | + | | Solaris |
| | + | |- |
| | + | | Windows / Cygwin |
| | + | |} |
| | + | |
| | + | * Supported Authentications: Hybrid, Pre-Shared-Key + XAUTH, Pre-Shared-Key |
| | + | * Supported IKE DH-Groups: dh1, dh2, dh5 |
| | + | * Supported Hash Algo (IKE/IPSEC): md5, sha1 |
| | + | * Supported Encryptions (IKE/IPSEC): (null), (1des), 3des, aes128, aes192, aes256 |
| | + | * Perfect Forward Secrecy: nopfs, dh1, dh2, dh5 |
| | | | |
| | === Installation === | | === Installation === |