Line 326: |
Line 326: |
| * Secure NAT settings wtill be used to set Virtual DHCP server settings | | * Secure NAT settings wtill be used to set Virtual DHCP server settings |
| | | |
− | {| class="wikitable" style="text-align: center; width: 85%" | + | {| class="wikitable" style="text-align: center; width: 35%" |
| |+ Ports used by Softether for this configuration | | |+ Ports used by Softether for this configuration |
| ! Type | | ! Type |
Line 346: |
Line 346: |
| And then use the following config below on your Cisco device instead of what is listed on the SoftEther site to get L2TPv3 working: | | And then use the following config below on your Cisco device instead of what is listed on the SoftEther site to get L2TPv3 working: |
| | | |
− | {| class="wikitable" style="text-align: center; width: 85%" | + | {| class="wikitable" style="text-align: center; width: 65%" |
| |+ Information used in this example | | |+ Information used in this example |
| ! Local IP addess | | ! Local IP addess |
Line 435: |
Line 435: |
| * Now connect a device to FastEthernet0/1. It should get a DHCP lease from SoftEther and be on the network. | | * Now connect a device to FastEthernet0/1. It should get a DHCP lease from SoftEther and be on the network. |
| | | |
− | =====Troubelshooting===== | + | =====Troubleshooting===== |
| To troubleshoot the tunnel use the following commands: | | To troubleshoot the tunnel use the following commands: |
| | | |
Line 532: |
Line 532: |
| | | |
| == VPNC == | | == VPNC == |
− | VPNC is an open-source VPN client that is compatible with Cisco VPN setups. | + | VPNC <ref>VPNC Project Homepage [https://www.unix-ag.uni-kl.de/~massar/vpnc/]</ref> is an open-source VPN client. |
− | VPNC is much easier to configure than the Cisco client and works on almost every flavor of *NIX systems including *BSD, Linux, and even OS/X.
| + | |
| + | {| class="wikitable" style="text-align: center; width: 25%" |
| + | |+ Works with the following |
| + | ! System |
| + | |- |
| + | | Cisco VPN concentrator 3000 Series |
| + | |- |
| + | | Cisco IOS routers |
| + | |- |
| + | | Cisco PIX / ASA Zecurity Appliances |
| + | |- |
| + | | Juniper/Netscreen |
| + | |} |
| + | |
| + | * And is available for the following operating systems: |
| + | {| class="wikitable" style="text-align: center; width: 15%" |
| + | |+ Supported Operating Systems |
| + | ! Name |
| + | |- |
| + | | Linux |
| + | |- |
| + | | FreeBSD |
| + | |- |
| + | | OpenBSD |
| + | |- |
| + | | NetBSD |
| + | |- |
| + | | DragonFly BSD |
| + | |- |
| + | | Darwin / Mac OS X |
| + | |- |
| + | | Solaris |
| + | |- |
| + | | Windows / Cygwin |
| + | |} |
| + | |
| + | * Supported Authentications: Hybrid, Pre-Shared-Key + XAUTH, Pre-Shared-Key |
| + | * Supported IKE DH-Groups: dh1, dh2, dh5 |
| + | * Supported Hash Algo (IKE/IPSEC): md5, sha1 |
| + | * Supported Encryptions (IKE/IPSEC): (null), (1des), 3des, aes128, aes192, aes256 |
| + | * Perfect Forward Secrecy: nopfs, dh1, dh2, dh5 |
| | | |
| === Installation === | | === Installation === |