unless if i'm horribly mistaken, vpn is pretty much 1:1. 1 off campus connection to 1 vpn connection. You can probably do like Castorite, Mee, and myself have done, and setup a linux router and install the cisco vpn client, and allow everyone on your lan to access vpn.
_________________ KOK - 011, Pullin rank on bitches since 2005
Joined: Wed 02-20-2002 11:27PM Posts: 867 Location: No one's really sure what became of Castorite after graduation
Source: Off Campus
heretic^ wrote:
vpn is pretty much 1:1.
That's amazing. I was typing a response to his post earlier and used the exact same analogy. Then I got lost looking up implementation details and cancelled my post. D'oh!
heretic^ wrote:
You can probably do like Castorite, Mee, and myself have done, and setup a linux router and install the cisco vpn client, and allow everyone on your lan to access vpn.
Yeah. That's what I aim for. I don't enable it too often since it tends to throw my persistent connection apps (ssh and irc) for a loop.
As a side note on this: According to what I've read earlier today, the Cisco VPN module doesn't seem to build correctly against newer kernel 2.6.x releases. Of course, 2.4.x doesn't have this problem, and you don't need anything newer than that to route packets anyway.
Depending on the PPTP server in use you may be forced to use a VPN router configuration if more than one masqueraded system wants to connect to a given PPTP server. The PPTP protocol specifies only one control connection from a given client system, and the masquerade gateway is the client as far as the server is concerned. PPTP server implementations that correctly follow the specification will not permit more than one PPTP session to be established from the masquerade gateway. Try it first, though, as some incorrect PPTP implementations (such as that in Windows NT) do permit multiple connections between the same systems.
The IPsec AH protocol (51/ip) incorporates a cryptographic checksum including the IP addresses in the IP header. Since masquerading changes those IP addresses and since the cryptographic checksum cannot be recalculated by the masquerading firewall, the masqueraded packets will fail the checksum test and will be discarded by the remote IPsec gateway. Therefore, IPsec VPNs that use the AH protocol cannot be successfully masqueraded. Sorry. (ESP with authentication can be masqueraded.)
For the record, I believe UMR uses both PPTP and IPSec protocols. Pick your poison.
So, it looks like the only way to have all your roommates using VPN at the same time is if your router supports VPN on the box. I kinda doubt it does, but you never know.
Users browsing this forum: No registered users and 1 guest
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum