]> git.ipfire.org Git - thirdparty/strongswan.git/blame - doc/src/interop.html
- import of strongswan-2.7.0
[thirdparty/strongswan.git] / doc / src / interop.html
CommitLineData
997358a6
MW
1<html>
2<head>
3 <meta http-equiv="Content-Type" content="text/html">
4 <title>FreeS/WAN interoperation Grid</title>
5 <meta name="keywords"
6 content="Linux, IPsec, VPN, security, FreeSWAN, interoperation">
7 <!--
8
9 Written by Claudia Schmeing for the Linux FreeS/WAN project
10 With notes from Sandy Harris.
11 Freely distributable under the GNU General Public License
12
13 More information at www.freeswan.org
14 Feedback to users@lists.freeswan.org
15
16 CVS information:
17 RCS ID: $Id: interop.html,v 1.1 2004/03/15 20:35:24 as Exp $
18 Last changed: $Date: 2004/03/15 20:35:24 $
19 Revision number: $Revision: 1.1 $
20
21 CVS revision numbers do not correspond to FreeS/WAN release numbers.
22 -->
23</head>
24
25<body>
26<A NAME="interop"></A><H1>Interoperating with FreeS/WAN</H1>
27
28
29<P>The FreeS/WAN project needs you! We rely on the user community to keep
30up to date. Mail users@lists.freeswan.org with your
31interop success stories.</P>
32
33<P><STRONG>Please note</STRONG>: Most of our interop examples feature
34Linux FreeS/WAN 1.x config files. You can convert them to 2.x files fairly
35easily with the patch in our
36<A HREF="upgrading.html#ipsec.conf_v2">Upgrading Guide</A>.
37</P>
38
39<H2>Interop at a Glance</H2>
40
41
42
43<TABLE BORDER="1">
44
45<TR>
46<TD>&nbsp;</TD>
47<TD colspan="5">FreeS/WAN VPN</TD>
48<TD>Road Warrior</TD>
49<TD>OE</TD>
50</TR>
51
52<TR>
53<TD>&nbsp;</TD>
54<TD>PSK</TD>
55<TD>RSA Secret</TD>
56<TD>X.509<BR><SMALL><A HREF="#interoprules">(requires patch)</A></SMALL></TD>
57<TD>NAT-Traversal<BR><SMALL><A HREF="#interoprules">(requires patch)</A></SMALL></TD>
58<TD>Manual<BR>Keying</TD>
59<TD>&nbsp;</TD>
60<TD>&nbsp;</TD>
61</TR>
62
63
64<TR><TD colspan="8">More Compatible</TD></TR>
65
66
67<!-- PSK RSA X.509 NAT-T Manual RW OE -->
68
69<TR>
70<TD><A HREF="#freeswan">FreeS/WAN</A>
71<A NAME="freeswan.top">&nbsp;</A></TD>
72<TD><FONT color="#00cc00">Yes</FONT></TD>
73<TD><FONT color="#00cc00">Yes</FONT></TD>
74<TD><FONT color="#00cc00">Yes</FONT></TD>
75<TD><FONT color="#00cc00">Yes</FONT></TD>
76<TD><FONT color="#00cc00">Yes</FONT></TD>
77<TD><FONT color="#00cc00">Yes</FONT></TD>
78<TD><FONT color="#00cc00">Yes</FONT></TD>
79</TR>
80
81
82<!-- PSK RSA X.509 NAT-T Manual RW OE -->
83
84<TR>
85<TD><A HREF="#isakmpd">isakmpd (OpenBSD)</A>
86<A NAME="isakmpd.top">&nbsp;</A></TD>
87<TD><FONT color="#00cc00">Yes</FONT></TD>
88<TD>&nbsp;</TD>
89<TD><FONT color="#00cc00">Yes</FONT></TD>
90<TD>&nbsp;</TD>
91<TD><FONT color="#00cc00">Yes</FONT></TD>
92<TD>&nbsp;</TD>
93<TD><FONT color="#cc0000">No&nbsp;&nbsp;&nbsp;&nbsp;</FONT></TD>
94</TR>
95
96
97<!-- PSK RSA X.509 NAT-T Manual RW OE -->
98
99<TR>
100<TD><A HREF="#kame">Kame (FreeBSD,
101<BR>NetBSD, MacOSX)
102<BR> <SMALL>aka racoon</SMALL></A>
103<A NAME="kame.top">&nbsp;</A></TD>
104<TD><FONT color="#00cc00">Yes</FONT></TD>
105<TD><FONT color="#00cc00">Yes</FONT></TD>
106<TD><FONT color="#00cc00">Yes</FONT></TD>
107<TD>&nbsp;</TD>
108<TD><FONT color="#00cc00">Yes</FONT></TD>
109<TD>&nbsp;</TD>
110<TD><FONT color="#cc0000">No</FONT></TD>
111</TR>
112
113
114
115<!-- PSK RSA X.509 NAT-T Manual RW OE -->
116
117<TR>
118<TD><A HREF="#mcafee">McAfee VPN<BR><SMALL>was PGPNet</SMALL></A>
119<A NAME="mcafee.top">&nbsp;</A></TD>
120<TD><FONT color="#00cc00">Yes</FONT></TD>
121<TD><FONT color="#00cc00">Yes</FONT></TD>
122<TD><FONT color="#00cc00">Yes</FONT></TD>
123<TD>&nbsp;</TD>
124<TD>&nbsp;</TD>
125<TD><FONT color="#00cc00">Yes</FONT></TD>
126<TD><FONT color="#cc0000">No</FONT></TD>
127</TR>
128
129
130<!-- PSK RSA X.509 NAT-T Manual RW OE -->
131
132<TR>
133<TD><A HREF="#microsoft">Microsoft <BR>Windows 2000/XP</A>
134<A NAME="microsoft.top">&nbsp;</A></TD>
135<TD><FONT color="#00cc00">Yes</FONT></TD>
136<TD>&nbsp;</TD>
137<TD><FONT color="#00cc00">Yes</FONT></TD>
138<TD>&nbsp;</TD>
139<TD>&nbsp;</TD>
140<TD><FONT color="#00cc00">Yes</FONT></TD>
141<TD><FONT color="#cc0000">No</FONT></TD>
142</TR>
143
144
145<!-- PSK RSA X.509 NAT-T Manual RW OE -->
146<TR>
147<TD><A HREF="#ssh">SSH Sentinel</A>
148<A NAME="ssh.top">&nbsp;</A></TD>
149<TD><FONT color="#00cc00">Yes</FONT></TD>
150<TD>&nbsp;</TD>
151<TD><FONT color="#00cc00">Yes</FONT></TD>
152<TD><FONT color="#cccc00">Maybe</FONT></TD>
153<TD>&nbsp;</TD>
154<TD><FONT color="#00cc00">Yes</FONT></TD>
155<TD><FONT color="#cc0000">No</FONT></TD>
156</TR>
157
158
159<!-- PSK RSA X.509 NAT-T Manual RW OE -->
160
161<TR>
162<TD><A HREF="#safenet">Safenet SoftPK<BR>/SoftRemote</A>
163<A NAME="safenet.top">&nbsp;</A></TD>
164<TD><FONT color="#00cc00">Yes</FONT></TD>
165<TD>&nbsp;</TD>
166<TD><FONT color="#00cc00">Yes</FONT></TD>
167<TD>&nbsp;</TD>
168<TD>&nbsp;</TD>
169<TD><FONT color="#00cc00">Yes</FONT></TD>
170<TD><FONT color="#cc0000">No</FONT></TD>
171</TR>
172
173
174
175<TR><TD colspan="8">Other</TD></TR>
176
177
178<!-- PSK RSA X.509 NAT-T Manual RW OE -->
179
180<TR>
181<TD><A HREF="#6wind">6Wind</A>
182<A NAME="6wind.top">&nbsp;</A></TD>
183<TD>&nbsp;</TD>
184<TD>&nbsp;</TD>
185<TD><FONT color="#00cc00">Yes</FONT></TD>
186<TD>&nbsp;</TD>
187<TD>&nbsp;</TD>
188<TD>&nbsp;</TD>
189<TD><FONT color="#cc0000">No</FONT></TD>
190</TR>
191
192
193<!-- PSK RSA X.509 NAT-T Manual RW OE -->
194
195<TR>
196<TD><A HREF="#alcatel">Alcatel Timestep</A>
197<A NAME="alcatel.top">&nbsp;</A></TD>
198<TD><FONT color="#00cc00">Yes</FONT></TD>
199<TD>&nbsp;</TD>
200<TD>&nbsp;</TD>
201<TD>&nbsp;</TD>
202<TD>&nbsp;</TD>
203<TD>&nbsp;</TD>
204<TD><FONT color="#cc0000">No</FONT></TD>
205</TR>
206
207
208<!-- PSK RSA X.509 NAT-T Manual RW OE -->
209
210<TR>
211<TD><A HREF="#apple">Apple Macintosh<br>System 10+</A>
212<A NAME="apple.top">&nbsp;</A></TD>
213<TD><FONT color="#cccc00">Maybe</FONT></TD>
214<TD><FONT color="#00cc00">Yes</FONT></TD>
215<TD><FONT color="#cccc00">Maybe</FONT></TD>
216<TD>&nbsp;</TD>
217<TD><FONT color="#cccc00">Maybe</FONT></TD>
218<TD>&nbsp;</TD>
219<TD><FONT color="#cc0000">No</FONT></TD>
220</TR>
221
222
223<!-- PSK RSA X.509 NAT-T Manual RW OE -->
224
225<TR>
226<TD><A HREF="#ashleylaurent">AshleyLaurent <BR>VPCom</A>
227<A NAME="ashleylaurent.top">&nbsp;</A></TD>
228<TD><FONT color="#00cc00">Yes</FONT></TD>
229<TD>&nbsp;</TD>
230<TD>&nbsp;</TD>
231<TD>&nbsp;</TD>
232<TD>&nbsp;</TD>
233<TD>&nbsp;</TD>
234<TD><FONT color="#cc0000">No</FONT></TD>
235</TR>
236
237
238<!-- PSK RSA X.509 NAT-T Manual RW OE -->
239
240<TR>
241<TD><A HREF="#borderware">Borderware</A>
242<A NAME="borderware.top">&nbsp;</A></TD>
243<TD><FONT color="#00cc00">Yes</FONT></TD>
244<TD>&nbsp;</TD>
245<TD>&nbsp;</TD>
246<TD>&nbsp;</TD>
247<TD>&nbsp;</TD>
248<TD><FONT color="#cc0000">No</FONT></TD>
249<TD><FONT color="#cc0000">No</FONT></TD>
250</TR>
251
252<!--
253http://www.cequrux.com/vpn-guides.php3
254"coming soon" guide to connect with FreeS/WAN.
255-->
256
257<!-- PSK RSA X.509 NAT-T Manual RW OE -->
258
259<TR>
260<TD><A HREF="#checkpoint">Check Point FW-1/VPN-1</A>
261<A NAME="checkpoint.top">&nbsp;</A></TD>
262<TD><FONT color="#00cc00">Yes</FONT></TD>
263<TD>&nbsp;</TD>
264<TD><FONT color="#00cc00">Yes</FONT></TD>
265<TD>&nbsp;</TD>
266<TD>&nbsp;</TD>
267<TD><FONT color="#00cc00">Yes</FONT></TD>
268<TD><FONT color="#cc0000">No</FONT></TD>
269</TR>
270
271
272<!-- PSK RSA X.509 NAT-T Manual RW OE -->
273
274<TR>
275<TD><A HREF="#cisco">Cisco with 3DES</A>
276<A NAME="cisco.top">&nbsp;</A></TD>
277<TD><FONT color="#00cc00">Yes</FONT></TD>
278<TD><FONT color="#cccc00">Maybe</FONT></TD>
279<TD>&nbsp;</TD>
280<TD><FONT color="#cccc00">Maybe</FONT></TD>
281<TD>&nbsp;</TD>
282<TD>&nbsp;</TD>
283<TD><FONT color="#cc0000">No</FONT></TD>
284</TR>
285
286
287
288<!-- PSK RSA X.509 NAT-T Manual RW OE -->
289
290<TR>
291<TD><A HREF="#equinux">Equinux VPN Tracker <BR>
292(for Mac OS X)
293</A>
294<A NAME="equinux.top">&nbsp;</A></TD>
295<TD><FONT color="#00cc00">Yes</FONT></TD>
296<TD><FONT color="#00cc00">Yes</FONT></TD>
297<TD><FONT color="#00cc00">Yes</FONT></TD>
298<TD>&nbsp;</TD>
299<TD><FONT color="#cccc00">Maybe</FONT></TD>
300<TD>&nbsp;</TD>
301<TD><FONT color="#cc0000">No</FONT></TD>
302</TR>
303
304<!-- PSK RSA X.509 NAT-T Manual RW OE -->
305
306<TR>
307<TD><A HREF="#fsecure">F-Secure</A>
308<A NAME="fsecure.top">&nbsp;</A></TD>
309<TD><FONT color="#00cc00">Yes</FONT></TD>
310<TD>&nbsp;</TD>
311<TD>&nbsp;</TD>
312<TD><FONT color="#cccc00">Maybe</FONT></TD>
313<TD><FONT color="#00cc00">Yes</FONT></TD>
314<TD><FONT color="#00cc00">Yes</FONT></TD>
315<TD><FONT color="#cc0000">No</FONT></TD>
316</TR>
317
318
319<!-- PSK RSA X.509 NAT-T Manual RW OE -->
320
321<TR>
322<TD><A HREF="#gauntlet">Gauntlet GVPN</A>
323<A NAME="gauntlet.top">&nbsp;</A></TD>
324<TD><FONT color="#00cc00">Yes</FONT></TD>
325<TD>&nbsp;</TD>
326<TD><FONT color="#00cc00">Yes</FONT></TD>
327<TD>&nbsp;</TD>
328<TD>&nbsp;</TD>
329<TD>&nbsp;</TD>
330<TD><FONT color="#cc0000">No</FONT></TD>
331</TR>
332
333
334<!-- PSK RSA X.509 NAT-T Manual RW OE -->
335
336<TR>
337<TD><A HREF="#aix">IBM AIX</A>
338<A NAME="aix.top">&nbsp;</A></TD>
339<TD><FONT color="#00cc00">Yes</FONT></TD>
340<TD>&nbsp;</TD>
341<TD><FONT color="#cccc00">Maybe</FONT></TD>
342<TD>&nbsp;</TD>
343<TD>&nbsp;</TD>
344<TD>&nbsp;</TD>
345<TD><FONT color="#cc0000">No</FONT></TD>
346</TR>
347
348
349<!-- PSK RSA X.509 NAT-T Manual RW OE -->
350
351<TR>
352<TD><A HREF="#as400">IBM AS/400</A>
353<A NAME="as400">&nbsp;</A></TD>
354<TD><FONT color="#00cc00">Yes</FONT></TD>
355<TD>&nbsp;</TD>
356<TD>&nbsp;</TD>
357<TD>&nbsp;</TD>
358<TD>&nbsp;</TD>
359<TD>&nbsp;</TD>
360<TD><FONT color="#cc0000">No</FONT></TD>
361</TR>
362
363
364
365<!-- PSK RSA X.509 NAT-T Manual RW OE -->
366
367<TR>
368<TD><A HREF="#intel">Intel Shiva<BR>LANRover/Net Structure</A>
369<A NAME="intel.top">&nbsp;</A></TD>
370<TD><FONT color="#00cc00">Yes</FONT></TD>
371<TD>&nbsp;</TD>
372<TD>&nbsp;</TD>
373<TD>&nbsp;</TD>
374<TD>&nbsp;</TD>
375<TD>&nbsp;</TD>
376<TD><FONT color="#cc0000">No</FONT></TD>
377</TR>
378
379
380<!-- PSK RSA X.509 NAT-T Manual RW OE -->
381
382<TR>
383<TD><A HREF="#lancom">LanCom (formerly ELSA)</A>
384<A NAME="lancom.top">&nbsp;</A></TD>
385<TD><FONT color="#00cc00">Yes</FONT></TD>
386<TD>&nbsp;</TD>
387<TD>&nbsp;</TD>
388<TD>&nbsp;</TD>
389<TD>&nbsp;</TD>
390<TD>&nbsp;</TD>
391<TD><FONT color="#cc0000">No</FONT></TD>
392</TR>
393
394
395<!-- PSK RSA X.509 NAT-T Manual RW OE -->
396
397<TR>
398<TD><A HREF="#linksys">Linksys</A>
399<A NAME="linksys.top">&nbsp;</A></TD>
400<TD><FONT color="#cccc00">Maybe</FONT></TD>
401<TD>&nbsp;</TD>
402<TD><FONT color="#cc0000">No</FONT></TD>
403<TD>&nbsp;</TD>
404<TD>&nbsp;</TD>
405<TD><FONT color="#00cc00">Yes</FONT></TD>
406<TD><FONT color="#cc0000">No</FONT></TD>
407</TR>
408
409
410
411
412<!-- PSK RSA X.509 NAT-T Manual RW OE -->
413
414<TR>
415<TD><A HREF="#lucent">Lucent</A>
416<A NAME="lucent.top">&nbsp;</A></TD>
417<TD><FONT color="#cccc00">Partial</FONT></TD>
418<TD>&nbsp;</TD>
419<TD>&nbsp;</TD>
420<TD>&nbsp;</TD>
421<TD>&nbsp;</TD>
422<TD>&nbsp;</TD>
423<TD><FONT color="#cc0000">No</FONT></TD>
424</TR>
425
426
427
428<!-- PSK RSA X.509 NAT-T Manual RW OE -->
429
430<TR>
431<TD><A HREF="#netasq">Netasq</A>
432<A NAME="netasq.top">&nbsp;</A></TD>
433<TD>&nbsp;</TD>
434<TD>&nbsp;</TD>
435<TD><FONT color="#00cc00">Yes</FONT></TD>
436<TD>&nbsp;</TD>
437<TD>&nbsp;</TD>
438<TD>&nbsp;</TD>
439<TD><FONT color="#cc0000">No</FONT></TD>
440</TR>
441
442
443
444<!-- PSK RSA X.509 NAT-T Manual RW OE -->
445
446<TR>
447<TD><A HREF="#netcelo">netcelo</A>
448<A NAME="netcelo.top">&nbsp;</A></TD>
449<TD>&nbsp;</TD>
450<TD>&nbsp;</TD>
451<TD><FONT color="#00cc00">Yes</FONT></TD>
452<TD>&nbsp;</TD>
453<TD>&nbsp;</TD>
454<TD>&nbsp;</TD>
455<TD><FONT color="#cc0000">No</FONT></TD>
456</TR>
457
458
459<!-- PSK RSA X.509 NAT-T Manual RW OE -->
460
461<TR>
462<TD><A HREF="#netgear">Netgear fvs318</A>
463<A NAME="netgear.top">&nbsp;</A></TD>
464<TD><FONT color="#00cc00">Yes</FONT></TD>
465<TD>&nbsp;</TD>
466<TD>&nbsp;</TD>
467<TD>&nbsp;</TD>
468<TD>&nbsp;</TD>
469<TD>&nbsp;</TD>
470<TD><FONT color="#cc0000">No</FONT></TD>
471</TR>
472
473
474
475<!-- PSK RSA X.509 NAT-T Manual RW OE -->
476
477<TR>
478<TD><A HREF="#netscreen">Netscreen 100<BR>or 5xp</A>
479<A NAME="netscreen.top">&nbsp;</A></TD>
480<TD><FONT color="#00cc00">Yes</FONT></TD>
481<TD>&nbsp;</TD>
482<TD>&nbsp;</TD>
483<TD>&nbsp;</TD>
484<TD>&nbsp;</TD>
485<TD><FONT color="#cccc00">Maybe</FONT></TD>
486<TD><FONT color="#cc0000">No</FONT></TD>
487</TR>
488
489<!-- PSK RSA X.509 NAT-T Manual RW OE -->
490
491<TR>
492<TD><A HREF="#nortel">Nortel Contivity</A>
493<A NAME="nortel.top">&nbsp;</A></TD>
494<TD><FONT color="#cccc00">Partial</FONT></TD>
495<TD>&nbsp;</TD>
496<TD><FONT color="#00cc00">Yes</FONT></TD>
497<TD><FONT color="#cccc00">Maybe</FONT></TD>
498<TD>&nbsp;</TD>
499<TD>&nbsp;</TD>
500<TD><FONT color="#cc0000">No</FONT></TD>
501</TR>
502
503
504<!-- PSK RSA X.509 NAT-T Manual RW OE -->
505
506<TR>
507<TD><A HREF="#radguard">RadGuard</A>
508<A NAME="radguard.top">&nbsp;</A></TD>
509<TD><FONT color="#00cc00">Yes</FONT></TD>
510<TD>&nbsp;</TD>
511<TD>&nbsp;</TD>
512<TD>&nbsp;</TD>
513<TD>&nbsp;</TD>
514<TD>&nbsp;</TD>
515<TD><FONT color="#cc0000">No</FONT></TD>
516</TR>
517
518
519<!-- PSK RSA X.509 NAT-T Manual RW OE -->
520
521<TR>
522<TD><A HREF="#raptor">Raptor</A>
523<A NAME="raptor">&nbsp;</A></TD>
524<TD><FONT color="#00cc00">Yes</FONT></TD>
525<TD>&nbsp;</TD>
526<TD>&nbsp;</TD>
527<TD>&nbsp;</TD>
528<TD><FONT color="#00cc00">Yes</FONT></TD>
529<TD>&nbsp;</TD>
530<TD><FONT color="#cc0000">No</FONT></TD>
531</TR>
532
533
534
535<!-- PSK RSA X.509 NAT-T Manual RW OE -->
536
537<TR>
538<TD><A HREF="#redcreek">Redcreek Ravlin</A>
539<A NAME="redcreek.top">&nbsp;</A></TD>
540<TD><FONT color="#00cc00">Yes</FONT><FONT color="#cccc00">/Partial</FONT></TD>
541<TD>&nbsp;</TD>
542<TD>&nbsp;</TD>
543<TD>&nbsp;</TD>
544<TD>&nbsp;</TD>
545<TD>&nbsp;</TD>
546<TD><FONT color="#cc0000">No</FONT></TD>
547</TR>
548
549
550<!-- PSK RSA X.509 NAT-T Manual RW OE -->
551
552<TR>
553<TD><A HREF="#sonicwall">SonicWall</A>
554<A NAME="sonicwall.top">&nbsp;</A></TD>
555<TD><FONT color="#00cc00">Yes</FONT></TD>
556<TD>&nbsp;</TD>
557<TD>&nbsp;</TD>
558<TD>&nbsp;</TD>
559<TD><FONT color="#cccc00">Maybe</FONT></TD>
560<TD><FONT color="#cc0000">No</FONT></TD>
561<TD><FONT color="#cc0000">No</FONT></TD>
562</TR>
563
564
565
566<!-- PSK RSA X.509 NAT-T Manual RW OE -->
567
568<TR>
569<TD><A HREF="#sun">Sun Solaris</A>
570<A NAME="sun.top">&nbsp;</A></TD>
571<TD><FONT color="#00cc00">Yes</FONT></TD>
572<TD>&nbsp;</TD>
573<TD><FONT color="#00cc00">Yes</FONT></TD>
574<TD>&nbsp;</TD>
575<TD><FONT color="#00cc00">Yes</FONT></TD>
576<TD>&nbsp;</TD>
577<TD><FONT color="#cc0000">No</FONT></TD>
578</TR>
579
580
581
582<!-- PSK RSA X.509 NAT-T Manual RW OE -->
583
584<TR>
585<TD><A HREF="#symantec">Symantec</A>
586<A NAME="symantec.top">&nbsp;</A></TD>
587<TD><FONT color="#00cc00">Yes</FONT></TD>
588<TD>&nbsp;</TD>
589<TD>&nbsp;</TD>
590<TD>&nbsp;</TD>
591<TD>&nbsp;</TD>
592<TD>&nbsp;</TD>
593<TD><FONT color="#cc0000">No</FONT></TD>
594</TR>
595
596
597
598<!-- PSK RSA X.509 NAT-T Manual RW OE -->
599
600<TR>
601<TD><A HREF="#watchguard">Watchguard <BR>Firebox</A>
602<A NAME="watchguard.top">&nbsp;</A></TD>
603<TD><FONT color="#00cc00">Yes</FONT></TD>
604<TD>&nbsp;</TD>
605<TD>&nbsp;</TD>
606<TD>&nbsp;</TD>
607<TD><FONT color="#00cc00">Yes</FONT></TD>
608<TD>&nbsp;</TD>
609<TD><FONT color="#cc0000">No</FONT></TD>
610</TR>
611
612
613<!-- PSK RSA X.509 NAT-T Manual RW OE -->
614
615<TR>
616<TD><A HREF="#xedia">Xedia Access Point<BR>/QVPN</A>
617<A NAME="xedia.top">&nbsp;</A></TD>
618<TD><FONT color="#00cc00">Yes</FONT></TD>
619<TD>&nbsp;</TD>
620<TD>&nbsp;</TD>
621<TD>&nbsp;</TD>
622<TD>&nbsp;</TD>
623<TD>&nbsp;</TD>
624<TD><FONT color="#cc0000">No</FONT></TD>
625</TR>
626
627
628<!-- PSK RSA X.509 NAT-T Manual RW OE -->
629
630<TR>
631<TD><A HREF="#zyxel">Zyxel Zywall<BR>/Prestige</A>
632<A NAME="zyxel.top">&nbsp;</A></TD>
633<TD><FONT color="#00cc00">Yes</FONT></TD>
634<TD>&nbsp;</TD>
635<TD>&nbsp;</TD>
636<TD>&nbsp;</TD>
637<TD>&nbsp;</TD>
638<TD>&nbsp;</TD>
639<TD><FONT color="#cc0000">No</FONT></TD>
640</TR>
641
642
643
644
645<!-- PSK RSA X.509 NAT-T Manual RW OE
646
647
648<TR>
649<TD><A HREF="#sample">sample</A></TD>
650<TD>&nbsp;</TD>
651<TD>&nbsp;</TD>
652<TD>&nbsp;</TD>
653<TD>&nbsp;</TD>
654<TD>&nbsp;</TD>
655<TD>&nbsp;</TD>
656<TD><FONT color="#cc0000">No</FONT></TD>
657</TR>
658
659-->
660
661<TR>
662<TD>&nbsp;</TD>
663<TD>PSK</TD>
664<TD>RSA Secret</TD>
665<TD>X.509<BR><SMALL><A HREF="#interoprules">(requires patch)</A></SMALL></TD>
666<TD>NAT-Traversal<BR><SMALL><A HREF="#interoprules">(requires patch)</A></SMALL></TD>
667<TD>Manual<BR>Keying</TD>
668<TD>&nbsp;</TD>
669<TD>&nbsp;</TD>
670</TR>
671
672<TR>
673<TD>&nbsp;</TD>
674<TD colspan="5">FreeS/WAN VPN</TD>
675<TD>Road Warrior</TD>
676<TD>OE</TD>
677</TR>
678
679
680
681<!-- PSK RSA X.509 NAT-T Manual RW OE -->
682
683</TABLE>
684
685
686
687
688<H3>Key</H3>
689<TABLE BORDER="1">
690
691<TR>
692<TD><FONT color="#00cc00">Yes</FONT></TD>
693<TD>People report that this works for them.</TD>
694</TR>
695
696<TR>
697<TD>[Blank]</TD>
698<TD>We don't know.</TD>
699</TR>
700
701<TR>
702<TD><FONT color="#cc0000">No</FONT></TD>
703<TD>We have reason to believe
704it was, at some point, not possible to get this to work.</TD>
705</TR>
706
707<TR>
708<TD><FONT color="#cccc00">Partial</FONT></TD>
709<TD>Partial success. For example, a connection can be
710created from one end only.</TD>
711</TR>
712
713<TR>
714<TD><FONT color="#00cc00">Yes</FONT><FONT color="#cccc00">/Partial</FONT></TD>
715<TD>Mixed reports.</TD>
716</TR>
717
718
719<TR>
720<TD><FONT color="#cccc00">Maybe</FONT></TD>
721<TD>We think the answer is "yes", but need confirmation.</TD>
722</TR>
723
724
725</TABLE>
726
727<A NAME="interoprules"></A><h2>Basic Interop Rules</h2>
728
729<P>Vanilla
730FreeS/WAN implements <A HREF="compat.html#compat">these parts</A> of the
731IPSec specifications. You can add more with
732<A HREF="http://www.freeswan.ca">Super FreeS/WAN</A>,
733but what we offer may be enough for many users.</P>
734<UL>
735<LI>
736To use X.509 certificates with FreeS/WAN, you will need
737the <A HREF="http://www.strongsec.org/freeswan">X.509 patch</a>
738or <A HREF="http://www.freeswan.ca">Super FreeS/WAN</A>,
739which includes that patch.</LI>
740<LI>
741To use
742<A HREF="glossary.html#NAT.gloss">Network Address Translation</A>
743(NAT) traversal
744with FreeS/WAN, you will need Arkoon Network Security's
745<A HREF="http://open-source.arkoon.net">NAT traversal patch</A>
746or <A HREF="http://www.freeswan.ca">Super FreeS/WAN</A>, which includes it.
747</LI>
748</UL>
749
750
751<P>We offer a set of proposals which is not user-adjustable, but covers
752all combinations that we can offer.
753FreeS/WAN always proposes triple DES encryption and
754Perfect Forward Secrecy (PFS).
755In addition, we propose Diffie Hellman groups 5 and 2
756(in that order), and MD5 and SHA-1 hashes.
757We accept the same proposals, in the same order of preference.
758</P>
759
760<P>Other interop notes:</P>
761<UL>
762<LI>
763A <A HREF="http://lists.freeswan.org/archives/users/2003-September/msg00462.html">SHA-1
764bug in FreeS/WAN 2.00, 2.01 and 2.02</A> may affect some
765interop scenarios. It does not affect 1.x versions, and is fixed in 2.03 and
766later.
767</LI>
768<LI>
769Some other implementations will close a connection with FreeS/WAN
770after some time. This may be a problem with rekey lifetimes. Please see
771<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00293.html">
772this tip</A> and
773<A HREF="http://lists.freeswan.org/pipermail/users/2001-December/005758.html">
774this workaround</A>.
775</LI>
776</UL>
777
778<H2>Longer Stories</H2>
779
780
781<H3>For <EM>More Compatible</EM> Implementations</H3>
782
783
784<H4><A NAME="freeswan">FreeS/WAN</A></H4>
785
786<P>
787See our documentation at <A HREF="http://www.freeswan.org">freeswan.org</A>
788and the Super FreeS/WAN docs at
789<A HREF="http://www.freeswan.ca">freeswan.ca</A>.
790Some user-written HOWTOs for FreeS/WAN-FreeS/WAN connections
791are listed in <A HREF="intro.html#howto">our Introduction</A>.
792</P>
793
794<P>See also:</P>
795
796<UL>
797<LI>
798<A HREF="http://lugbe.ch/action/reports/ipsec_htbe.phtml">A German FreeS/WAN-FreeS/WAN page by Markus Wernig (X.509)</A>
799</LI>
800</UL>
801
802
803<P><A HREF="#freeswan.top">Back to chart</A></P>
804
805
806<H4><A NAME="isakmpd">isakmpd (OpenBSD)</A></H4>
807
808<P><A HREF="http://www.openbsd.org/faq/faq13.html">OpenBSD FAQ: Using IPsec</A><BR>
809<A HREF="http://www.rommel.stw.uni-erlangen.de/~hshoexer/ipsec-howto/HOWTO.html">Hans-Joerg Hoexer's interop Linux-OpenBSD (PSK)</A><BR>
810<A HREF="http://www.segfault.net/ipsec/">Skyper's configuration (PSK)</A>
811<BR>
812<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
813French page with configs (X.509)</A>
814
815
816</P>
817
818<P><A HREF="#isakmpd.top">Back to chart</A></P>
819
820
821<H4><A NAME="kame">Kame</A></H4>
822
823<UL>
824<LI>For FreeBSD and NetBSD. Ships with Mac OS X; see also our
825<A HREF="#apple">Mac</A> section.</LI>
826<LI>Also known as <EM>racoon</EM>, its keying daemon.</LI>
827</UL>
828
829<P><A HREF="http://www.kame.net">Kame homepage, with FAQ</A><BR>
830<A HREF="http://www.netbsd.org/Documentation/network/ipsec">NetBSD's IPSec FAQ</A><BR>
831<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/12/msg00560.html">Ghislaine's post explaining some interop peculiarities</A>
832</P>
833<P>
834<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/09/msg00511.html">Itojun's Kame-FreeS/WAN interop tips (PSK)</A><BR>
835<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2000">Ghislaine Labouret's French page with links to matching FreeS/WAN and Kame configs (RSA)</A><BR>
836<A HREF="http://lugbe.ch/lostfound/contrib/freebsd_router/">Markus Wernig's
837HOWTO (X.509, BSD gateway)</A><BR>
838<A HREF="http://web.morgul.net/~frodo/docs/kame+freeswan_interop.html">Frodo's Kame-FreeS/WAN interop (X.509)</A><BR>
839<A HREF="http://www.wavesec.org/kame.phtml">Kame as a WAVEsec client.</A>
840</P>
841
842<P><A HREF="#kame.top">Back to chart</A></P>
843
844
845<H4><A NAME="mcafee">PGPNet/McAfee</A></H4>
846
847<P>
848<UL>
849<LI>Now called McAfee VPN Client.</LI>
850<LI>PGPNet also came in a freeware version which did not support subnets</LI>
851<LI>To support dhcp-over-ipsec, you need the X.509 patch, which is included in
852<A HREF="http://www.freeswan.ca">Super FreeS/WAN</A>.
853</LI>
854</UL>
855<P>
856<A HREF="http://www.freeswan.ca/docs/WindowsInterop">Tim Carr's Windows Interop Guide (X.509)</A><BR>
857<A HREF="http://www.rommel.stw.uni-erlangen.de/~hshoexer/ipsec-howto/HOWTO.html#Interop2"
858>Hans-Joerg Hoexer's Guide for Linux-PGPNet (PSK)</A><BR>
859<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/04/msg00339.html">Kai Martius' instructions using RSA Key-Extractor Tool (RSA)</A><BR>
860&nbsp;&nbsp;&nbsp;&nbsp;<A HREF="http://www.zengl.net/freeswan/english.html">Christian Zeng's page (RSA)</A> based on Kai's work. English or German.<BR>
861<A HREF="http://tirnanog.ls.fi.upm.es/CriptoLab/Biblioteca/InfTech/InfTech_CriptoLab.htm">
862Oscar Delgado's PDF (X.509, no configs)</A><BR>
863<A HREF="http://www-ec.njit.edu/~rxt1077/Howto.txt">Ryan's HOWTO for FreeS/WAN-PGPNet (X.509)</A>. Through a Linksys Router with IPsec Passthru enabled.<BR>
864<A HREF="http://jixen.tripod.com/#RW-PGP-to-Fwan">Jean-Francois Nadeau's Practical Configuration (Road Warrior with PSK)</A><BR>
865<A HREF="http://www.evolvedatacom.nl/freeswan.html#toc">Wouter Prins' HOWTO (Road Warrior with X.509)</A><BR>
866</P>
867<P>
868<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/01/msg00271.html">Rekeying problem with FreeS/WAN and older PGPNets</A><BR>
869</P>
870
871<P><A HREF="http://www.strongsec.com/freeswan/dhcprelay/index.htm">
872DHCP over IPSEC HOWTO for FreeS/WAN (requires X.509 and dhcprelay patches)
873</A>
874</P>
875
876<P><A HREF="#mcafee.top">Back to chart</A></P>
877
878
879<H4><A NAME="microsoft">Microsoft Windows 2000/XP</A></H4>
880
881<UL>
882<LI>IPsec comes with Win2k, and with XP Support Tools. May require
883<A HREF="http://www.microsoft.com/windows2000/downloads/recommended/encryption/default.asp"> High Encryption Pack</A>. WinXP users have also reported better
884results with Service Pack 1.</LI>
885<LI>The Road Warrior setup works either way round. Windows (XP or 2K) IPsec
886can connect as a Road Warrior to FreeS/WAN.
887However, FreeS/WAN can also successfully connect as a Road
888Warrior to Windows IPsec (see Nate Carlson's configs below).</LI>
889<LI>FreeS/WAN version 1.92 or later is required to avoid an interoperation
890problem with Windows native IPsec. Earlier FreeS/WAN versions
891did not process the Commit Bit as Windows native IPsec expected.</LI>
892</UL>
893
894<P>
895<A HREF="http://www.freeswan.ca/docs/WindowsInterop">Tim Carr's Windows Interop Guide (X.509)</A><BR>
896
897<A HREF="http://ipsec.math.ucla.edu/services/ipsec.html">James Carter's
898instructions (X.509, NAT-T)</A><BR>
899
900<A HREF="http://jixen.tripod.com/#Win2000-Fwan">
901Jean-Francois Nadeau's Net-net Configuration (PSK)</A><BR>
902
903<A HREF="http://security.nta.no/freeswan-w2k.html">
904Telenor's Node-node Config (Transport-mode PSK)</A><BR>
905
906<A HREF="http://vpn.ebootis.de">Marcus Mueller's HOWTO using his VPN config tool (X.509).</A> Tool also works with PSK.<BR>
907
908<A HREF="http://www.natecarlson.com/include/showpage.php?cat=linux&page=ipsec-x509">
909Nate Carlson's HOWTO using same tool (Road Warrior with X.509)</A>. Unusually,
910FreeS/WAN is the Road Warrior here.<BR>
911
912<A HREF="http://tirnanog.ls.fi.upm.es/CriptoLab/Biblioteca/InfTech/InfTech_CriptoLab.htm">
913Oscar Delgado's PDF (X.509, no configs)</A><BR>
914
915<A HREF="http://lists.freeswan.org/pipermail/users/2003-July/022425.html">Tim Scannell's Windows XP Additional Checklist (X.509)</A><BR>
916</P>
917
918<!-- Note to self: Include L2TP references? -->
919
920<P>
921<A HREF="http://www.microsoft.com/windows2000/en/server/help/default.asp?url=/windows2000/en/server/help/sag_TCPIP_ovr_secfeatures.htm">
922Microsoft's page on Win2k TCP/IP security features</A><BR>
923
924<A HREF="http://support.microsoft.com/support/kb/articles/Q257/2/25.ASP">
925Microsoft's Win2k IPsec debugging tips</A><BR>
926
927<!-- Alt-URL http://support.microsoft.com/default.aspx?scid=kb;EN-US;q257225
928Perhaps newer? -->
929
930<A HREF="http://www.wired.com/news/technology/0,1282,36336,00.html">MS VPN may fall back to 1DES</A>
931</P>
932
933<P><A HREF="#microsoft.top">Back to chart</A></P>
934
935
936<H4><A NAME="ssh">SSH Sentinel</A></H4>
937
938<UL>
939<LI>Popular and well tested.</LI>
940<LI>Also rebranded in <A HREF="http://www.zyxel.com">Zyxel Zywall</A>.
941Our Zyxel interop notes are <A HREF="#zyxel">here</A>.</LI>
942<LI>
943SSH supports IPsec-over-UDP NAT traversal.
944</LI>
945<LI>There is this
946<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/12/msg00370.html">
947potential problem</A> if you're not using the Legacy Proposal option.
948</UL>
949
950<P>
951<A HREF="http://www.ssh.com/support/sentinel/documents.cfm">SSH's Sentinel-FreeSWAN interop PDF (X.509)</A><BR>
952<A HREF="http://www.nadmm.com/show.php?story=articles/vpn.inc">Nadeem Hassan's
953SUSE-to-Sentinel article (Road warrior with X.509)</A><BR>
954<A HREF="http://www.zerozone.it/documents/Linux/HowTo/VPN-IPsec-Freeswan-HOWTO.html">O-Zone's Italian HOWTO (Road Warrior, X.509, DHCP)</A><BR>
955</P>
956
957
958<P><A HREF="#ssh.top">Back to chart</A></P>
959
960
961
962<H4><A NAME="safenet">Safenet SoftPK/SoftRemote</A></H4>
963
964<UL>
965<LI>People recommend SafeNet as a low cost Windows client.</LI>
966<LI>SoftRemote seems to be the newer name for SoftPK.</LI>
967</UL>
968
969<P>
970<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005061.html">
971Whit Blauvelt's SoftRemote tips</A><BR>
972<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/015591.html">
973Tim Wilson's tips (X.509)</A>
974<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00607.html">Workaround for a "gotcha"</A>
975</P>
976
977<P>
978<A HREF="http://jixen.tripod.com/#Rw-IRE-to-Fwan">Jean-Francois Nadeau's
979Practical Configuration (Road Warrior with PSK)</A><BR>
980<A HREF="http://www.terradoncommunications.com/security/whitepapers/safe_net-to-free_swan.pdf">
981Terradon Communications' PDF (Road Warrior with PSK)</A><BR>
982<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/?????.html">
983Seaan.net's PDF (Road Warrior to Subnet, with PSK)
984</A><BR>
985<A HREF="http://www.redbaronconsulting.com/freeswan/fswansafenet.pdf">
986Red Baron Consulting's PDF (Road Warrior with X.509)</A>
987</P>
988
989<P><A HREF="#safenet.top">Back to chart</A></P>
990
991
992
993
994
995
996
997
998<H3>For <EM>Other Implementations</EM></H3>
999
1000
1001
1002<H4><A NAME="6wind">6Wind</A></H4>
1003
1004<P>
1005
1006<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1007French page with configs (X.509)</A>
1008
1009</P>
1010
1011<P><A HREF="#6wind.top">Back to chart</A></P>
1012
1013
1014
1015<H4><A NAME="alcatel">Alcatel Timestep</A></H4>
1016
1017<P>
1018<A HREF="http://lists.freeswan.org/pipermail/users/2002-June/011878.html">
1019Alain Sabban's settings (PSK or PSK road warrior; through static NAT)</A><BR>
1020<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/1999/06/msg00100.html">
1021Derick Cassidy's configs (PSK)</A><BR>
1022<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/1999/08/msg00194.html">
1023David Kerry's Timestep settings (PSK)</A>
1024<BR>
1025<A HREF="http://lists.freeswan.org/pipermail/users/2002-August/013711.html">
1026Kevin Gerbracht's ipsec.conf (X.509)</A>
1027</P>
1028
1029<P><A HREF="#alcatel.top">Back to chart</A></P>
1030
1031
1032
1033<H4><A NAME="apple">Apple Macintosh System 10+</A></H4>
1034
1035<UL>
1036<LI>Since the system is based on FreeBSD, this should
1037interoperate <A HREF="#kame">just like FreeBSD</A>.
1038</LI>
1039
1040<LI>
1041To use Appletalk over IPsec tunnels,
1042<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005116.html">run
1043it over TCP/IP</A>, or use
1044Open Door Networks' Shareway IP tool,
1045<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005426.html">described
1046here.</A>
1047</LI>
1048
1049<LI>See also the <A HREF="#equinux">Equinux VPN Tracker</A>
1050for Mac OS X.</LI>
1051</UL>
1052
1053
1054<P>
1055<A HREF="http://ipsec.math.ucla.edu/services/ipsec.html">James Carter's
1056instructions (X.509, NAT-T)</A>
1057</P>
1058
1059
1060<P><A HREF="#apple.top">Back to chart</A></P>
1061
1062
1063
1064
1065
1066
1067<H4><A NAME="ashleylaurent">AshleyLaurent VPCom</A></H4>
1068
1069<P>
1070<A HREF="http://www.ashleylaurent.com/newsletter/01-28-00.htm">
1071Successful interop report, no details</A>
1072</P>
1073
1074<P><A HREF="#ashleylaurent.top">Back to chart</A></P>
1075
1076
1077<H4><A NAME="borderware">Borderware</A></H4>
1078
1079<UL>
1080<LI>I suspect the Borderware client is a rebranded Safenet.
1081If that's true, our <A HREF="#safenet">Safenet section</A> will help.</LI>
1082</UL>
1083
1084<P>
1085<A HREF="http://lists.freeswan.org/pipermail/users/2002-March/008288.html">
1086Philip Reetz' configs (PSK)</A><BR>
1087
1088<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/09/msg00217.html">
1089Borderware server does not support FreeS/WAN road warriors</A><BR>
1090<A HREF="http://lists.freeswan.org/pipermail/users/2002-February/007733.html">
1091Older Borderware may not support Diffie Hellman groups 2, 5</A><BR>
1092</P>
1093
1094
1095<P><A HREF="#borderware.top">Back to chart</A></P>
1096
1097
1098
1099<H4><A NAME="checkpoint">Check Point VPN-1 or FW-1</A></H4>
1100
1101<UL>
1102<LI>
1103<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/02/msg00099.html">
1104Caveat about IP-range inclusion on Check Point.</A>
1105</LI>
1106<LI>
1107Some versions of Check Point may require an aggressive mode patch to
1108interoperate with FreeS/WAN.<BR>
1109<A HREF="http://www.freeswan.ca/code/super-freeswan">Super FreeS/WAN</A>
1110now features this patch.
1111<!--
1112<A HREF="http://www.freeswan.ca/patches/aggressivemode">Steve Harvey's
1113aggressive mode patch for FreeS/WAN 1.5</A>
1114-->
1115</LI>
1116<LI>
1117<LI>A Linux FreeS/WAN-Checkpoint connection may close after some time. Try
1118<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00293.html">this tip</A> toward a workaround.
1119</LI>
1120</UL>
1121
1122<P>
1123<A HREF="http://www.fw-1.de/aerasec/ng/vpn-freeswan/CPNG+Linux-FreeSWAN.html">
1124AERAsec's Firewall-1 NG site (PSK, X.509, Road Warrior with X.509,
1125other algorithms)</A><BR>
1126&nbsp;&nbsp;&nbsp;&nbsp;
1127<A HREF="http://www.fw-1.de/aerasec/ng/vpn-freeswan/CPNG+Linux-FreeSWAN.html#support-matrix">
1128AERAsec's detailed Check Point-FreeS/WAN support matrix</A><BR>
1129<A HREF="http://support.checkpoint.com/kb/docs/public/firewall1/4_1/pdf/fw-linuxvpn.pdf">Checkpoint.com PDF: Linux as a VPN Client to FW-1 (PSK)</A><BR>
1130
1131<A HREF="http://www.phoneboy.com">PhoneBoy's Check Point FAQ (on Check Point
1132only, not FreeS/WAN)</A><BR>
1133
1134</P>
1135
1136<P>
1137<A HREF="http://lists.freeswan.org/pipermail/users/2001-August/002351.html">Chris
1138Harwell's tips & FreeS/WAN configs (PSK)</A><BR>
1139
1140<A HREF="http://lists.freeswan.org/pipermail/users/2002-April/009362.html">Daniel
1141Tombeil's configs (PSK)</A>
1142
1143</P>
1144
1145<P><A HREF="#checkpoint.top">Back to chart</A></P>
1146
1147
1148<H4><A NAME="cisco">Cisco</A></H4>
1149
1150<UL>
1151<LI>
1152Cisco supports IPsec-over-UDP NAT traversal.
1153</LI>
1154<LI>Cisco VPN Client appears to use nonstandard IPsec and
1155does not work with FreeS/WAN. <A HREF="https://mj2.freeswan.org/archives/2003-August/maillist.html">This message</A> concerns Cisco VPN Client 4.01.
1156<!-- fix link -->
1157</LI>
1158<LI>A Linux FreeS/WAN-Cisco connection may close after some time.
1159<A HREF="http://lists.freeswan.org/pipermail/users/2001-December/005758.html">
1160Here</A>
1161is a workaround, and
1162<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00293.html">here</A>
1163 is another comment on the same subject.</LI>
1164<LI><A HREF="http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120t/120t2/3desips.htm">Older Ciscos</A>
1165purchased outside the United States may not have 3DES, which FreeS/WAN requires.</LI>
1166<LI><A HREF="http://lists.freeswan.org/pipermail/users/2001-June/000406.html">RSA keying may not be possible between Cisco and FreeS/WAN.</A>
1167<LI><A HREF="http://lists.freeswan.org/pipermail/users/2001-October/004357.html">In
1168ipsec.conf, VPN3000 DN (distinguished name) must be in binary (X.509 only)</A></LI>
1169
1170
1171</UL>
1172
1173
1174<P>
1175<A HREF="http://rr.sans.org/encryption/cisco_router.php">SANS Institute HOWTO (PSK).</A> Detailed, with extensive references.<BR>
1176<A HREF="http://www.worldbank.ro/IPSEC/cisco-linux.txt">Short HOWTO (PSK)</A><BR>
1177<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1178French page with configs for Cisco IOS, PIX and VPN 3000 (X.509)</A>
1179<BR>
1180
1181<A HREF="http://lists.freeswan.org/pipermail/users/2001-August/002966.html">Dave
1182McFerren's sample configs (PSK)</A><BR>
1183<A HREF="http://lists.freeswan.org/pipermail/users/2001-September/003422.html">Wolfgang
1184Tremmel's sample configs (PSK road warrior)</A><BR>
1185<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/11/msg00578.html">
1186Old doc from Pete Davis, with William Watson's updated Tips (PSK)</A><BR>
1187</P>
1188
1189<P><STRONG>Some PIX specific information:</STRONG><BR>
1190
1191<A HREF="http://www.wlug.org.nz/FreeSwanToCiscoPix">
1192Waikato Linux Users' Group HOWTO. Nice detail (PSK)
1193</A><BR>
1194<A HREF="http://www.johnleach.co.uk/documents/freeswan-pix/freeswan-pix.html">
1195John Leach's configs (PSK)
1196</A><BR>
1197<A HREF="http://www.diverdown.cc/vpn/freeswanpix.html">
1198Greg Robinson's settings (PSK)
1199</A><BR>
1200<A HREF="http://lists.freeswan.org/pipermail/users/2002-February/007901.html">
1201Scott's ipsec.conf for PIX (PSK, FreeS/WAN side only)</A><BR>
1202<A HREF="http://lists.freeswan.org/pipermail/users/2001-October/003949.html">Rick
1203Trimble's PIX and FreeS/WAN settings (PSK)</A><BR>
1204</P>
1205
1206
1207
1208<P><A href="http://www.cisco.com/public/support/tac">
1209Cisco VPN support page</A><BR>
1210<A href="http://www.ieng.com/warp/public/707/index.shtml#ipsec">
1211Cisco IPsec information page</A>
1212</P>
1213
1214<P><A HREF="#cisco.top">Back to chart</A></P>
1215
1216
1217
1218
1219<H4><A NAME="equinux">Equinux VPN tracker (for Mac OS X)</A></H4>
1220
1221<UL>
1222<LI>Graphical configurator for Mac OS X IPsec. May be an interface
1223to the <A HREF="#apple">native Mac OS X IPsec</A>, which is essentially
1224<A HREF="#kame">KAME</A>.</LI>
1225<LI>To use Appletalk over IPsec tunnels,
1226<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005116.html">run
1227it over TCP/IP</A>, or use
1228Open Door Networks' Shareway IP tool,
1229<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005426.html">described
1230here.</A> </LI>
1231</UL>
1232
1233
1234<P>
1235Equinux provides <A HREF="http://www.equinux.com/download/HowTo_FreeSWAN.pdf">this
1236excellent interop PDF</A> (PSK, RSA, X.509).
1237</P>
1238
1239<P><A HREF="#equinux.top">Back to chart</A></P>
1240
1241
1242<H4><A NAME="fsecure">F-Secure</A></H4>
1243
1244<UL>
1245<LI>
1246<!-- <A HREF="http://lists.freeswan.org/pipermail/users/2002-February/007596.html"> -->
1247F-Secure supports IPsec-over-UDP NAT traversal.
1248</LI>
1249</UL>
1250
1251<P><A HREF="http://www.pingworks.de/tech/vpn/vpn.txt">pingworks.de's
1252 "Connecting F-Secure's VPN+ to Linux FreeS/WAN" (PSK road warrior)</A><BR>
1253&nbsp;&nbsp;&nbsp;&nbsp;<A HREF="http://www.pingworks.de/tech/vpn/vpn.pdf">Same thing as PDF</A><BR>
1254<A HREF="http://www.exim.org/pipermail/linux-ipsec/Week-of-Mon-20010122/000061.html">Success report, no detail (PSK)</A><BR>
1255<A HREF="http://www.exim.org/pipermail/linux-ipsec/Week-of-Mon-20010122/000041.html">Success report, no detail (Manual)</A>
1256</P>
1257
1258<!-- Other NAT traversers:
1259http://lists.freeswan.org/pipermail/users/2002-April/009136.html
1260and ssh sentinel:
1261http://lists.freeswan.org/pipermail/users/2001-September/003108.html
1262-->
1263
1264<P><A HREF="#fsecure.top">Back to chart</A></P>
1265
1266
1267
1268<H4><A NAME="gauntlet">Gauntlet GVPN</A></H4>
1269
1270<P>
1271<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/11/msg00535.html">Richard Reiner's ipsec.conf (PSK)</A>
1272<BR>
1273<A HREF="http://lists.freeswan.org/pipermail/users/2002-June/011434.html">
1274Might work without that pesky firewall... (PSK)</A><BR>
1275<!-- insert archive link -->
1276In late July, 2003 Alexandar Antik reported success interoperating
1277with Gauntlet 6.0 for Solaris (X.509). Unfortunately the message is not
1278properly archived at this time.
1279</P>
1280
1281<P><A HREF="#gauntlet.top">Back to chart</A></P>
1282
1283
1284
1285<H4><A NAME="aix">IBM AIX</A></H4>
1286
1287<P><A HREF="http://www-1.ibm.com/servers/esdd/articles/security.html">
1288IBM's "Built-In Network Security with AIX" (PSK, X.509)</A><BR>
1289<A HREF="http://www-1.ibm.com/servers/aix/products/ibmsw/security/vpn/faqandtips/#ques20">
1290IBM's tip: importing Linux FreeS/WAN settings into AIX's <VAR>ikedb</VAR>
1291(PSK)</A>
1292</P>
1293
1294<P><A HREF="#aix.top">Back to chart</A></P>
1295
1296
1297
1298<H4><A NAME="as400">IBM AS/400</A></H4>
1299
1300<UL>
1301<LI>
1302<A HREF="http://lists.freeswan.org/pipermail/users/2002-April/009106.html">Road
1303 Warriors may act flaky</A>.
1304</LI>
1305</UL>
1306
1307<P><A HREF="http://lists.freeswan.org/pipermail/users/2002-September/014264.html">
1308Richard Welty's tips and tricks</A><BR>
1309</P>
1310
1311<P><A HREF="#as400.top">Back to chart</A></P>
1312
1313
1314
1315<H4><A NAME="intel">Intel Shiva LANRover / Net Structure</A></H4>
1316
1317<UL>
1318<LI>Intel Shiva LANRover is now known as Intel Net Structure.</LI>
1319<LI>
1320<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/01/msg00298.html">
1321Shiva seems to have two modes: IPsec or the proprietary
1322"Shiva Tunnel".</A>
1323Of course, FreeS/WAN will only create IPsec tunnels.
1324</LI>
1325
1326<LI>
1327<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/02/msg00293.html">
1328AH may not work for Shiva-FreeS/WAN.</A>
1329That's OK, since FreeS/WAN has phased out the use of AH.
1330</LI>
1331</UL>
1332
1333<P>
1334<A HREF="http://snowcrash.tdyc.com/freeswan/">
1335Snowcrash's configs (PSK)</A><BR>
1336
1337<A HREF="http://www.opus1.com/vpn/index.html">
1338Old configs from an interop (PSK)</A><BR>
1339
1340<A HREF="http://lists.freeswan.org/pipermail/users/2001-October/003831.html">
1341The day Shiva tickled a Pluto bug (PSK)</A><BR>
1342
1343&nbsp;&nbsp;&nbsp;&nbsp;
1344<A HREF="http://lists.freeswan.org/pipermail/users/2001-October/004270.html">
1345Follow up: success!</A>
1346</P>
1347
1348<P><A HREF="#intel.top">Back to chart</A></P>
1349
1350
1351
1352<H4><A NAME="lancom">LanCom (formerly ELSA)</A></H4>
1353
1354<UL>
1355<LI>This router is popular in Germany.
1356</UL>
1357
1358<P>
1359Jakob Curdes successfully created a PSK connection with the LanCom 1612 in
1360August 2003.
1361<!-- add ML link when it appears -->
1362</P>
1363
1364<P><A HREF="#lancom.top">Back to chart</A></P>
1365
1366
1367
1368<H4><A NAME="linksys">Linksys</A></H4>
1369
1370<UL>
1371<LI>Linksys may be used as an IPsec tunnel endpoint, <STRONG>OR</STRONG>
1372as a router in "IPsec passthrough" mode, so that the IPsec tunnel
1373passes through the Linksys.
1374</LI>
1375</UL>
1376
1377<H5>As tunnel endpoint</H5>
1378<P>
1379<A HREF="http://www.freeswan.ca/docs/BEFVP41/">
1380Ken Bantoft's instructions (Road Warrior with PSK)</A><BR>
1381<A HREF="http://lists.freeswan.org/pipermail/users/2002-February/007814.html">
1382Nate Carlson's caveats</A>
1383</P>
1384
1385<H5>In IPsec passthrough mode</H5>
1386<P>
1387<A HREF="http://www-ec.njit.edu/~rxt1077/Howto.txt">
1388Sample HOWTO through a Linksys Router</A><BR>
1389<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2002/02/msg00114.html">
1390Nadeem Hasan's configs</A><BR>
1391<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2002/02/msg00180.html">
1392Brock Nanson's tips</A><BR>
1393</P>
1394
1395<P><A HREF="#linksys.top">Back to chart</A></P>
1396
1397
1398<H4><A NAME="lucent">Lucent</A></H4>
1399
1400<P>
1401<A HREF="http://lists.freeswan.org/pipermail/users/2002-May/010976.html">
1402Partial success report; see also the next message in thread</A>
1403</P>
1404<!-- section done -->
1405
1406<P><A HREF="#lucent.top">Back to chart</A></P>
1407
1408
1409<H4><A NAME="netasq">Netasq</A></H4>
1410
1411<P>
1412<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1413French page with configs (X.509)</A>
1414
1415</P>
1416<!-- section done -->
1417
1418<P><A HREF="#netasq.top">Back to chart</A></P>
1419
1420
1421
1422<H4><A NAME="netcelo">Netcelo</A></H4>
1423
1424<P>
1425<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1426French page with configs (X.509)</A>
1427
1428<!-- section done -->
1429
1430</P>
1431
1432<P><A HREF="#netcelo.top">Back to chart</A></P>
1433
1434
1435
1436<H4><A NAME="netgear">Netgear fvs318</A></H4>
1437
1438<UL>
1439<LI>With a recent Linux FreeS/WAN, you will require the latest
1440(12/2002) Netgear firmware, which supports Diffie-Hellman (DH) group 2.
1441For security reasons, we phased out DH 1 after Linux FreeS/WAN 1.5.
1442</LI>
1443<LI>
1444<A HREF="http://lists.freeswan.org/pipermail/users/2002-June/011833.html">
1445This message</A> reports the incompatibility between Linux FreeS/WAN 1.6+
1446and Netgear fvs318 without the firmware upgrade.
1447</LI>
1448<LI>We believe Linux FreeS/WAN 1.5 and earlier will interoperate with
1449any NetGear firmware.
1450</LI>
1451</UL>
1452
1453<P>
1454<A HREF="http://lists.freeswan.org/pipermail/users/2003-February/017891.html">
1455John Morris' setup (PSK)</A>
1456</P>
1457
1458<P><A HREF="#netgear.top">Back to chart</A></P>
1459
1460
1461
1462<H4><A NAME="netscreen">Netscreen 100 or 5xp</A></H4>
1463
1464<P>
1465<A HREF="http://lists.freeswan.org/pipermail/users/2002-August/013409.html">
1466Errol Neal's settings (PSK)</A><BR>
1467<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/015265.html">
1468Corey Rogers' configs (PSK, no PFS)</A><BR>
1469<A HREF="http://lists.freeswan.org/pipermail/users/2002-August/013051.html">
1470Jordan Share's configs (PSK, 2 subnets, through static NAT)</A><BR>
1471<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/08/msg00404.html">
1472Set src proxy_id to your protected subnet/mask</A><BR>
1473
1474<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1475French page with ipsec.conf, Netscreen screen shots (X.509, may
1476need to revert to PSK...)</A>
1477
1478</P>
1479<P>
1480<A HREF="http://archives.neohapsis.com/archives/sf/linux/2001-q2/0123.html">
1481A report of a company using Netscreen with FreeS/WAN on a large scale
1482(FreeS/WAN road warriors?)</A>
1483</P>
1484
1485<P><A HREF="#netscreen.top">Back to chart</A></P>
1486
1487
1488
1489<H4><A NAME="nortel">Nortel Contivity</A></H4>
1490
1491<UL>
1492<LI>
1493Nortel supports IPsec-over-UDP NAT traversal.
1494</LI>
1495
1496<LI>
1497<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/02/msg00417.html">
1498Some older versions of Contivity and FreeS/WAN will not communicate.</A>
1499</LI>
1500
1501<LI>
1502<A HREF="http://lists.freeswan.org/pipermail/users/2002-May/010924.html">
1503FreeS/WAN cannot be used as a "client" to a Nortel Contivity server,
1504but can be used as a branch-office tunnel.</A>
1505</LI>
1506
1507<!-- Probably obsoleted by Ken's post
1508<LI>
1509(Matthias siebler from old interop)
1510At one point you could not configure Nortel-FreeS/WAN tunnels as
1511"Client Tunnels" since FreeS/WAN does not support Aggressive Mode.
1512Current status of this problem: unknown.
1513<LI>
1514<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/004612.html">
1515How do we map group and user passwords onto the data that FreeS/WAN wants?
1516</A>
1517</LI>
1518-->
1519
1520<LI>
1521<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/015455.html">
1522Contivity does not send Distinguished Names in the order FS wants them (X.509).
1523</A>
1524</LI>
1525
1526<LI>
1527<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/03/msg00137.html">
1528Connections may time out after 30-40 minutes idle.</A>
1529</LI>
1530
1531</UL>
1532
1533<P>
1534<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/03/msg00137.html">
1535JJ Streicher-Bremer's mini HOWTO for old & new software. (PSK with two subnets)
1536</A><BR>
1537<A HREF="http://www.hsc.fr/ressources/ipsec/ipsec2001/#config">
1538French page with configs (X.509)</A>. This succeeds using the above X.509 tip.
1539</P>
1540
1541<!-- I could do more searching but this is a solid start. -->
1542
1543<P><A HREF="#nortel.top">Back to chart</A></P>
1544
1545
1546<H4><A NAME="radguard">Radguard</A></H4>
1547
1548<P>
1549<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/05/msg00009.html">
1550Marko Hausalo's configs (PSK).</A> Note: These do create a connection,
1551as you can see by "IPsec SA established".<BR>
1552
1553<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/???.html">
1554Claudia Schmeing's comments</A>
1555</P>
1556
1557<P><A HREF="#radguard.top">Back to chart</A></P>
1558
1559
1560<H4><A NAME="raptor">Raptor (NT or Solaris)</A></H4>
1561
1562<P>
1563
1564<UL>
1565<LI>Now known as Symantec Enterprise Firewall.</LI>
1566<LI>The Raptor does not normally come with X.509, but this may be available as
1567an add-on.</LI>
1568<LI><A HREF="http://lists.freeswan.org/pipermail/users/2002-May/010256.html">
1569Raptor requires alphanumberic PSK values, whereas FreeS/WAN uses hex.</A>
1570</LI>
1571<LI>Raptor's tunnel endpoint may be a host, subnet or group of subnets
1572(see
1573<A HREF="http://lists.freeswan.org/pipermail/design/2001-November/001295.html">
1574this message</A>
1575). FreeS/WAN cannot handle the group of subnets; you
1576must create separate connections for each in order to interoperate.</LI>
1577<LI>
1578<A HREF="http://lists.freeswan.org/pipermail/users/2002-May/010113.html">
1579Some versions of Raptor accept only single DES.
1580</A>
1581According to this German message,
1582<A HREF="http://radawana.cg.tuwien.ac.at/mail-archives/lll/200012/msg00065.html">
1583the Raptor Mobile Client demo offers single DES only.</A>
1584</LI>
1585</UL>
1586
1587<P>
1588<A HREF="http://lists.freeswan.org/pipermail/users/2002-January/006935.html">
1589Peter Mazinger's settings (PSK)</A><BR>
1590
1591<A HREF="http://lists.freeswan.org/pipermail/users/2001-November/005522.html">
1592Peter Gerland's configs (PSK)</A><BR>
1593
1594<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/07/msg00597.html">
1595Charles Griebel's configs (PSK).</A><BR>
1596
1597<A HREF="http://lists.freeswan.org/pipermail/users/2002-July/012275.html">
1598Lumir Srch's tips (PSK)
1599</A>
1600</P>
1601
1602<P>
1603<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/05/msg00214.html">
1604John Hardy's configs (Manual)</A><BR>
1605
1606<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/01/msg00236.html">
1607Older Raptors want 3DES keys in 3 parts (Manual).</A><BR>
1608
1609<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/06/msg00480.html">
1610Different keys for each direction? (Manual)</A><BR>
1611
1612</P>
1613
1614<P><A HREF="#raptor.top">Back to chart</A></P>
1615
1616
1617
1618<H4><A NAME="redcreek">Redcreek Ravlin</A></H4>
1619
1620<UL>
1621<LI>Known issue #1: The Ravlin expects a quick mode renegotiation right
1622after every Main Mode negotiation.
1623</LI>
1624<LI>
1625Known issue #2: The Ravlin tries to negotiate a zero
1626connection lifetime, which it takes to mean "infinite".
1627<A HREF="http://www.bear-cave.org.uk/linux/ravlin/">Jim Hague's patch</A>
1628addresses both issues.
1629</LI>
1630<LI>
1631<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/03/msg00191.html">
1632Interop works with Ravlin Firmware > 3.33. Includes tips (PSK).</A>
1633</LI>
1634</UL>
1635
1636<P><A HREF="#redcreek.top">Back to chart</A></P>
1637
1638
1639
1640<H4><A NAME="sonicwall">SonicWall</A></H4>
1641
1642<UL>
1643<LI><A HREF="http://lists.freeswan.org/pipermail/users/2001-June/000998.html">
1644Sonicwall cannot be used for Road Warrior setups</A></LI>
1645<LI>
1646At one point, <A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/05/msg00217.html">
1647only Sonicwall PRO supported triple DES</A>.</LI>
1648<LI>
1649<A HREF="http://lists.freeswan.org/pipermail/users/2002-March/008600.html">
1650Older Sonicwalls (before Nov 2001) feature Diffie Hellman group 1
1651only</A>.</LI>
1652</UL>
1653
1654<P>
1655<A HREF="http://www.xinit.cx/docs/freeswan.html">Paul Wouters' config (PSK)</A><BR>
1656<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/02/msg00073.html">
1657Dilan Arumainathan's configuration (PSK)</A><BR>
1658<A HREF="http://www.gravitas.co.uk/vpndebug">Dariush's setup... only opens
1659one way (PSK)</A><BR>
1660<A HREF="http://lists.freeswan.org/pipermail/users/2003-July/022302.html">
1661Andreas Steffen's tips (X.509)</A><BR>
1662
1663</P>
1664
1665<P><A HREF="#sonicwall.top">Back to chart</A></P>
1666
1667
1668
1669<H4><A NAME="sun">Sun Solaris</A></H4>
1670
1671<UL>
1672<LI>
1673Solaris 8+ has a native (in kernel) IPsec implementation.
1674</LI>
1675<LI>
1676<A HREF="http://lists.freeswan.org/pipermail/users/2002-May/010503.html">
1677Solaris does not seem to support tunnel mode, but you can make
1678IP-in-IP tunnels instead, like this.</A>
1679</LI>
1680</UL>
1681<P>
1682
1683<A HREF="http://lists.freeswan.org/pipermail/users/2003-June/022216.html">Reports of some successful interops</A> from a fellow @sun.com.
1684See also <A HREF="http://lists.freeswan.org/pipermail/users/2003-July/022247.html">these follow up posts</A>.<BR>
1685<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/03/msg00332.html">
1686Aleks Shenkman's configs (Manual in transport mode)
1687</A><BR>
1688<!--sparc 64 stuff goes where?-->
1689</P>
1690
1691<P><A HREF="#solaris.top">Back to chart</A></P>
1692
1693
1694
1695<H4><A NAME="symantec">Symantec</A></H4>
1696
1697<UL>
1698<LI>The Raptor, covered <A HREF="#raptor">above</A>, is now known as
1699Symantec Enterprise Firewall.</LI>
1700<LI>Symantec's "distinguished name" is a KEY_ID. See Andreas Steffen's post,
1701below.</LI>
1702</UL>
1703
1704<P><A HREF="http://lists.freeswan.org/pipermail/users/2002-April/009037.html">
1705Andreas Steffen's configs for Symantec 200R (PSK)</A>
1706</P>
1707
1708<P><A HREF="#symantec.top">Back to chart</A></P>
1709
1710
1711
1712
1713<H4><A NAME="watchguard">Watchguard Firebox</A></H4>
1714
1715<UL>
1716<LI>Automatic keying works with WatchGuard 5.0+ only.</LI>
1717<LI>Seen to interoperate with WatchGuard 1000, II, III; firmware v. 5, 6..</LI>
1718<LI>For manual keying, Watchguard's Policy Manager expects SPI numbers and
1719encryption and authentication keys in decimal (not hex).</LI>
1720</UL>
1721
1722<P>
1723<A HREF="http://lists.freeswan.org/pipermail/users/2002-July/012595.html">
1724WatchGuard's HOWTO (PSK)</A><BR>
1725<A HREF="http://lists.freeswan.org/pipermail/users/2002-August/013342.html">
1726Ronald C. Riviera's Settings (PSK)</A><BR>
1727<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00179.html">
1728Walter Wickersham's Notes (PSK)</A><BR>
1729
1730<A HREF="http://lists.freeswan.org/pipermail/users/2002-October/015587.html">
1731Max Enders' Configs (Manual)</A>
1732</P>
1733
1734<P>
1735<A HREF="http://lists.freeswan.org/pipermail/users/2002-April/009404.html">
1736Old known issue with auto keying</A><BR>
1737
1738<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/02/msg00124.html">
1739Tips on key generation and format (Manual)</A><BR>
1740</P>
1741
1742<P><A HREF="#watchguard.top">Back to chart</A></P>
1743
1744
1745
1746<H4><A NAME="xedia">Xedia Access Point/QVPN</A></H4>
1747
1748<P>
1749<A HREF="http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2001/12/msg00520.html">
1750Hybrid IPsec/L2TP connection settings (X.509)
1751</A><BR>
1752<A HREF="http://www.sandelman.ottawa.on.ca/ipsec/1999/08/msg00140.html">
1753 Xedia's LAN-LAN links don't use multiple tunnels
1754</A><BR>
1755&nbsp;&nbsp;&nbsp;&nbsp;
1756<A HREF="http://www.sandelman.ottawa.on.ca/ipsec/1999/08/msg00140.html">
1757 That explanation, continued
1758</A>
1759</P>
1760
1761<P><A HREF="#xedia.top">Back to chart</A></P>
1762
1763
1764
1765<H4><A NAME="zyxel">Zyxel</A></H4>
1766
1767<UL>
1768<LI>The Zyxel Zywall is a rebranded SSH Sentinel box. See also our section
1769on <A HREF="#ssh">SSH</A>.</LI>
1770<LI>There seems to be a problem with keeping this connection alive. This is
1771caused at the Zyxel end. See this brief
1772<A HREF="http://lists.freeswan.org/archives/users/2003-October/msg00141.html">
1773discussion and solution.
1774</A>
1775</LI>
1776</UL>
1777<P>
1778<A HREF="http://www.zyxel.com/support/supportnote/zywall/app/zw_freeswan.htm">
1779Zyxel's Zywall to FreeS/WAN instructions (PSK)</A><BR>
1780<A HREF="http://www.zyxel.com/support/supportnote/p652/app/zw_freeswan.htm">
1781Zyxel's Prestige to FreeS/WAN instructions (PSK)</A>. Note: not all Prestige
1782versions include VPN software.<BR>
1783
1784<A HREF="http://www.lancry.net/techdocs/freeswan-zyxel.txt">Fabrice Cahen's
1785 HOWTO (PSK)</A><BR>
1786&nbsp;&nbsp;&nbsp;&nbsp;
1787</P>
1788
1789<P><A HREF="#zyxel.top">Back to chart</A></P>
1790
1791
1792
1793<!-- SAMPLE ENTRY
1794
1795<H4><A NAME="timestep">Timestep</A></H4>
1796
1797<P>Text goes here.
1798</P>
1799
1800-->
1801</BODY></HTML>
1802