Red Hat ENTERPRISE LINUX 5 - DEPLOYMENT Deployment Manual page 719

Hide thumbs Also See for ENTERPRISE LINUX 5 - DEPLOYMENT:
Table of Contents

Advertisement

• If manual encryption was selected in step 6, specify the encryption key to use or click Generate
to create one.
Specify an authentication key or click Generate to generate one. This key can be any
combination of numbers and letters.
Click Forward to continue.
Figure 43.14. Remote Network Information
9. Verify the information on the IPsec — Summary page, and then click Apply.
10. Select File > Save to save the configuration.
11. Select the IPsec connection from the list, and then click Activate to activate the connection.
12. Enable IP forwarding:
a. Edit /etc/sysctl.conf and set net.ipv4.ip_forward to 1.
b. Use the following command to enable the change:
[root@myServer ~]# /sbin/sysctl -p /etc/sysctl.conf
The network script to activate the IPsec connection automatically creates network routes to send
packets through the IPsec router if necessary.
43.7.7.2. Manual IPsec Network-to-Network Configuration
Suppose LAN A (lana.example.com) and LAN B (lanb.example.com) want to connect to each other
through an IPsec tunnel. The network address for LAN A is in the 192.168.1.0/24 range, while
LAN B uses the 192.168.2.0/24 range. The gateway IP address is 192.168.1.254 for LAN A and
IPsec Network-to-Network Configuration
693

Advertisement

Table of Contents
loading

Table of Contents