<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="es">
	<id>https://wiki.cure.edu.uy/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marcos</id>
	<title>CURE - Informática - Contribuciones del usuario [es]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.cure.edu.uy/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marcos"/>
	<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=Especial:Contribuciones/Marcos"/>
	<updated>2026-04-30T22:44:36Z</updated>
	<subtitle>Contribuciones del usuario</subtitle>
	<generator>MediaWiki 1.35.14</generator>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=753</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=753"/>
		<updated>2011-07-03T17:26:38Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plain IPSec&lt;br /&gt;
&lt;br /&gt;
Esta configuración asume un router OpenWRT con conexión a Internet y con IP dinámica, conectando a un sitio central con una dirección IP fija. El objetivo es la creación de IPSEC entre los dos sitios para la red local y / o Wi-Fi conectado al router OpenWRT, que puede hablar a la LAN conectada a la central de gateway IPSEC. Para la configuración de ejemplo se supone la siguiente configuración:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
central site IP address 	1.2.3.4&lt;br /&gt;
&lt;br /&gt;
central site LAN 	192.168.2.0/24&lt;br /&gt;
&lt;br /&gt;
central site name 	central.site.vpn&lt;br /&gt;
&lt;br /&gt;
road warrior LAN 	192.168.1.0/24&lt;br /&gt;
&lt;br /&gt;
road warrior email 	road@warrior.vpn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Optionally devide wireless from wired network&lt;br /&gt;
&lt;br /&gt;
If LAN and WIFI should be handled differently by the central site, it makes sense to seperate them and use two differnet IPSEC tunnels.&lt;br /&gt;
Install openswan&lt;br /&gt;
&lt;br /&gt;
ipkg install openswan kmod-openswan ntpclient&lt;br /&gt;
&lt;br /&gt;
Configuration&lt;br /&gt;
&lt;br /&gt;
In this example, a configuration using a X.509 PKI is being used. Shared key is not really useful for road warrior setups, as it would require all road warriors to use the same shared key.&lt;br /&gt;
Create CA and certificates for all gateways&lt;br /&gt;
&lt;br /&gt;
In this example, the hostname is used as common name for the central station and the email address for the road warrior. Some hints on how to use openssl to manage a PKI can be found at http://www.natecarlson.com/linux/ipsec-x509.php or http://freifunk.net/wiki/X509&lt;br /&gt;
&lt;br /&gt;
On the OpenWRT box, copy the CA certificate to /etc/ipsec.d/cacerts/cacert.pem, the road warrior certificate to /etc/ipsec.d/certs/roadwarrior.pem and the private key to /etc/ipsec.d/private/roadwarriorkey.pem&lt;br /&gt;
Create /etc/ipsec.conf&lt;br /&gt;
&lt;br /&gt;
Un ejemplo de configuración es:&lt;br /&gt;
&lt;br /&gt;
version 2.0     # conforms to second version of ipsec.conf specification&lt;br /&gt;
&lt;br /&gt;
# basic configuration&lt;br /&gt;
config setup&lt;br /&gt;
        # plutodebug / klipsdebug = &amp;quot;all&amp;quot;, &amp;quot;none&amp;quot; or a combation from below:&lt;br /&gt;
        # &amp;quot;raw crypt parsing emitting control klips pfkey natt x509 private&amp;quot;&lt;br /&gt;
        # eg:&lt;br /&gt;
        plutodebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        klipsdebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        #&lt;br /&gt;
        # Only enable klipsdebug=all if you are a developer&lt;br /&gt;
        #&lt;br /&gt;
        # NAT-TRAVERSAL support, see README.NAT-Traversal&lt;br /&gt;
        nat_traversal=no&lt;br /&gt;
        # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12&lt;br /&gt;
        interfaces=%defaultroute&lt;br /&gt;
&lt;br /&gt;
conn central&lt;br /&gt;
        authby=rsasig&lt;br /&gt;
        esp=aes-sha1&lt;br /&gt;
        right=1.2.3.4&lt;br /&gt;
        rightsubnet=192.168.2.0/24&lt;br /&gt;
        rightrsasigkey=%cert&lt;br /&gt;
        rightid=@central.site.vpn&lt;br /&gt;
        left=%defaultroute&lt;br /&gt;
        leftsubnet=192.168.1.0/24&lt;br /&gt;
        leftrsasigkey=%cert&lt;br /&gt;
        leftid=road@warrior.vpn&lt;br /&gt;
        leftcert=roadwarrior.pem&lt;br /&gt;
        dpddelay=5&lt;br /&gt;
        dpdtimeout=15&lt;br /&gt;
        dpdaction=restart&lt;br /&gt;
        auto=start&lt;br /&gt;
        #keylife=20m&lt;br /&gt;
        keyingtries=%forever&lt;br /&gt;
&lt;br /&gt;
#Disable Opportunistic Encryption&lt;br /&gt;
include /etc/ipsec.d/examples/no_oe.conf&lt;br /&gt;
&lt;br /&gt;
Create /etc/ipsec.secrets&lt;br /&gt;
&lt;br /&gt;
This file contains the name of the private key file and the passphrase needed to open the file:&lt;br /&gt;
&lt;br /&gt;
: RSA roadwarriorkey.pem &amp;quot;passphrase&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
&lt;br /&gt;
Make sure the permissions of /etc/ipsec.secrets and /etc/ipsec.d/private/* allow read access only to root (chmod 400).&lt;br /&gt;
Hotplug&lt;br /&gt;
&lt;br /&gt;
Configure the hotplug system to start and stop OpenSWAN each time the DSL connection is cut off by the provider:&lt;br /&gt;
&lt;br /&gt;
/etc/hotplug.d/iface/30-ipsec&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$PROTO&amp;quot; != &amp;quot;ppp&amp;quot; ]; then exit; fi&lt;br /&gt;
&lt;br /&gt;
USER=root&lt;br /&gt;
export USER&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$ACTION&amp;quot; in&lt;br /&gt;
        ifup)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec start&lt;br /&gt;
                ;;&lt;br /&gt;
        ifdown)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec stop&lt;br /&gt;
                ;;&lt;br /&gt;
esac&lt;br /&gt;
&lt;br /&gt;
Firewall&lt;br /&gt;
&lt;br /&gt;
Make sure to open your firewall for ESP and ISAKMP traffic (and maybe NAT-T if your setup requires nat-traversal) and disable NAT for the LAN of the central site:&lt;br /&gt;
&lt;br /&gt;
Example /etc/firewall.user:&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p esp -s 1.2.3.4              -j ACCEPT  # allow IPSEC&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 500  -j ACCEPT  # allow ISAKMP&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 4500 -j ACCEPT  # allow NAT-T&lt;br /&gt;
&lt;br /&gt;
iptables -t nat -A postrouting_rule -d 192.168.2.0/24 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow any traffic between road warrior LAN and central LAN&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i $LAN -o ipsec0 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i ipsec0 -o $LAN -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bugfix (for RC4)&lt;br /&gt;
&lt;br /&gt;
As of Whiterussian RC4, to fix a bug replace /etc/hotplug.d/iface/10-ntpclient by https://dev.openwrt.org/file/trunk/openwrt/package/ntpclient/files/ntpclient.init.&lt;br /&gt;
Startup files&lt;br /&gt;
&lt;br /&gt;
Optionally remove /etc/init.d/60ipsec, as this script is not really needed in this setup.&lt;br /&gt;
Speed&lt;br /&gt;
&lt;br /&gt;
Depending on the encryption (esp=) the following transfer rates might be achieved:&lt;br /&gt;
&lt;br /&gt;
aes-sha1 	160kb/s&lt;br /&gt;
&lt;br /&gt;
3des-sha1 	230kb/s&lt;br /&gt;
&lt;br /&gt;
des-sha1	260kb/s&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=752</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=752"/>
		<updated>2011-07-03T17:24:08Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plain IPSec&lt;br /&gt;
&lt;br /&gt;
Esta configuración asume un router OpenWRT con conexión a Internet y con IP dinámica, conectando a un sitio central con una dirección IP fija. El objetivo es la creación de IPSEC entre los dos sitios para la red local y / o Wi-Fi conectado al router OpenWRT, que puede hablar a la LAN conectada a la central de gateway IPSEC. Para la configuración de ejemplo se supone la siguiente configuración:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
central site IP address 	1.2.3.4&lt;br /&gt;
&lt;br /&gt;
central site LAN 	192.168.2.0/24&lt;br /&gt;
&lt;br /&gt;
central site name 	central.site.vpn&lt;br /&gt;
&lt;br /&gt;
road warrior LAN 	192.168.1.0/24&lt;br /&gt;
&lt;br /&gt;
road warrior email 	road@warrior.vpn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Optionally devide wireless from wired network&lt;br /&gt;
&lt;br /&gt;
If LAN and WIFI should be handled differently by the central site, it makes sense to seperate them and use two differnet IPSEC tunnels.&lt;br /&gt;
Install openswan&lt;br /&gt;
&lt;br /&gt;
ipkg install openswan kmod-openswan ntpclient&lt;br /&gt;
&lt;br /&gt;
Configuration&lt;br /&gt;
&lt;br /&gt;
In this example, a configuration using a X.509 PKI is being used. Shared key is not really useful for road warrior setups, as it would require all road warriors to use the same shared key.&lt;br /&gt;
Create CA and certificates for all gateways&lt;br /&gt;
&lt;br /&gt;
In this example, the hostname is used as common name for the central station and the email address for the road warrior. Some hints on how to use openssl to manage a PKI can be found at http://www.natecarlson.com/linux/ipsec-x509.php or http://freifunk.net/wiki/X509&lt;br /&gt;
&lt;br /&gt;
On the OpenWRT box, copy the CA certificate to /etc/ipsec.d/cacerts/cacert.pem, the road warrior certificate to /etc/ipsec.d/certs/roadwarrior.pem and the private key to /etc/ipsec.d/private/roadwarriorkey.pem&lt;br /&gt;
Create /etc/ipsec.conf&lt;br /&gt;
&lt;br /&gt;
A sample configuration is:&lt;br /&gt;
&lt;br /&gt;
version 2.0     # conforms to second version of ipsec.conf specification&lt;br /&gt;
&lt;br /&gt;
# basic configuration&lt;br /&gt;
config setup&lt;br /&gt;
        # plutodebug / klipsdebug = &amp;quot;all&amp;quot;, &amp;quot;none&amp;quot; or a combation from below:&lt;br /&gt;
        # &amp;quot;raw crypt parsing emitting control klips pfkey natt x509 private&amp;quot;&lt;br /&gt;
        # eg:&lt;br /&gt;
        plutodebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        klipsdebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        #&lt;br /&gt;
        # Only enable klipsdebug=all if you are a developer&lt;br /&gt;
        #&lt;br /&gt;
        # NAT-TRAVERSAL support, see README.NAT-Traversal&lt;br /&gt;
        nat_traversal=no&lt;br /&gt;
        # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12&lt;br /&gt;
        interfaces=%defaultroute&lt;br /&gt;
&lt;br /&gt;
conn central&lt;br /&gt;
        authby=rsasig&lt;br /&gt;
        esp=aes-sha1&lt;br /&gt;
        right=1.2.3.4&lt;br /&gt;
        rightsubnet=192.168.2.0/24&lt;br /&gt;
        rightrsasigkey=%cert&lt;br /&gt;
        rightid=@central.site.vpn&lt;br /&gt;
        left=%defaultroute&lt;br /&gt;
        leftsubnet=192.168.1.0/24&lt;br /&gt;
        leftrsasigkey=%cert&lt;br /&gt;
        leftid=road@warrior.vpn&lt;br /&gt;
        leftcert=roadwarrior.pem&lt;br /&gt;
        dpddelay=5&lt;br /&gt;
        dpdtimeout=15&lt;br /&gt;
        dpdaction=restart&lt;br /&gt;
        auto=start&lt;br /&gt;
        #keylife=20m&lt;br /&gt;
        keyingtries=%forever&lt;br /&gt;
&lt;br /&gt;
#Disable Opportunistic Encryption&lt;br /&gt;
include /etc/ipsec.d/examples/no_oe.conf&lt;br /&gt;
&lt;br /&gt;
Create /etc/ipsec.secrets&lt;br /&gt;
&lt;br /&gt;
This file contains the name of the private key file and the passphrase needed to open the file:&lt;br /&gt;
&lt;br /&gt;
: RSA roadwarriorkey.pem &amp;quot;passphrase&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
&lt;br /&gt;
Make sure the permissions of /etc/ipsec.secrets and /etc/ipsec.d/private/* allow read access only to root (chmod 400).&lt;br /&gt;
Hotplug&lt;br /&gt;
&lt;br /&gt;
Configure the hotplug system to start and stop OpenSWAN each time the DSL connection is cut off by the provider:&lt;br /&gt;
&lt;br /&gt;
/etc/hotplug.d/iface/30-ipsec&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$PROTO&amp;quot; != &amp;quot;ppp&amp;quot; ]; then exit; fi&lt;br /&gt;
&lt;br /&gt;
USER=root&lt;br /&gt;
export USER&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$ACTION&amp;quot; in&lt;br /&gt;
        ifup)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec start&lt;br /&gt;
                ;;&lt;br /&gt;
        ifdown)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec stop&lt;br /&gt;
                ;;&lt;br /&gt;
esac&lt;br /&gt;
&lt;br /&gt;
Firewall&lt;br /&gt;
&lt;br /&gt;
Make sure to open your firewall for ESP and ISAKMP traffic (and maybe NAT-T if your setup requires nat-traversal) and disable NAT for the LAN of the central site:&lt;br /&gt;
&lt;br /&gt;
Example /etc/firewall.user:&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p esp -s 1.2.3.4              -j ACCEPT  # allow IPSEC&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 500  -j ACCEPT  # allow ISAKMP&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 4500 -j ACCEPT  # allow NAT-T&lt;br /&gt;
&lt;br /&gt;
iptables -t nat -A postrouting_rule -d 192.168.2.0/24 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow any traffic between road warrior LAN and central LAN&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i $LAN -o ipsec0 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i ipsec0 -o $LAN -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bugfix (for RC4)&lt;br /&gt;
&lt;br /&gt;
As of Whiterussian RC4, to fix a bug replace /etc/hotplug.d/iface/10-ntpclient by https://dev.openwrt.org/file/trunk/openwrt/package/ntpclient/files/ntpclient.init.&lt;br /&gt;
Startup files&lt;br /&gt;
&lt;br /&gt;
Optionally remove /etc/init.d/60ipsec, as this script is not really needed in this setup.&lt;br /&gt;
Speed&lt;br /&gt;
&lt;br /&gt;
Depending on the encryption (esp=) the following transfer rates might be achieved:&lt;br /&gt;
&lt;br /&gt;
aes-sha1 	160kb/s&lt;br /&gt;
&lt;br /&gt;
3des-sha1 	230kb/s&lt;br /&gt;
&lt;br /&gt;
des-sha1	260kb/s&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=751</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=751"/>
		<updated>2011-07-01T21:22:49Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plain IPSec&lt;br /&gt;
&lt;br /&gt;
This configuration assumes an OpenWRT router with dynamic Internet connection using DSL and a central site with fixed IP addresses (typical road warrior scenario). The goal is to set up IPSEC between both sites so the LAN and/or WIFI connected to the OpenWRT router can talk to the LAN connected to the central IPSEC gatway. For the sample configuration we assume the following setup:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
central site IP address 	1.2.3.4&lt;br /&gt;
&lt;br /&gt;
central site LAN 	192.168.2.0/24&lt;br /&gt;
&lt;br /&gt;
central site name 	central.site.vpn&lt;br /&gt;
&lt;br /&gt;
road warrior LAN 	192.168.1.0/24&lt;br /&gt;
&lt;br /&gt;
road warrior email 	road@warrior.vpn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Optionally devide wireless from wired network&lt;br /&gt;
&lt;br /&gt;
If LAN and WIFI should be handled differently by the central site, it makes sense to seperate them and use two differnet IPSEC tunnels.&lt;br /&gt;
Install openswan&lt;br /&gt;
&lt;br /&gt;
ipkg install openswan kmod-openswan ntpclient&lt;br /&gt;
&lt;br /&gt;
Configuration&lt;br /&gt;
&lt;br /&gt;
In this example, a configuration using a X.509 PKI is being used. Shared key is not really useful for road warrior setups, as it would require all road warriors to use the same shared key.&lt;br /&gt;
Create CA and certificates for all gateways&lt;br /&gt;
&lt;br /&gt;
In this example, the hostname is used as common name for the central station and the email address for the road warrior. Some hints on how to use openssl to manage a PKI can be found at http://www.natecarlson.com/linux/ipsec-x509.php or http://freifunk.net/wiki/X509&lt;br /&gt;
&lt;br /&gt;
On the OpenWRT box, copy the CA certificate to /etc/ipsec.d/cacerts/cacert.pem, the road warrior certificate to /etc/ipsec.d/certs/roadwarrior.pem and the private key to /etc/ipsec.d/private/roadwarriorkey.pem&lt;br /&gt;
Create /etc/ipsec.conf&lt;br /&gt;
&lt;br /&gt;
A sample configuration is:&lt;br /&gt;
&lt;br /&gt;
version 2.0     # conforms to second version of ipsec.conf specification&lt;br /&gt;
&lt;br /&gt;
# basic configuration&lt;br /&gt;
config setup&lt;br /&gt;
        # plutodebug / klipsdebug = &amp;quot;all&amp;quot;, &amp;quot;none&amp;quot; or a combation from below:&lt;br /&gt;
        # &amp;quot;raw crypt parsing emitting control klips pfkey natt x509 private&amp;quot;&lt;br /&gt;
        # eg:&lt;br /&gt;
        plutodebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        klipsdebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        #&lt;br /&gt;
        # Only enable klipsdebug=all if you are a developer&lt;br /&gt;
        #&lt;br /&gt;
        # NAT-TRAVERSAL support, see README.NAT-Traversal&lt;br /&gt;
        nat_traversal=no&lt;br /&gt;
        # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12&lt;br /&gt;
        interfaces=%defaultroute&lt;br /&gt;
&lt;br /&gt;
conn central&lt;br /&gt;
        authby=rsasig&lt;br /&gt;
        esp=aes-sha1&lt;br /&gt;
        right=1.2.3.4&lt;br /&gt;
        rightsubnet=192.168.2.0/24&lt;br /&gt;
        rightrsasigkey=%cert&lt;br /&gt;
        rightid=@central.site.vpn&lt;br /&gt;
        left=%defaultroute&lt;br /&gt;
        leftsubnet=192.168.1.0/24&lt;br /&gt;
        leftrsasigkey=%cert&lt;br /&gt;
        leftid=road@warrior.vpn&lt;br /&gt;
        leftcert=roadwarrior.pem&lt;br /&gt;
        dpddelay=5&lt;br /&gt;
        dpdtimeout=15&lt;br /&gt;
        dpdaction=restart&lt;br /&gt;
        auto=start&lt;br /&gt;
        #keylife=20m&lt;br /&gt;
        keyingtries=%forever&lt;br /&gt;
&lt;br /&gt;
#Disable Opportunistic Encryption&lt;br /&gt;
include /etc/ipsec.d/examples/no_oe.conf&lt;br /&gt;
&lt;br /&gt;
Create /etc/ipsec.secrets&lt;br /&gt;
&lt;br /&gt;
This file contains the name of the private key file and the passphrase needed to open the file:&lt;br /&gt;
&lt;br /&gt;
: RSA roadwarriorkey.pem &amp;quot;passphrase&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
&lt;br /&gt;
Make sure the permissions of /etc/ipsec.secrets and /etc/ipsec.d/private/* allow read access only to root (chmod 400).&lt;br /&gt;
Hotplug&lt;br /&gt;
&lt;br /&gt;
Configure the hotplug system to start and stop OpenSWAN each time the DSL connection is cut off by the provider:&lt;br /&gt;
&lt;br /&gt;
/etc/hotplug.d/iface/30-ipsec&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$PROTO&amp;quot; != &amp;quot;ppp&amp;quot; ]; then exit; fi&lt;br /&gt;
&lt;br /&gt;
USER=root&lt;br /&gt;
export USER&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$ACTION&amp;quot; in&lt;br /&gt;
        ifup)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec start&lt;br /&gt;
                ;;&lt;br /&gt;
        ifdown)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec stop&lt;br /&gt;
                ;;&lt;br /&gt;
esac&lt;br /&gt;
&lt;br /&gt;
Firewall&lt;br /&gt;
&lt;br /&gt;
Make sure to open your firewall for ESP and ISAKMP traffic (and maybe NAT-T if your setup requires nat-traversal) and disable NAT for the LAN of the central site:&lt;br /&gt;
&lt;br /&gt;
Example /etc/firewall.user:&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p esp -s 1.2.3.4              -j ACCEPT  # allow IPSEC&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 500  -j ACCEPT  # allow ISAKMP&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 4500 -j ACCEPT  # allow NAT-T&lt;br /&gt;
&lt;br /&gt;
iptables -t nat -A postrouting_rule -d 192.168.2.0/24 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow any traffic between road warrior LAN and central LAN&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i $LAN -o ipsec0 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
#iptables -A forwarding_rule -i ipsec0 -o $LAN -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bugfix (for RC4)&lt;br /&gt;
&lt;br /&gt;
As of Whiterussian RC4, to fix a bug replace /etc/hotplug.d/iface/10-ntpclient by https://dev.openwrt.org/file/trunk/openwrt/package/ntpclient/files/ntpclient.init.&lt;br /&gt;
Startup files&lt;br /&gt;
&lt;br /&gt;
Optionally remove /etc/init.d/60ipsec, as this script is not really needed in this setup.&lt;br /&gt;
Speed&lt;br /&gt;
&lt;br /&gt;
Depending on the encryption (esp=) the following transfer rates might be achieved:&lt;br /&gt;
&lt;br /&gt;
aes-sha1 	160kb/s&lt;br /&gt;
&lt;br /&gt;
3des-sha1 	230kb/s&lt;br /&gt;
&lt;br /&gt;
des-sha1	260kb/s&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=750</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=750"/>
		<updated>2011-07-01T21:21:12Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plain IPSec&lt;br /&gt;
&lt;br /&gt;
This configuration assumes an OpenWRT router with dynamic Internet connection using DSL and a central site with fixed IP addresses (typical road warrior scenario). The goal is to set up IPSEC between both sites so the LAN and/or WIFI connected to the OpenWRT router can talk to the LAN connected to the central IPSEC gatway. For the sample configuration we assume the following setup:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
central site IP address 	1.2.3.4&lt;br /&gt;
&lt;br /&gt;
central site LAN 	192.168.2.0/24&lt;br /&gt;
&lt;br /&gt;
central site name 	central.site.vpn&lt;br /&gt;
&lt;br /&gt;
road warrior LAN 	192.168.1.0/24&lt;br /&gt;
&lt;br /&gt;
road warrior email 	road@warrior.vpn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Optionally devide wireless from wired network&lt;br /&gt;
&lt;br /&gt;
If LAN and WIFI should be handled differently by the central site, it makes sense to seperate them and use two differnet IPSEC tunnels.&lt;br /&gt;
Install openswan&lt;br /&gt;
&lt;br /&gt;
ipkg install openswan kmod-openswan ntpclient&lt;br /&gt;
&lt;br /&gt;
Configuration&lt;br /&gt;
&lt;br /&gt;
In this example, a configuration using a X.509 PKI is being used. Shared key is not really useful for road warrior setups, as it would require all road warriors to use the same shared key.&lt;br /&gt;
Create CA and certificates for all gateways&lt;br /&gt;
&lt;br /&gt;
In this example, the hostname is used as common name for the central station and the email address for the road warrior. Some hints on how to use openssl to manage a PKI can be found at http://www.natecarlson.com/linux/ipsec-x509.php or http://freifunk.net/wiki/X509&lt;br /&gt;
&lt;br /&gt;
On the OpenWRT box, copy the CA certificate to /etc/ipsec.d/cacerts/cacert.pem, the road warrior certificate to /etc/ipsec.d/certs/roadwarrior.pem and the private key to /etc/ipsec.d/private/roadwarriorkey.pem&lt;br /&gt;
Create /etc/ipsec.conf&lt;br /&gt;
&lt;br /&gt;
A sample configuration is:&lt;br /&gt;
&lt;br /&gt;
version 2.0     # conforms to second version of ipsec.conf specification&lt;br /&gt;
&lt;br /&gt;
# basic configuration&lt;br /&gt;
config setup&lt;br /&gt;
        # plutodebug / klipsdebug = &amp;quot;all&amp;quot;, &amp;quot;none&amp;quot; or a combation from below:&lt;br /&gt;
        # &amp;quot;raw crypt parsing emitting control klips pfkey natt x509 private&amp;quot;&lt;br /&gt;
        # eg:&lt;br /&gt;
        plutodebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        klipsdebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        #&lt;br /&gt;
        # Only enable klipsdebug=all if you are a developer&lt;br /&gt;
        #&lt;br /&gt;
        # NAT-TRAVERSAL support, see README.NAT-Traversal&lt;br /&gt;
        nat_traversal=no&lt;br /&gt;
        # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12&lt;br /&gt;
        interfaces=%defaultroute&lt;br /&gt;
&lt;br /&gt;
conn central&lt;br /&gt;
        authby=rsasig&lt;br /&gt;
        esp=aes-sha1&lt;br /&gt;
        right=1.2.3.4&lt;br /&gt;
        rightsubnet=192.168.2.0/24&lt;br /&gt;
        rightrsasigkey=%cert&lt;br /&gt;
        rightid=@central.site.vpn&lt;br /&gt;
        left=%defaultroute&lt;br /&gt;
        leftsubnet=192.168.1.0/24&lt;br /&gt;
        leftrsasigkey=%cert&lt;br /&gt;
        leftid=road@warrior.vpn&lt;br /&gt;
        leftcert=roadwarrior.pem&lt;br /&gt;
        dpddelay=5&lt;br /&gt;
        dpdtimeout=15&lt;br /&gt;
        dpdaction=restart&lt;br /&gt;
        auto=start&lt;br /&gt;
        #keylife=20m&lt;br /&gt;
        keyingtries=%forever&lt;br /&gt;
&lt;br /&gt;
#Disable Opportunistic Encryption&lt;br /&gt;
include /etc/ipsec.d/examples/no_oe.conf&lt;br /&gt;
&lt;br /&gt;
Create /etc/ipsec.secrets&lt;br /&gt;
&lt;br /&gt;
This file contains the name of the private key file and the passphrase needed to open the file:&lt;br /&gt;
&lt;br /&gt;
: RSA roadwarriorkey.pem &amp;quot;passphrase&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
&lt;br /&gt;
Make sure the permissions of /etc/ipsec.secrets and /etc/ipsec.d/private/* allow read access only to root (chmod 400).&lt;br /&gt;
Hotplug&lt;br /&gt;
&lt;br /&gt;
Configure the hotplug system to start and stop OpenSWAN each time the DSL connection is cut off by the provider:&lt;br /&gt;
&lt;br /&gt;
/etc/hotplug.d/iface/30-ipsec&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$PROTO&amp;quot; != &amp;quot;ppp&amp;quot; ]; then exit; fi&lt;br /&gt;
&lt;br /&gt;
USER=root&lt;br /&gt;
export USER&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$ACTION&amp;quot; in&lt;br /&gt;
        ifup)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec start&lt;br /&gt;
                ;;&lt;br /&gt;
        ifdown)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec stop&lt;br /&gt;
                ;;&lt;br /&gt;
esac&lt;br /&gt;
&lt;br /&gt;
Firewall&lt;br /&gt;
&lt;br /&gt;
Make sure to open your firewall for ESP and ISAKMP traffic (and maybe NAT-T if your setup requires nat-traversal) and disable NAT for the LAN of the central site:&lt;br /&gt;
&lt;br /&gt;
Example /etc/firewall.user:&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p esp -s 1.2.3.4              -j ACCEPT  # allow IPSEC&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 500  -j ACCEPT  # allow ISAKMP&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 4500 -j ACCEPT  # allow NAT-T&lt;br /&gt;
iptables -t nat -A postrouting_rule -d 192.168.2.0/24 -j ACCEPT&lt;br /&gt;
# Allow any traffic between road warrior LAN and central LAN&lt;br /&gt;
#iptables -A forwarding_rule -i $LAN -o ipsec0 -j ACCEPT&lt;br /&gt;
#iptables -A forwarding_rule -i ipsec0 -o $LAN -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
Bugfix (for RC4)&lt;br /&gt;
&lt;br /&gt;
As of Whiterussian RC4, to fix a bug replace /etc/hotplug.d/iface/10-ntpclient by https://dev.openwrt.org/file/trunk/openwrt/package/ntpclient/files/ntpclient.init.&lt;br /&gt;
Startup files&lt;br /&gt;
&lt;br /&gt;
Optionally remove /etc/init.d/60ipsec, as this script is not really needed in this setup.&lt;br /&gt;
Speed&lt;br /&gt;
&lt;br /&gt;
Depending on the encryption (esp=) the following transfer rates might be achieved:&lt;br /&gt;
aes-sha1 	160kb/s&lt;br /&gt;
3des-sha1 	230kb/s&lt;br /&gt;
des-sha1	260kb/s&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=749</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=749"/>
		<updated>2011-07-01T21:20:11Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plain IPSec&lt;br /&gt;
&lt;br /&gt;
This configuration assumes an OpenWRT router with dynamic Internet connection using DSL and a central site with fixed IP addresses (typical road warrior scenario). The goal is to set up IPSEC between both sites so the LAN and/or WIFI connected to the OpenWRT router can talk to the LAN connected to the central IPSEC gatway. For the sample configuration we assume the following setup:&lt;br /&gt;
central site IP address 	1.2.3.4&lt;br /&gt;
central site LAN 	192.168.2.0/24&lt;br /&gt;
central site name 	central.site.vpn&lt;br /&gt;
road warrior LAN 	192.168.1.0/24&lt;br /&gt;
road warrior email 	road@warrior.vpn&lt;br /&gt;
Optionally devide wireless from wired network&lt;br /&gt;
&lt;br /&gt;
If LAN and WIFI should be handled differently by the central site, it makes sense to seperate them and use two differnet IPSEC tunnels.&lt;br /&gt;
Install openswan&lt;br /&gt;
&lt;br /&gt;
ipkg install openswan kmod-openswan ntpclient&lt;br /&gt;
&lt;br /&gt;
Configuration&lt;br /&gt;
&lt;br /&gt;
In this example, a configuration using a X.509 PKI is being used. Shared key is not really useful for road warrior setups, as it would require all road warriors to use the same shared key.&lt;br /&gt;
Create CA and certificates for all gateways&lt;br /&gt;
&lt;br /&gt;
In this example, the hostname is used as common name for the central station and the email address for the road warrior. Some hints on how to use openssl to manage a PKI can be found at http://www.natecarlson.com/linux/ipsec-x509.php or http://freifunk.net/wiki/X509&lt;br /&gt;
&lt;br /&gt;
On the OpenWRT box, copy the CA certificate to /etc/ipsec.d/cacerts/cacert.pem, the road warrior certificate to /etc/ipsec.d/certs/roadwarrior.pem and the private key to /etc/ipsec.d/private/roadwarriorkey.pem&lt;br /&gt;
Create /etc/ipsec.conf&lt;br /&gt;
&lt;br /&gt;
A sample configuration is:&lt;br /&gt;
&lt;br /&gt;
version 2.0     # conforms to second version of ipsec.conf specification&lt;br /&gt;
&lt;br /&gt;
# basic configuration&lt;br /&gt;
config setup&lt;br /&gt;
        # plutodebug / klipsdebug = &amp;quot;all&amp;quot;, &amp;quot;none&amp;quot; or a combation from below:&lt;br /&gt;
        # &amp;quot;raw crypt parsing emitting control klips pfkey natt x509 private&amp;quot;&lt;br /&gt;
        # eg:&lt;br /&gt;
        plutodebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        klipsdebug=&amp;quot;none&amp;quot;&lt;br /&gt;
        #&lt;br /&gt;
        # Only enable klipsdebug=all if you are a developer&lt;br /&gt;
        #&lt;br /&gt;
        # NAT-TRAVERSAL support, see README.NAT-Traversal&lt;br /&gt;
        nat_traversal=no&lt;br /&gt;
        # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12&lt;br /&gt;
        interfaces=%defaultroute&lt;br /&gt;
&lt;br /&gt;
conn central&lt;br /&gt;
        authby=rsasig&lt;br /&gt;
        esp=aes-sha1&lt;br /&gt;
        right=1.2.3.4&lt;br /&gt;
        rightsubnet=192.168.2.0/24&lt;br /&gt;
        rightrsasigkey=%cert&lt;br /&gt;
        rightid=@central.site.vpn&lt;br /&gt;
        left=%defaultroute&lt;br /&gt;
        leftsubnet=192.168.1.0/24&lt;br /&gt;
        leftrsasigkey=%cert&lt;br /&gt;
        leftid=road@warrior.vpn&lt;br /&gt;
        leftcert=roadwarrior.pem&lt;br /&gt;
        dpddelay=5&lt;br /&gt;
        dpdtimeout=15&lt;br /&gt;
        dpdaction=restart&lt;br /&gt;
        auto=start&lt;br /&gt;
        #keylife=20m&lt;br /&gt;
        keyingtries=%forever&lt;br /&gt;
&lt;br /&gt;
#Disable Opportunistic Encryption&lt;br /&gt;
include /etc/ipsec.d/examples/no_oe.conf&lt;br /&gt;
&lt;br /&gt;
Create /etc/ipsec.secrets&lt;br /&gt;
&lt;br /&gt;
This file contains the name of the private key file and the passphrase needed to open the file:&lt;br /&gt;
&lt;br /&gt;
: RSA roadwarriorkey.pem &amp;quot;passphrase&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
&lt;br /&gt;
Make sure the permissions of /etc/ipsec.secrets and /etc/ipsec.d/private/* allow read access only to root (chmod 400).&lt;br /&gt;
Hotplug&lt;br /&gt;
&lt;br /&gt;
Configure the hotplug system to start and stop OpenSWAN each time the DSL connection is cut off by the provider:&lt;br /&gt;
&lt;br /&gt;
/etc/hotplug.d/iface/30-ipsec&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$PROTO&amp;quot; != &amp;quot;ppp&amp;quot; ]; then exit; fi&lt;br /&gt;
&lt;br /&gt;
USER=root&lt;br /&gt;
export USER&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$ACTION&amp;quot; in&lt;br /&gt;
        ifup)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec start&lt;br /&gt;
                ;;&lt;br /&gt;
        ifdown)&lt;br /&gt;
                /etc/rc.d/init.d/ipsec stop&lt;br /&gt;
                ;;&lt;br /&gt;
esac&lt;br /&gt;
&lt;br /&gt;
Firewall&lt;br /&gt;
&lt;br /&gt;
Make sure to open your firewall for ESP and ISAKMP traffic (and maybe NAT-T if your setup requires nat-traversal) and disable NAT for the LAN of the central site:&lt;br /&gt;
&lt;br /&gt;
Example /etc/firewall.user:&lt;br /&gt;
&lt;br /&gt;
iptables -A input_rule -p esp -s 1.2.3.4              -j ACCEPT  # allow IPSEC&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 500  -j ACCEPT  # allow ISAKMP&lt;br /&gt;
iptables -A input_rule -p udp -s 1.2.3.4 --dport 4500 -j ACCEPT  # allow NAT-T&lt;br /&gt;
iptables -t nat -A postrouting_rule -d 192.168.2.0/24 -j ACCEPT&lt;br /&gt;
# Allow any traffic between road warrior LAN and central LAN&lt;br /&gt;
#iptables -A forwarding_rule -i $LAN -o ipsec0 -j ACCEPT&lt;br /&gt;
#iptables -A forwarding_rule -i ipsec0 -o $LAN -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
Bugfix (for RC4)&lt;br /&gt;
&lt;br /&gt;
As of Whiterussian RC4, to fix a bug replace /etc/hotplug.d/iface/10-ntpclient by https://dev.openwrt.org/file/trunk/openwrt/package/ntpclient/files/ntpclient.init.&lt;br /&gt;
Startup files&lt;br /&gt;
&lt;br /&gt;
Optionally remove /etc/init.d/60ipsec, as this script is not really needed in this setup.&lt;br /&gt;
Speed&lt;br /&gt;
&lt;br /&gt;
Depending on the encryption (esp=) the following transfer rates might be achieved:&lt;br /&gt;
aes-sha1 	160kb/s&lt;br /&gt;
3des-sha1 	230kb/s&lt;br /&gt;
des-sha1	260kb/s&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=747</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=747"/>
		<updated>2011-06-30T21:28:16Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=746</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=746"/>
		<updated>2011-06-30T21:28:00Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referencias:&lt;br /&gt;
&lt;br /&gt;
http://wiki.openwrt.org/oldwiki/IPSec&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=745</id>
		<title>IPSec en OpenWrt</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=IPSec_en_OpenWrt&amp;diff=745"/>
		<updated>2011-06-30T21:25:42Z</updated>

		<summary type="html">&lt;p&gt;Marcos: Página creada con &amp;#039;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en...&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IPSec (Internet Protocol Security), es un conjunto de protocolos cuya función es asegurar las comunicaciones sobre el protocolo IP, autenticando y/o cifrando cada paquete IP en un flujo de datos. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://es.wikipedia.org/wiki/IPsec&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=Grupo_2&amp;diff=744</id>
		<title>Grupo 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=Grupo_2&amp;diff=744"/>
		<updated>2011-06-30T21:15:56Z</updated>

		<summary type="html">&lt;p&gt;Marcos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Relevamiento de procesadores ==&lt;br /&gt;
&lt;br /&gt;
[[Relevamiento Grupo 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cliente DDNS en OpenWrt ==&lt;br /&gt;
&lt;br /&gt;
[[Cliente DDNS en OpenWrt]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== IPSec en OpenWrt ==&lt;br /&gt;
&lt;br /&gt;
 [[IPSec en OpenWrt]]&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
	<entry>
		<id>https://wiki.cure.edu.uy/index.php?title=Tecn%C3%B3logo_telecomunicaciones&amp;diff=708</id>
		<title>Tecnólogo telecomunicaciones</title>
		<link rel="alternate" type="text/html" href="https://wiki.cure.edu.uy/index.php?title=Tecn%C3%B3logo_telecomunicaciones&amp;diff=708"/>
		<updated>2011-06-21T23:08:34Z</updated>

		<summary type="html">&lt;p&gt;Marcos: /* Cursos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Archivo:logott.png|right|200px]]&lt;br /&gt;
&lt;br /&gt;
El Tecnólogo en Telecomunicaciones tiene capacidades para asistir en el diseño y el despliegue de sistemas de telecomunicaciones y para realizar su mantenimiento y administración.&lt;br /&gt;
&lt;br /&gt;
Podrá participar como técnico calificado en tareas de desarrollo de proyectos en el área de las telecomunicaciones, integrándose al trabajo colectivo y multidisciplinario para la realización de estas actividades en situaciones de variada complejidad, tanto por sus características como por su escala.&lt;br /&gt;
&lt;br /&gt;
Para ello, habrá adquirido una formación en las áreas fundamentales de las Telecomunicaciones, así como en el desarrollo de aplicaciones telemáticas y poseerá un conocimiento básico del área de física y matemática que le permita continuar con sus estudios en otras titulaciones si así lo desea.&lt;br /&gt;
&lt;br /&gt;
Dicha formación incluirá aspectos teóricos fundamentales y una muy fuerte componente práctica, incluyendo el manejo de tecnologías actualizadas.&lt;br /&gt;
&lt;br /&gt;
También incluirá el desarrollo de un estudio de perfil innovador o de solución concreto de un caso real en la temática de la carrera, ya sea realizada en el contexto de una pasantía en una empresa del ramo o como monografía de profundización en técnicas innovadoras.&lt;br /&gt;
&lt;br /&gt;
La carrera se dicta en el Centro Universitario de la Región Este (CURE), ubicado en la ciudad de Rocha.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cursos ==&lt;br /&gt;
&lt;br /&gt;
===Primer Semestre===&lt;br /&gt;
&lt;br /&gt;
* [[Matemática I]]&lt;br /&gt;
* [[Matemática II]]&lt;br /&gt;
* [[Física I]]&lt;br /&gt;
&lt;br /&gt;
===Segundo Semestre===&lt;br /&gt;
&lt;br /&gt;
* [[Matemática III]]&lt;br /&gt;
* [[Física II]]&lt;br /&gt;
* [[Programación I]]&lt;br /&gt;
&lt;br /&gt;
===Quinto Cuatrimestre===&lt;br /&gt;
&lt;br /&gt;
* [[Taller de Gestión de Redes]]&lt;br /&gt;
* [[Taller de Telemática]]&lt;br /&gt;
* [[Taller de Redes Inalámbricas]]&lt;br /&gt;
&lt;br /&gt;
===Sexto Cuatrimestre===&lt;br /&gt;
&lt;br /&gt;
* [[Tecnólogo en Telecomunicaciones/adminredes|Taller de Administración de Redes y Servicios]]&lt;br /&gt;
* [[Taller de temas avanzados en redes de telecomunicaciones]]&lt;/div&gt;</summary>
		<author><name>Marcos</name></author>
	</entry>
</feed>