OpenVPN: Building and Integrating Virtual Private Networks
|Also available on:|
- Learn how to install, configure, and create tunnels with OpenVPN on Linux, Windows, and MacOSX
- Use OpenVPN with DHCP, routers, firewall, and HTTP proxy servers
- Advanced management of security certificates
Book DetailsLanguage : English
Paperback : 272 pages [ 235mm x 191mm ]
Release Date : May 2006
ISBN : 190481185X
ISBN 13 : 9781904811855
Author(s) : Markus Feilner
Topics and Technologies : All Books, Security and Testing, Linux Servers, Networking & Telephony, Open Source
Table of Contents
Chapter 1: VPN—Virtual Private Network
Chapter 2: VPN Security
Chapter 3: OpenVPN
Chapter 4: Installing OpenVPN
Chapter 5: Configuring an OpenVPN Server—The First Tunnel
Chapter 6: Setting Up OpenVPN with X509 Certificates
Chapter 7: The Command openvpn and its Configuration File
Chapter 8: Securing OpenVPN Tunnels and Servers
Chapter 9: Advanced Certificate Management
Chapter 10: Advanced OpenVPN Configuration
Chapter 11: Troubleshooting and Monitoring
Appendix A: Internet Resources
This book covers everything from installing OpenVPN, configuring it, and using it in mixed environments. I'd say that the book is well-targeted and suitable for beginners to VPN setups and is easy to understand and follow.I think the most obvious is that it really does live up to its promise.
I believe the author has succeeded in meeting the relatively high expectations set by the blurb on the rear cover of the book. This book is definitely a very practical reference guide for anyone who is interested in using OpenVPN and provides excellent coverage of the subject material.
Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.
Errata- 20 submitted: last submission 09 Aug 2012
Errata type:Casing inconsistency | Page number:0
Errata type:Typo | Page number:2
Line 18:- Troubleshooting and Monitoring is what you should refer "to" if... Add "to" in the sentence.
Errata type:Typo | Page number:3
Line 25:- cd "C:\\Program Files\ OpenVPN\easy-rsa\" Remove space before OpenVPN
Errata type: | Page number: 11
Tunneling and Overhead heading: Line 2:- as the walls of the a road or rail tunnel protect..Delete "the" after of.
Errata type: Typo| Page number:14
the 1st line from: Even though it provides no own security mechanisms..
Even though it provides no known security mechanisms...
Errata type:Typo | Page number:15
Protocols implemented on OSI layer 4 heading: last line:- Replace "permanently" with "continually".
Errata type:Typo | Page number:19
"Another danger are so-called man-in-the-middle attacks, also know as eavesdropping"
Another danger are so-called man-in-the-middle attacks, also known as eavesdropping"
Errata type:Typo | Page number:14
Last para:- "the whole IP packets are encapsulated in a new packet", replace "whole" with "all".
Errata type: Typo | Page number:25
Line 20:- Replace VPN Systems with VPN systems.
Errata type: Typo | Page number:25
Last line:- because a certificate signed by third party is trusted. Add "a" before third party.
Errata type:Inconsistent capitalization | Page number: 28
Line 1:- Replace Port with port.
Line 5:- Replace Interfaces with interfaces.
Line 20:- Replace Installation with installation.
Errata type:Typo | Page number:30
Line 12 inside the table:- automatic configuration of "a", replace "a" with "an".
Errata type:Word replacement | Page number:36
Line 5 inside the table:- Replace "DynDNS" with "dynamic DNS" or "Dial-Up Internet connections with dynamically assigned IPs".
Errata type:Typo | Page number:56
Testing Installation and Installing with rpm heading:Line 13:- Remove --test from rpm installation example.
Errata type:broken command | Page number:70
Line 4:- Replace debian01:~# ta with debian01:~# tar -xzf openvpn-2.0.2.tar.gz.
Errata type:Incorrect filename | Page number:117
Information box:- Replace build-key-server.bat with build-key.bat
Errata type:Wrong port number | Page number:166
Line 2:- by default it's UDP port is 1149. Replace 1149 with 1194.
Errata type:Incorrect words | Page number:195
Line1:- Delete "for a VPN client".
Errata type:Typo | Page number:203
Errata type:Typo | Page number:211
Scripting OpenVPN-An Overview heading: Line 3:- Replace "Firewall" with "firewall"
What you will learn from this book
Chapter 1 looks at what VPNs are, how they evolved during the last decade, why it is necessary to modern enterprises, how typical VPNs work. The chapter also covers some essential networking concepts.
Chapter 2 explains VPN security issues, including symmetric and asymmetric encryption, the SSL/TLS library, and SSL certificates.
Chapter 3 introduces OpenVPN. In this chapter, we learn about the history of OpenVPN, how OpenVPN works, and how OpenVPN compares to IPSec VPN applications.
Chapter 4 covers installing OpenVPN on both Windows, the Mac, Linux, and FreeBSD. It covers the installation on Linux from the source code and RPM packages. Installation on Suse and Debian is covered in detail.
In Chapter 5, an encryption key for OpenVPN is created and it is then used to setup up our first OpenVPN Tunnel between two windows systems in the same network. The key is then copied on a Linux system and this system is connected through a tunnel to the first windows machine.
Chapter 6 shows how to create x509 server and client certificates for use with OpenVPN. easy-rsa which comes with OpenVPN and is available for both Windows and Linux is used.
Chapter 7 reviews the syntax of the command line tool openvpn, which enables building tunnels quickly. The configuration options of openvpn are covered in detail with examples.
Chapter 8 shows how to make the example tunnels created earlier safer and persistent by choosing a reliable combination of configuration file parameters. It then covers how to configure firewalls on Linux and Windows to work with OpenVPN.
Chapter 9 focuses on using xca, the advanced Windows tool with which x509 certificates can be easily managed. Its Linux equivalent, Tinyca2, which can even manage multiple certificate authorities, is also covered.
Chapter 10 covers advanced OpenVPN configurations, including Tunneling through a proxy server, pushing routing commands to clients, pushing and setting the default route through a tunnel, Distributed compilation through VPN tunnels with distcc, and OpenVPN scripting.
Chapter 11 shows how to debug and monitor VPN tunnels. It covers standard networking tools that can be used for scanning and testing the connectivity of a VPN server.
OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption.
This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, the book moves on to cover using OpenVPN, from installing it on various platforms, through configuring basic tunnels, to more advanced features, such as using the application with firewalls, routers, proxy servers, and OpenVPN scripting.
While providing only necessary theoretical background, the book takes a practical approach, presenting plenty of examples.
This book is a comprehensive guide to using OpenVPN for building both secure VPNs. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before covering advanced uses of OpenVPN. This book is for both experienced and new OpenVPN users.
Visit the Free Online Edition for OpenVPN: Building and Integrating Virtual Private Networks and learn more about the book and discover what each chapter from this book has in store.
Who this book is for
Network administrators and any one who is interested in building secure VPNs using OpenVPN. It presumes basic knowledge of Linux, but no knowledge of VPNs is required. All basic VPN and relevant security concepts are covered.