Quote:
Originally Posted by Slyke
Well... no I wouldn't say it's THAT secure. But if you just want to get around you everyday packet sniffer it's okay.
Not sure what you mean with 2/ You want to know how to setup your IPTables for L2TP?
|
yes but also what internal network IP do I use if 10/24 and 172/24
are already taken?
this is the current routing:
Code:
[root ~]# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.8.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun1
172.16.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun0
10.8.0.0 10.8.0.2 255.255.255.0 UG 0 0 0 tun1
172.16.0.0 172.16.0.2 255.255.255.0 UG 0 0 0 tun0
88.xxx.xxx.0 0.0.0.0 255.255.252.0 U 0 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
0.0.0.0 88.xxx.xxx.1 0.0.0.0 UG 0 0 0 eth0
[root ~]#
So what is the most secure out of l2tp, pptp, and ipsec?