IPSEC wireless router ?

G

Guest

Guest
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

I am looking for something secure:
hardware wireless router:

- une ethernet port dedicated to provider (DHCP and PPPOE capable)
- one LAN port which would be linked to some switch
- wireless repeter

BUT but BUT: I want the wireless interface NOT TO BE BRIGED to LAN ethernet, but
rather require any client to use IPSEC tunneling.

Thats for home use; I am too lame to set linux box, because I dont feel liike
setting up an IPSEC server, and had too much bad XP with IDE disks on home made
router (usually crash after 2 or 3 years 24/24).

I hope such a device should be available between 150 and 300 e

Maybe there is some tutorials to convert this way some Linksys WRT ?
or some Dlink with such native support ?

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

On Sat, 24 Sep 2005 15:33:55 +0200, DEMAINE Benoit-Pierre
<nntp_pipex@demaine.info> wrote:

>I am looking for something secure:
>hardware wireless router:
>
>- une ethernet port dedicated to provider (DHCP and PPPOE capable)
>- one LAN port which would be linked to some switch
>- wireless repeter
>
>BUT but BUT: I want the wireless interface NOT TO BE BRIGED to LAN ethernet,

Not possible. 802.11 wireless is bridging by definition. No routing,
IP addresses, or services (such as IPSec) involved. There's no other
way to connect between wireless and wired devices other than bridging.

Now, you could isolate the wired and wireless part with a router, VPN,
or filters, but that requires layer 3 services in addition to
bridging.

>but
>rather require any client to use IPSEC tunneling.

Overkill. You have WPA encryption for the wireless. On top of that,
you want to add VPN encryption. You don't really need both. WPA is
enough.

>Thats for home use; I am too lame to set linux box, because I dont feel liike
>setting up an IPSEC server, and had too much bad XP with IDE disks on home made
>router (usually crash after 2 or 3 years 24/24).

The bigger they are, the harder they crash. How about this
alternative? Use an access point, not a wireless router for the
wireless part of the puzzle. Use WPA encryption. Use a seperate
IPSec VPN router to terminate the tunnel. Netgear seems to have a
good selection:
| http://www.netgear.com/products/business/prod_vpnrouter_wired_security_sb.php
There are lots of other wired VPN routers to chose from at around
$100US. If you want your VPN termination, it's in the box. This will
also allow you to be rather creative in locating the wireless access
point and allow easy upgrades to the latest 802.11 acronyms.

There are products that sorta do what you want:
| http://www.netgear.com/products/details/FWAG114.php
| http://www.sonicwall.com/products/tz170SP_wireless.html
I don't think you'll like the prices.

>I hope such a device should be available between 150 and 300 e
>
>Maybe there is some tutorials to convert this way some Linksys WRT ?
>or some Dlink with such native support ?

Yes. The WRT54G can handle alternative firmware with VPN termination
features. Sveasoft Alchemy includes PPTP VPN services which is handy
for Windoze clients as it comes with the operating system. IPSec is
available in various custom builds. I'm too lazy to find these. Bug
me if you need URL's.


--
Jeff Liebermann jeffl@comix.santa-cruz.ca.us
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> I am looking for something secure:
> hardware wireless router:

I know where you're going with that but why? You can use WPA on a
WRT54G as long as your clients support it and given a strong password,
that's going to suit pretty much all home users.

IPSec has limitations too, how were you planning on authenticating?
Which EAP type were you going to use? EAP-MD5 for example is easily
dictionary crackable for example.

David.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

DEMAINE Benoit-Pierre <nntp_pipex@demaine.info> wrote in
news:43353ab0$0$24372$626a14ce@news.free.fr:

> I am looking for something secure:
> hardware wireless router:
>
> - une ethernet port dedicated to provider (DHCP and PPPOE capable)
> - one LAN port which would be linked to some switch
> - wireless repeter
>
> BUT but BUT: I want the wireless interface NOT TO BE BRIGED to LAN
> ethernet, but rather require any client to use IPSEC tunneling.
>
> Thats for home use; I am too lame to set linux box, because I dont
> feel liike setting up an IPSEC server, and had too much bad XP with
> IDE disks on home made router (usually crash after 2 or 3 years
> 24/24).
>
> I hope such a device should be available between 150 and 300 e
>
> Maybe there is some tutorials to convert this way some Linksys WRT ?
> or some Dlink with such native support ?
>

I don't think you can do what you want. You can use an IPSEC tunnel
between computers through the O/S such as Win 2K, XP and etc and that's a
VPN solution software to software, you can have a software VPN client on
a client machine with server software VPN implemented on a device such as
a firewall appliance or a er such as a Watchguard or others that fall
into that category such a Sonicwall, Cisco and others, software client to
server host VPN solutions such as AT&T Extranet or you can have hardware
to hardware VPN solution router to router.

http://www.homenethelp.com/vpn/

But some kind of a VPN solution between the wireless gateway device such
as a NAT router and your wireless machines on the LAN is questionable.
Maybe, a VPN solution with a wireless Watchguard FW appliance or others
and its client VPN software solution on the machines may work to protect
a wireless LAN situation between the gateway device and the clients I
don't know.

You can checkout the WG X5 series I think that's around $300 but the VPN
on the client machines cost extra and you can checkout others too

Duane :)
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

I just want you to know that I am sitting out here in and Extended stay inn
using a dial-up direct connection to the Internet. Before implementing
Analogx's IPsec Secpol rules for configuring IPsec to act in a firewall like
mannerism, BlackIce was sounding off and blocking unsolicited inbound
traffic. I have not been on a dial-up connection with a machine in several
years and was surprised at the number of probes, scans and attacks being ran
against the machine such as MS SQL Server, RPC, *NetBIOS*, etc, which BI was
blocking and logging and alerting on things such as O/S Fingerprinting. And
I have some vulnerable applications running such as IIS and SQL Server.

However, since implementing IPsec on the XP Pro machine and activating the
Analogx's SecPol rules with making adjustments in the rules like allowing
SMTP on TCP port 587, because EarthLink uses port 587 and not 25 and
configuring AnalogX's rules to block all the Windows Networking ports and
other ports IPsec protects by default such as TCP 135 only allowing traffic
in a LAN situation, BlackIce has not log anything in the logs, barked,
whined, or alerted with IPsec supplementing BI.

I was using BI and IPsec to supplement the no FW Linksys NAT router I was
using. But until now, I was not aware of how powerful of a solution IPsec is
and its ability to be used in a FW like manner to stop inbound or outbound
traffic by port, protocol or IP and nothing is coming past it *NOTHING*
which would make BlackIce react.

I am very impressed with IPsec and its ability to supplement in a FW like
manner. <g>

http://www.petri.co.il/block_ping_traffic_with_ipsec.htm
http://www.analogx.com/contents/articles/ipsec.htm
http://support.microsoft.com/kb/813878

But just keep in mind I am not a guru like you are, and therefore, you can
kiss my *ASS* about IPsec and anything else for that matter with your
*tounge* hanging out. <vbg>
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> using. But until now, I was not aware of how powerful of a solution IPsec is
> and its ability to be used in a FW like manner to stop inbound or outbound
> traffic by port, protocol or IP and nothing is coming past it *NOTHING*
> which would make BlackIce react.

It's not new Duane. All you're doing is blocking traffic by port. I'm
surprised that it's new to you.

The main advantage of IPSec is the Sec part, i.e. security. Simply
creating filters and a filter action like you are doing is the very very
simplest start. What the original poster wanted was security which to
do properly requires a PKI implementation. Then you get mutual
authentication and encryption, none of which you have right now.

> I am very impressed with IPsec and its ability to supplement in a FW like
> manner. <g>

Being doing that for ages, it's not new but it does have value, it's
just not the friendliest interface for noddies to configure and it
doesn't provide any stateful inspection or application inspection but
yes, if all you want to do is set up block/allow filters, it's fine.

> But just keep in mind I am not a guru like you are, and therefore, you can
> kiss my *ASS* about IPsec and anything else for that matter with your
> *tounge* hanging out. <vbg>

No need but keep reading, you'll learn as you go along. It fascinates
me why you post what you do sometimes.

Just remember, IPSec is an IP only solution, if you have NWLink or
NetBEUI installed and bound, you might just as well hand your PC over to
Mr Hacker.

David.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

David Taylor wrote:
>>I am looking for something secure:
>>hardware wireless router:
>
>
> I know where you're going with that but why? You can use WPA on a
> WRT54G as long as your clients support it and given a strong password,
> that's going to suit pretty much all home users.

Even if I buy WPA APs, few clients have it yet

WPA is not down compatible with 802.11b ... IPSEC is with any wireless card and any
OS ... and will remain secure as long as SSL is not broken, when optimists people
think than WPA will be broken within 12 months.

I am not to buy for WPA which will soon be weak.

> IPSec has limitations too, how were you planning on authenticating?
> Which EAP type were you going to use? EAP-MD5 for example is easily
> dictionary crackable for example.

exchange of primary key can be done by email the day before my customer joins me, or
the first day using transparent proxy that allows access only to HTTPS webmails ...

or just hand in hand (aka oral confirmation that the signature of the key is really
mine).

IPSEC cant be weaker than WPA, simply because like WEP, WPA is limitted by hardware,
and broken proto means you can throught out your devices, when IPSEC can be upgraded
even on old machines, and keeps the network compliant with any other devices.

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> I am very impressed with IPsec and its ability to supplement in a FW like
> manner. <g>

IPSEC just rules where most other protos just sux.

ATM I never seted it up myself, but from tutos I have read, it way non-trivial to
set up (server side), but really claimed by every one to be highly secure, and may
be the only known REALLY secure layer to encapsulate VPNs.

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

DEMAINE Benoit-Pierre <nntp_pipex@demaine.info> wrote in
news:43361cb9$0$22382$626a14ce@news.free.fr:

>> I am very impressed with IPsec and its ability to supplement in a FW
>> like manner. <g>
>
> IPSEC just rules where most other protos just sux.
>
> ATM I never seted it up myself, but from tutos I have read, it way
> non-trivial to set up (server side), but really claimed by every one
> to be highly secure, and may be the only known REALLY secure layer to
> encapsulate VPNs.
>

It's simple with the AnalogX rules that can be implemeted on the Win 2K,
XP and the Win 2K3 O/S(s). All one does is enable or disable the IPsec
rules say for instance for the HTTP server/client, SMTP server/client,
NNTP server/client etc, etc and edit those rules and see what's being
done and learn from them. Again it's a piece of cake even I can do it.
;-)

Duane :)
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

could you stop trolling and talk about avaibale wireless IPSEC DEVICES ?

btw: clients will be Linux and BSDs laptops ...
so that even pentium (1) 150MHz with PCMCIA1 802.11b adapters can still benefit of
my secure wireless network, witout need of those PCMCIA2 cards (which are not
supported by old lappies), nor need of OS that require 256MB or even 2GB just to
install ...

IPSEC support can be added to 8 years old BSD laptops !!!

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

DEMAINE Benoit-Pierre <nntp_pipex@demaine.info> wrote in
news:43361ddf$0$8933$626a14ce@news.free.fr:

> could you stop trolling and talk about avaibale wireless IPSEC DEVICES
> ?
>
> btw: clients will be Linux and BSDs laptops ...
> so that even pentium (1) 150MHz with PCMCIA1 802.11b adapters can
> still benefit of my secure wireless network, witout need of those
> PCMCIA2 cards (which are not supported by old lappies), nor need of OS
> that require 256MB or even 2GB just to install ...
>
> IPSEC support can be added to 8 years old BSD laptops !!!
>

Well, SuSe Linux that I use is using about that much RAM and disk space
just to install. And I am not into mix, blend and roll your own.

Well, you have to have to valid end points I don't care what O/S you're
using. The VPN end points must be client to server software solutions. Or
you can install the VPN client software solution on a machine and install
the server solution as part of the firmware of a low-end wireless
firewall appliance. But I don't think the VPN will apply for a LAN
situation period wired or wireless and is only for remote connections
over the Internet with a client machine. However, you'll need to check on
it. The other VPN solution is hardware to hardware -- router to router.

The only thing you might be able to do is an AD-HOC wireless solution on
a gateway computer with wireless client machines using IPsec on the
gateway server machine between the client machines.

I don't think you're going to find a hardware VPN solution for the
wireless machines on the LAN.

Duane :)
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

some of my friends even use IPSEC on wired LAN ... just in case some one spies their
LAN after hacking the gateway ...

atm, I /just/ want to secure wireless part of my home.

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

DEMAINE Benoit-Pierre <nntp_pipex@demaine.info> wrote in
news:43361e4a$0$8933$626a14ce@news.free.fr:

> some of my friends even use IPSEC on wired LAN ... just in case some
> one spies their LAN after hacking the gateway ...
>
> atm, I /just/ want to secure wireless part of my home.
>

Well, there is nothing to say that one cannot hack the wireless and get to
the wire LAN machines or hack the wire ones and get to the wireless ones on
the LAN. That's if you come right down to it.:)

Duane :)
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

>>BUT but BUT: I want the wireless interface NOT TO BE BRIGED to LAN ethernet,
>
>
> Not possible. 802.11 wireless is bridging by definition. No routing,
> IP addresses, or services (such as IPSec) involved. There's no other
> way to connect between wireless and wired devices other than bridging.

are you sure ? then, what is my hand setted up gateway doing ???

- 3 NICs
- 1 Wireless adapter ...

4 IPs
and clients on any network can not even ping any other IP than the NIC of my gateway
it is connected to ... not even the IP of wireless card if he is on wired NIC ...

what happens is that for simplicity, and dummy compliance, all manifacturers do
brige wireless to wired ... BUT on all firewalling tutos, you will find that this
kind of briging DO require to be activated ... aka is NOT available before you
explicitely ask for it.

I already DID set up routing, and/or briging on x86 boxes ...

my actual question is: do any hardware router do that including IPSEC ?

> Now, you could isolate the wired and wireless part with a router, VPN,
> or filters, but that requires layer 3 services in addition to
> bridging.

that would mean set up a dedicated gateway between wired and wireless, which would
decrypt IPSEC connections; that is precisely what I am too lame to do myself.

> Overkill. You have WPA encryption for the wireless. On top of that,
> you want to add VPN encryption. You don't really need both. WPA is
> enough.

WPA is hardware encryption: next year it will be broken = next year I can buy a new
router, and ask all my clients to buy new cards ...

All we know about WPA is that it was secure yesterday ... and that when some one
breaks it, you learn about it on forums only 6 months after all teenagers already
craked company networks ...

In france, such security breaches can lead people to jail, even put in jail the one
who have been attacked.

> The bigger they are, the harder they crash. How about this
> alternative? Use an access point, not a wireless router for the
> wireless part of the puzzle. Use WPA encryption. Use a seperate
> IPSec VPN router to terminate the tunnel. Netgear seems to have a
> good selection:

- depends on (weak) WPA
- depends on an additional box

=> twice more storage device + spinning disk + 2 systems + 2 supplies = 4 times more
reasons to crash.

and my problem is that IWANT TO AVOID SETTING UP MANUALLY THE IPSEC SERVER.

> There's no other
> way to connect between wireless and wired devices other than bridging.

looks like you missed a point: I never said I want my networks to be in the same IP
ranges ... would any admin want to keep in the same range all computers of the
building ? who would be mad enough to try to keep transparent briging between all
computers ? who would try to interconnect more than 1000 computers on the same segment ?

Even at home, it is out of order to have wireless in the same IP range that wired LAN.

Honney pots will fill holes

DHCP+DNS will make things transparent for users.

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

On Sun, 25 Sep 2005 06:06:14 +0200, DEMAINE Benoit-Pierre
<nntp_pipex@demaine.info> wrote:

>>>BUT but BUT: I want the wireless interface NOT TO BE BRIGED to LAN ethernet,
>>
>>
>> Not possible. 802.11 wireless is bridging by definition. No routing,
>> IP addresses, or services (such as IPSec) involved. There's no other
>> way to connect between wireless and wired devices other than bridging.
>
>are you sure ?

Yes, I'm sure it's bridging.

> then, what is my hand setted up gateway doing ???

That's the router section. Think of a "wireless router" as a
"wireless access point" glued to an "ethernet router". If done in
seperate boxes, the ethernet output from the access point would go to
one of the LAN inputs of the "ethernet router". When you set the IP
addresses and all that, you're setting the router section. The only
exception is that a stand along access point requires an IP address to
do configurations and system settings. That IP address is only use
for configuration and has nothing to do with the traffic.

>
>- 3 NICs
>- 1 Wireless adapter ...
>
>4 IPs
>and clients on any network can not even ping any other IP than the NIC of my gateway
>it is connected to ... not even the IP of wireless card if he is on wired NIC ...

Wanna bet? If you ignore the router part of the puzzle and just play
with an access point, the IP address of the access point can be
literally anything. In fact, that's exactly what I do on wireless
systems that I don't want the users to tinker with the access points.
I set the management IP address of the access point to something
that's out of the usual 192.168.1.0/24 block.

>what happens is that for simplicity, and dummy compliance, all manifacturers do
>brige wireless to wired ... BUT on all firewalling tutos, you will find that this
>kind of briging DO require to be activated ... aka is NOT available before you
>explicitely ask for it.

Sorry. I don't understand what you're asking or saying.

>I already DID set up routing, and/or briging on x86 boxes ...
>
>my actual question is: do any hardware router do that including IPSEC ?
>
>> Now, you could isolate the wired and wireless part with a router, VPN,
>> or filters, but that requires layer 3 services in addition to
>> bridging.
>
>that would mean set up a dedicated gateway between wired and wireless, which would
>decrypt IPSEC connections; that is precisely what I am too lame to do myself.
>
>> Overkill. You have WPA encryption for the wireless. On top of that,
>> you want to add VPN encryption. You don't really need both. WPA is
>> enough.
>
>WPA is hardware encryption: next year it will be broken = next year I can buy a new
>router, and ask all my clients to buy new cards ...

That's why I suggested you seperate the router function (with VPN) and
the wireless function. When the next great exploits or new acronyms
come out, you don't have to toss everything and start over.

>All we know about WPA is that it was secure yesterday ... and that when some one
>breaks it, you learn about it on forums only 6 months after all teenagers already
>craked company networks ...

Yawn. You're welcome to your own level of paranoia. However, if you
run on that assumption, there isn't an operating system, application,
or protocol that won't shortly be cracked by teenagers or university
grad students.

>In france, such security breaches can lead people to jail, even put in jail the one
>who have been attacked.
>
>> The bigger they are, the harder they crash. How about this
>> alternative? Use an access point, not a wireless router for the
>> wireless part of the puzzle. Use WPA encryption. Use a seperate
>> IPSec VPN router to terminate the tunnel. Netgear seems to have a
>> good selection:
>
>- depends on (weak) WPA
>- depends on an additional box
>
>=> twice more storage device + spinning disk + 2 systems + 2 supplies = 4 times more
>reasons to crash.
>
>and my problem is that IWANT TO AVOID SETTING UP MANUALLY THE IPSEC SERVER.

Good luck. IPsec is no fun to setup. Lots of settings. Lots of
potential incompatibilities between servers and clients. Lots of
things to go wrong. To the best of my knowledge, nobody has a
non-manual IPSec VPN setup.

>> There's no other
>> way to connect between wireless and wired devices other than bridging.
>
>looks like you missed a point: I never said I want my networks to be in the same IP
>ranges ... would any admin want to keep in the same range all computers of the
>building ? who would be mad enough to try to keep transparent briging between all
>computers ? who would try to interconnect more than 1000 computers on the same segment ?

I think you missed my point. 802.11 wireless is bridging. I still
recall wireless access points that didn't have an IP address for
configuration and had to be set via a serial port. There's no layer 3
stuff involved in bridging. That doesn't mean you have to setup your
entire network without any routers and using just bridging. However,
that's exactly the way a typical hot spot or home network is setup.
The users bridge (encapsulate 802.3 ethernet inside 802.11 wireless
packets) between client radios and the access point. The IP stack is
in the client, not the wireless client. At the access point, it goes
to a router, which deals with the IP addresses, routing, and such.

>Even at home, it is out of order to have wireless in the same IP range that wired LAN.

Most systems I've seen use a common /24 IP block for everything. If
there's a VPN server in the system, the VPN server delivers an IP
address through the tunnel to the client, which is used instead of the
DHCP assigned IP address. I think that's what you're talking about.

>Honney pots will fill holes
>
>DHCP+DNS will make things transparent for users.

Sigh. Good luck...


--
# Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060
# 831.336.2558 voice Skype: JeffLiebermann
# http://www.LearnByDestroying.com AE6KS
# http://802.11junk.com
# jeffl@comix.santa-cruz.ca.us
# jeffl@cruzio.com
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

On Sun, 25 Sep 2005 06:06:14 +0200, DEMAINE Benoit-Pierre
<nntp_pipex@demaine.info> wrote:

>my actual question is: do any hardware router do that including IPSEC ?

Wireless router or ethernet router with VPN?

Wireless:
| http://www.netgear.com/products/details/FWAG114.php
| http://www.sonicwall.com/products/tz170SP_wireless.html
| http://www.linksys.com/servlet/Satellite?childpagename=US%2FLayout&packedargs=c%3DL_Product_C2%26cid%3D1118334818934&pagename=Linksys%2FCommon%2FVisitorWrapper


There are plenty of ethernet routers with IPSec VPN terminations.
Search Google or the major manufacturers for "VPN Router".


--
# Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060
# 831.336.2558 voice Skype: JeffLiebermann
# http://www.LearnByDestroying.com AE6KS
# http://802.11junk.com
# jeffl@comix.santa-cruz.ca.us
# jeffl@cruzio.com
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> set up (server side), but really claimed by every one to be highly secure, and may
> be the only known REALLY secure layer to encapsulate VPNs.

Wait a week then visit www.newburynetworks.com and view their webcast on
why VPN's (IPSec or otherwise) are in their opinion NOT the way to
secure a WLAN.

IPSec isn't the only solution and as has been stated, doesn't secure
anything other than IP, is a layer 3 protocol, doesn't encrypt
broadcasts and requires that the network be subnetted.

David.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> I think you missed my point. 802.11 wireless is bridging. I still
> recall wireless access points that didn't have an IP address for
> configuration and had to be set via a serial port. There's no layer 3
> stuff involved in bridging. That doesn't mean you have to setup your

I can see where he's coming from, he wants an IPSec driver on the
wireless side of his router above the MAC bridge part of the wireless.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> Who cares about what the OP is talking about?

That's generally the point of a thread, to discuss the original
question! :)

> I been using it for a couple of years and that's after someone made me aware
> of it so how can it be new to me? I have made posts about using IPsec as a

Duane said "But until now, I was not aware of how powerful of a solution
IPsec is
and its ability to be used in a FW like manner"

> O/S(s) are not aware that it's even there. And many users *bitch* about the
> XP O/S FW not being able to stop outbound traffic .However, with the use of

Yes and many users complain that Windows is unstable after they've
loaded a whole truck load of poorly written 3rd party device drivers.

> and on the post where you started going to left field.on NWLink and NetBIOS.

Go back and read Duane, you mentioned IPSec protecting Netbios over
NWLink. I can pick the post and requote it if you like?

> *university/college/boy -- ass-wipe*. <g> and <EOR>

Do you feel inferior Duane is that it?, how was it in "the hood"?

David.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

"David Taylor" <djtaylor@bigfoot.com> wrote in message
news:MPG.1da0706313bab0c2989e5e@news.cable.ntlworld.com...
>> Who cares about what the OP is talking about?
>
> That's generally the point of a thread, to discuss the original
> question! :)
>
>> I been using it for a couple of years and that's after someone made me
>> aware
>> of it so how can it be new to me? I have made posts about using IPsec as
>> a
>
> Duane said "But until now, I was not aware of how powerful of a solution
> IPsec is
> and its ability to be used in a FW like manner"

So what? My use of IPsec was behind a NAT router and BlackIce to
*supplement* them both as neither one of them had the ability to stop
outbound traffic from a machine. Now, I am out on the road on a dial-up
connection a direct connection to the Internet and can fully understand the
power of IPsec as a packet filtering solution.


>
>> O/S(s) are not aware that it's even there. And many users *bitch* about
>> the
>> XP O/S FW not being able to stop outbound traffic .However, with the use
>> of
>
> Yes and many users complain that Windows is unstable after they've
> loaded a whole truck load of poorly written 3rd party device drivers.
>
>> and on the post where you started going to left field.on NWLink and
>> NetBIOS.
>
> Go back and read Duane, you mentioned IPSec protecting Netbios over
> NWLink. I can pick the post and requote it if you like?

There you go with another one of your *bitch* moves. You said NetBIOS over
TCP IP not me. What I should have said was the NetBIOS port that even BI
protects. But just keep in mind you're the greatest guru of ALL TIMES not
me.

>
>> *university/college/boy -- ass-wipe*. <g> and <EOR>
>
> Do you feel inferior Duane is that it?, how was it in "the hood"?

And I have been to college too but I don't flaunt it like I have seen you
do it the onetime I read a post that you made to some one you flaunted it. .
What you can do for me is kiss my BLACK ass that's what you can do. You put
your pants on one leg at a time and a POS like you will never be better than
me. You are nothing but a somewhat educated POS.

And you're a dime a dozen out here on the Internet.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

"
> That's generally the point of a thread, to discuss the original
> question! :)
>

Wait just a damn minute here you lurking *clown*. You made some posts to me
and I cannot do the same with you as you went out of your way to do it? GTF
out of here with this. You POS it is not your show in this NG or the
Internet. You may think that it is your show, your NG, and your Internet and
apparently your world. But you can rest assured that it's not. :)
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> And I have been to college too but I don't flaunt it like I have seen you
> do it the onetime I read a post that you made to some one you flaunted it. .

You're so funny Duane, ONE guy asked and I answered his question. You
call that flaunting it to reply to his question "where did you learn
stuff"? You have issues.

> What you can do for me is kiss my BLACK ass that's what you can do. You put
> your pants on one leg at a time and a POS like you will never be better than
> me. You are nothing but a somewhat educated POS.

Yep, you really do have a complex. Get therapy or grow up.
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

David Taylor wrote:
>>Who cares about what the OP is talking about?
>
>
> That's generally the point of a thread, to discuss the original
> question! :)

I agree that 'trolling' was not a good word; I ought to say:

personnal argumentation with insults and useless challenging ... to fight about
un-interesting personnal qualifications/abilities.

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

> personnal argumentation with insults and useless challenging ... to fight about
> un-interesting personnal qualifications/abilities.

He started it! 😛
 
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)

>>are you sure ?
>
>
> Yes, I'm sure it's bridging.
>
>
>>then, what is my hand setted up gateway doing ???
>
>
> That's the router section. Think of a "wireless router" as a
> "wireless access point" glued to an "ethernet router". If done in
> seperate boxes, the ethernet output from the access point would go to
> one of the LAN inputs of the "ethernet router". When you set the IP
> addresses and all that, you're setting the router section. The only
> exception is that a stand along access point requires an IP address to
> do configurations and system settings. That IP address is only use
> for configuration and has nothing to do with the traffic.

learn abit about the french product called 'freebox':
it natively support wireless routing, and it is REALLY A ROUTER:
software conf can activate (or not) routing to wireless; by default it is off and
you can only access wired part.

Pb about this device is that the manifacturer does not sell it. It is an afforded
part to customer who pay for internet access ...

I mean that in this device, the wireless card is not briged.

>>4 IPs
>>and clients on any network can not even ping any other IP than the NIC of my gateway
>>it is connected to ... not even the IP of wireless card if he is on wired NIC ...
>
>
> Wanna bet? If you ignore the router part of the puzzle and just play
> with an access point, the IP address of the access point can be
> literally anything. In fact, that's exactly what I do on wireless
> systems that I don't want the users to tinker with the access points.
> I set the management IP address of the access point to something
> that's out of the usual 192.168.1.0/24 block.

what is your point in this part ?

>>what happens is that for simplicity, and dummy compliance, all manifacturers do
>>brige wireless to wired ... BUT on all firewalling tutos, you will find that this
>>kind of briging DO require to be activated ... aka is NOT available before you
>>explicitely ask for it.
>
> Sorry. I don't understand what you're asking or saying.

hmmm, did you ever try to activate WDS ?
did you read routing table of a WRT54g ?

if yes, read me again ...

>>WPA is hardware encryption: next year it will be broken = next year I can buy a new
>>router, and ask all my clients to buy new cards ...
>
> That's why I suggested you seperate the router function (with VPN) and
> the wireless function. When the next great exploits or new acronyms
> come out, you don't have to toss everything and start over.

I can perfectly well do it on my old pentium 120 ...

question is: can ahardware router do it for me ?

> Good luck. IPsec is no fun to setup. Lots of settings. Lots of
> potential incompatibilities between servers and clients. Lots of
> things to go wrong. To the best of my knowledge, nobody has a
> non-manual IPSec VPN setup.

that why I ask hardware device

(but still, I expect this kind of hardware to be upgradable ...
when WPA is encoded (let say) into silicon, IPSEC ought to be encoded into FLASH device)

> Most systems I've seen use a common /24 IP block for everything. If
> there's a VPN server in the system, the VPN server delivers an IP
> address through the tunnel to the client, which is used instead of the
> DHCP assigned IP address. I think that's what you're talking about.

some companies have over 10000 box in a single building: if you use only hub and
switches, you need a star network, where the root switch may saturate with a 100gb
.... because if two end branch clients want to exchange, they are likely to have to
come back to root switch ... when a routed network can be designed as islands, then
islands can be interconnected a smart way.

I have been customer in a network you describe: it was deadly slow and unstable:
breaking the root switch shotdown whole the network ... for example when you unplug
the switch the leads to the DHCP server room ...

--
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o< If computing were an exact science, IT engineers would not have work >o_/