Break long lines from the previous commit.

Translators please ignore.
This commit is contained in:
Martin Heinen 2003-09-01 23:11:15 +00:00
parent d2db58b9b0
commit c0c5a69f2e
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=18051

View file

@ -3491,8 +3491,9 @@ options IPSEC_ESP
<programlisting>A.B.C.D secret</programlisting>
<para>That is, the public IP address of the remote end, and the
same secret key. <filename>psk.txt</filename> must be mode <literal>0600</literal>
(i.e., only read/write to <username>root</username>) before racoon will run.</para>
same secret key. <filename>psk.txt</filename> must be mode
<literal>0600</literal> (i.e., only read/write to
<username>root</username>) before racoon will run.</para>
<para>You must run racoon on both gateway machines. You will
also need to add some firewall rules to allow the IKE traffic,
@ -3578,7 +3579,8 @@ ipfw add 1 allow udp from W.X.Y.Z to A.B.C.D isakmp
</textobject>
</mediaobject>
<para>This encapsulation is carried out by the <devicename>gif</devicename> device. As
<para>This encapsulation is carried out by the
<devicename>gif</devicename> device. As
you can see, the packet now has real IP addresses on the outside,
and our original packet has been wrapped up as data inside the
packet that will be put out on the Internet.</para>
@ -3720,13 +3722,14 @@ ipfw add 1 allow ipencap from W.X.Y.Z to A.B.C.D
<para>When they are received by the far end of the VPN they will
first be decrypted (using the security associations that have
been negotiated by racoon). Then they will enter the <devicename>gif</devicename>
interface, which will unwrap the second layer, until you are left
with the innermost packet, which can then travel in to the inner
network.</para>
been negotiated by racoon). Then they will enter the
<devicename>gif</devicename> interface, which will unwrap
the second layer, until you are left with the innermost
packet, which can then travel in to the inner network.</para>
<para>You can check the security using the same &man.ping.8; test from
earlier. First, log in to the <hostid role="ipaddr">A.B.C.D</hostid> gateway machine, and
earlier. First, log in to the
<hostid role="ipaddr">A.B.C.D</hostid> gateway machine, and
run:</para>
<programlisting>tcpdump dst host 192.168.2.1</programlisting>