On Fri, 2012-04-20 at 21:04 +0200, David Brown wrote: > On 20/04/12 20:08, Jim Pingle wrote: > > On 4/20/2012 12:23 PM, Gavin Will wrote: > >> Traditionally used IPSec VPN's for site to site links however with > >> replacing remote site routers with PFsense boxes I thought about using > >> Open VPN instead. > >> > >> Any pro's cons? > >> > >> I quite like the ability to push a route easily with OpenVPN. > > > > Off the top of my head... > > > > Pros for OpenVPN: > > * Plays nicer with NAT and other intermediate filtering, since it only > > requires a single UDP or TCP port > > * Able to route traffic arbitrarily on a basic VPN setup > > * No issues with reconnecting/disconnecting > > * Easy to add secondary peers > > * Very easy to setup a remote access VPN with authentication > > * Shared key mode works well with OSPF for dynamic routing > > > > Cons for OpenVPN: > > * Little in the way of vendor compatibility, mainly only found on OSS > > firewalls > > * People have a tendency to fear the unknown so they don't try it, or > > dislike it because it's unfamiliar. Once they drink the kool-aid though, > > they rarely stop. :-) > > > > Pros for IPsec: > > * Long-lived standard > > * Many implementations on many devices, can usually build a tunnel to > > just about anything > > * Fairly easy to build a tunnel between two firewalls > > * Familiarity, many people use it because they have used it before. > > > > Cons for IPsec: > > * Long history of problems reconnecting/rebuilding tunnels > > * Rare if devices support multiple peers > > * Implementations between vendors can often have quirks > > * Requires both UDP and ESP for Tunneled traffic > > * Remote access/mobile clients can have issues, but may work (see our > > ticket system for open issues) > > * Lots of problems traversing NAT or behind restrictive firewalls/networks > > * Routing arbitrary networks (not using Phase 2's in tunnel mode) > > requires IPsec in transport mode + GIF/GRE, which few vendors support. > > > > Jim > > I'd add another couple of pros for OpenVPN: > * It's easy to set up multiple independent OpenVPN VPN's on the same > server or client, running on different ports on the same IP address. > * If you don't mind installing a little extra software, it is easy to > use on lots of different clients. > * It's easy to set up an OpenVPN server in existing networks with > minimal changes - all you need is a port forward from the firewall > through to the OpenVPN server. > > We have several independent OpenVPN setups on a server, with clients > able to connect with different accesses. And some of our users have > multiple client setups on their laptops for connecting to many different > servers. >
How does either of these VPN approaches compare with using SSH Tunneling? (see various Linux Journal articles on this subject) Bob G _______________________________________________ List mailing list List@lists.pfsense.org http://lists.pfsense.org/mailman/listinfo/list