This is at http://www.sandelman.ottawa.on.ca/SSW/ietf/wavesec/FreeSWAN-SecWLan.txt 1. Install FreeSWAN. (XXX add notes on various ways of doing this) 2. Get your public key into DNS. If you are running Dynamic DNS, you can put this into your forward zone easily with something like the following, if you substiute your your private file, server and zone info. #!/bin/sh cd /etc/namedb host=$1 keyrec=`ipsec showhostkey | sed 1d | (read name class type fourtytwo rest && echo $name 3600 $class $type 16896 $rest)` * nsupdate -d -v -k K$host.+157+26817.private < 0.0.0.0/0 => %trap You will likely also see a line like: 6 166.63.182.233/32 -> 192.139.46.73/32 => %hold or 6 166.63.182.233/32 -> 192.139.46.73/32 => tun0x1002@192.139.46.38 If the former, then your system is still trying to negotiate the tunnel. If the later, then the tunnel is in fact up. $Id: FreeSWAN-WAVEsec.txt,v 1.1 2002/05/22 22:24:57 mcr Exp $