[
<
]
[
>
]
[
<<
]
[
Up
]
[ >> ]
[
Top
]
[
Contents
]
[
Index
]
[
?
]
Concept Index
Jump to:
A
B
C
D
E
F
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Index Entry
Section
A
ACK
6.3.1 Authentication protocol
ADD_EDGE
6.2 The meta-protocol
ADD_SUBNET
6.2 The meta-protocol
Address
4.4.2 Host configuration variables
AddressFamily
4.4.1 Main configuration variables
ANS_KEY
6.2 The meta-protocol
arp
4.6 Network interfaces
arp
5.2 Error messages
authentication
6.3.1 Authentication protocol
B
binary package
3.1 Building and installing tinc
BindToInterface
4.4.1 Main configuration variables
C
Cabal
6.3 About tinc's encryption and other security-related issues.
CHAL_REPLY
6.3.1 Authentication protocol
CHALLENGE
6.3.1 Authentication protocol
CIDR notation
4.4.2 Host configuration variables
Cipher
4.4.2 Host configuration variables
client
4.3 How connections work
command line
5.1 Runtime options
Compression
4.4.2 Host configuration variables
connection
6.1 The connection
ConnectTo
4.4.1 Main configuration variables
copyright
D
daemon
5. Running tinc
data-protocol
6.1.2 The meta-connection
Debian
2.1 Configuring the kernel
debug level
5.1 Runtime options
DEL_EDGE
6.2 The meta-protocol
Device
4.4.1 Main configuration variables
device files
3.2.1 Device files
Digest
4.4.2 Host configuration variables
E
encapsulating
6.1.1 The UDP tunnel
encryption
6.3.2 Encryption of network packet
ethertap
2.1 Configuring the kernel
example
4.7 Example configuration
F
frame type
6.1.1 The UDP tunnel
FreeBSD
1.3.2 FreeBSD
H
hardware address
4.6 Network interfaces
Hostnames
4.4.1 Main configuration variables
hub
4.4.1 Main configuration variables
I
ID
6.3.1 Authentication protocol
ifconfig
4.6 Network interfaces
IndirectData
4.4.2 Host configuration variables
Interface
4.4.1 Main configuration variables
IRC
7.1 Contact information
K
Kernel-HOWTO
2.1 Configuring the kernel
key generation
4.5 Generating keypairs
KEY_CHANGED
6.2 The meta-protocol
KeyExpire
4.4.1 Main configuration variables
L
libraries
2.2 Libraries
license
License
Linux
1.3.1 Linux
M
MAC address
4.6 Network interfaces
MACExpire
4.4.1 Main configuration variables
MACLength
4.4.2 Host configuration variables
meta-protocol
6.1.2 The meta-connection
META_KEY
6.3.1 Authentication protocol
Mode
4.4.1 Main configuration variables
multiple networks
4.2 Multiple networks
N
Name
4.4.1 Main configuration variables
netlink_dev
2.1 Configuring the kernel
netmask
4.6 Network interfaces
netname
4.2 Multiple networks
Network Administrators Guide
4.1 Configuration introduction
O
OpenBSD
1.3.3 OpenBSD
OpenSSL
2.2.1 OpenSSL
options
5.1 Runtime options
P
PEM format
4.4.2 Host configuration variables
PING
6.2 The meta-protocol
PingTimeout
4.4.1 Main configuration variables
platforms
1.3 Supported platforms
PONG
6.2 The meta-protocol
Port
4.4.2 Host configuration variables
port numbers
`
/etc/services
'
PriorityInheritance
4.4.1 Main configuration variables
private
1.1 Virtual Private Networks
PrivateKey
4.4.1 Main configuration variables
PrivateKeyFile
4.4.1 Main configuration variables
PublicKey
4.4.2 Host configuration variables
PublicKeyFile
4.4.2 Host configuration variables
R
RedHat
2.1 Configuring the kernel
release
1.3 Supported platforms
REQ_KEY
6.2 The meta-protocol
requirements
2.2 Libraries
router
4.4.1 Main configuration variables
runtime options
5.1 Runtime options
S
scalability
1.2 tinc
server
4.3 How connections work
Solaris
1.3.4 Solaris
Subnet
4.4.2 Host configuration variables
SVPN
6.3 About tinc's encryption and other security-related issues.
switch
4.4.1 Main configuration variables
T
TCP
6.1.2 The meta-connection
TCPonly
4.4.2 Host configuration variables
tinc
1. Introduction
TINC
6.3 About tinc's encryption and other security-related issues.
tinc-up
4.6 Network interfaces
tincd
1.2 tinc
Traditional VPNs
1.2 tinc
tun
2.1 Configuring the kernel
U
UDP
6.1.1 The UDP tunnel
UDP
6.3.2 Encryption of network packet
Jump to:
A
B
C
D
E
F
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
[
<<
]
[ >> ]
[
Top
]
[
Contents
]
[
Index
]
[
?
]
This document was generated by
root
on
April, 11 2002
using
texi2html