[
<
]
[
>
]
[
<<
]
[
Up
]
[
>>
]
[
Top
]
[
Contents
]
[
Index
]
[
?
]
Concept Index
Jump to:
A
B
C
D
E
F
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Index Entry
Section
A
ACK
6.3.1 Authentication protocol
ADD_EDGE
6.2 The meta-protocol
ADD_SUBNET
6.2 The meta-protocol
Address
4.4.2 Host configuration variables
AddressFamily
4.4.1 Main configuration variables
ANS_KEY
6.2 The meta-protocol
authentication
6.3.1 Authentication protocol
B
binary package
3.1 Building and installing tinc
BindToAddress
4.4.1 Main configuration variables
BindToInterface
4.4.1 Main configuration variables
BlockingTCP
4.4.1 Main configuration variables
C
Cabal
6.3 Security
CHAL_REPLY
6.3.1 Authentication protocol
CHALLENGE
6.3.1 Authentication protocol
CIDR notation
4.4.2 Host configuration variables
Cipher
4.4.2 Host configuration variables
client
4.3 How connections work
command line
5.1 Runtime options
Compression
4.4.2 Host configuration variables
connection
6.1 The connection
ConnectTo
4.4.1 Main configuration variables
copyright
D
daemon
5. Running tinc
data-protocol
6.1.2 The meta-connection
debug level
5.1 Runtime options
debug levels
5.3 Debug levels
DEL_EDGE
6.2 The meta-protocol
DEL_SUBNET
6.2 The meta-protocol
Device
4.4.1 Main configuration variables
DEVICE
4.4.3 Scripts
device files
3.2.1 Device files
Digest
4.4.2 Host configuration variables
E
encapsulating
6.1.1 The UDP tunnel
encryption
6.3.2 Encryption of network packets
environment variables
4.4.3 Scripts
ethertap
2.1.1 Configuration of Linux kernels 2.1.60 up to 2.4.0
example
4.7 Example configuration
F
frame type
6.1.1 The UDP tunnel
H
Hostnames
4.4.1 Main configuration variables
hub
4.4.1 Main configuration variables
I
ID
6.3.1 Authentication protocol
IndirectData
4.4.2 Host configuration variables
Interface
4.4.1 Main configuration variables
INTERFACE
4.4.3 Scripts
IRC
8.1 Contact information
K
key generation
4.5 Generating keypairs
KEY_CHANGED
6.2 The meta-protocol
KeyExpire
4.4.1 Main configuration variables
L
libraries
2.2 Libraries
license
License
lzo
2.2.3 lzo
M
MACExpire
4.4.1 Main configuration variables
MACLength
4.4.2 Host configuration variables
meta-protocol
6.1.2 The meta-connection
META_KEY
6.3.1 Authentication protocol
Mode
4.4.1 Main configuration variables
multiple networks
4.2 Multiple networks
N
NAME
4.4.3 Scripts
Name
4.4.1 Main configuration variables
netmask
4.6 Network interfaces
NETNAME
4.4.3 Scripts
netname
4.2 Multiple networks
Network Administrators Guide
4.1 Configuration introduction
NODE
4.4.3 Scripts
O
OpenSSL
2.2.1 OpenSSL
options
5.1 Runtime options
P
PEM format
4.4.2 Host configuration variables
PING
6.2 The meta-protocol
PingTimeout
4.4.1 Main configuration variables
platforms
1.3 Supported platforms
PONG
6.2 The meta-protocol
Port
4.4.2 Host configuration variables
port numbers
`
/etc/services
'
PriorityInheritance
4.4.1 Main configuration variables
private
1.1 Virtual Private Networks
PrivateKey
4.4.1 Main configuration variables
PrivateKeyFile
4.4.1 Main configuration variables
PublicKey
4.4.2 Host configuration variables
PublicKeyFile
4.4.2 Host configuration variables
R
release
1.3 Supported platforms
REMOTEADDRESS
4.4.3 Scripts
REMOTEPORT
4.4.3 Scripts
REQ_KEY
6.2 The meta-protocol
requirements
2.2 Libraries
router
4.4.1 Main configuration variables
runtime options
5.1 Runtime options
S
scalability
1.2 tinc
scripts
4.4.3 Scripts
server
4.3 How connections work
signals
5.2 Signals
SUBNET
4.4.3 Scripts
Subnet
4.4.2 Host configuration variables
SVPN
6.3 Security
switch
4.4.1 Main configuration variables
T
TCP
6.1.2 The meta-connection
TCPonly
4.4.2 Host configuration variables
tinc
1. Introduction
TINC
6.3 Security
tinc-down
4.4.3 Scripts
tinc-up
4.4.3 Scripts
tinc-up
4.6 Network interfaces
tincd
1.2 tinc
traditional VPNs
1.2 tinc
TunnelServer
4.4.1 Main configuration variables
Jump to:
A
B
C
D
E
F
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
[
<<
]
[
>>
]
[
Top
]
[
Contents
]
[
Index
]
[
?
]
This document was generated by
root
on
May, 15 2005
using
texi2html