VPN Implementation
The implementation of a Virtual Private Network (VPN)
Ivo Timmermans <
zarq@iname.com
>
Introduction
Overview
The Connection
Connection Metadata
Encryption
Key Exchange
Authentification
The Protocol
Setting up your Computer
Configuring the kernel
Configuring for Modules
Files Needed
Device files
`/etc/networks'
`/etc/services'
Concept Index
This document was generated on 16 December 1998 using the
texi2html
translator version 1.52.