… | |
… | |
843 | <p /> |
843 | <p /> |
844 | It is designed to be very simple and robust (cipher selection done at |
844 | It is designed to be very simple and robust (cipher selection done at |
845 | compiletime etc.), and easy to setup (only a single config file shared |
845 | compiletime etc.), and easy to setup (only a single config file shared |
846 | unmodified between all hosts). |
846 | unmodified between all hosts). |
847 | <p /> |
847 | <p /> |
848 | Vpn hosts can neither sniff nor fake packets, that is, you can use |
848 | VPN hosts can neither sniff nor fake packets, that is, you can use |
849 | MAC-based filtering to ensure authenticity of packets even from member |
849 | MAC-based filtering to ensure authenticity of packets even from member |
850 | nodes. |
850 | nodes. |
851 | <p /> |
851 | <p /> |
852 | GVPE can also be used to tunnel into some vpn network using a variety of |
852 | GVPE can also be used to tunnel into some vpn network using a variety of |
853 | protocols (raw IP, UDP, TCP, HTTPS-proxy-connect, ICMP and DNS). It is, |
853 | protocols (raw IP, UDP, TCP, HTTPS-proxy-connect, ICMP and DNS). It is, |