1 | These files are configuration files for "our" internal network. |
1 | These files are configuration files for "our" internal network. |
2 | |
2 | |
3 | It is highly non-trivial, so don't use this configuration as the basis of |
3 | It is highly non-trivial, so don't use this configuration as the basis of |
4 | your network unless you know what you are doing. |
4 | your network unless you know what you are doing. |
5 | |
5 | |
6 | It features: around 15 hosts, many of them have additional networks behind |
6 | It features: around 30 hosts, many of them have additional networks behind |
7 | them and use an assortment of different tunneling protocols. The vpn is |
7 | them and use an assortment of different tunneling protocols. The vpn is |
8 | fully routed, no arp is used at all. |
8 | fully routed, no arp is used at all. |
9 | |
9 | |
10 | The public IP addresses of connecting nodes are automatically registered |
10 | The public IP addresses of connecting nodes are automatically registered |
11 | via dns on the node ruth, using a node-up/node-down script. |
11 | via dns on the node ruth, using a node-up/node-down script. |