ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/doc/gvpe.5
(Generate patch)

Comparing gvpe/doc/gvpe.5 (file contents):
Revision 1.10 by pcg, Mon Sep 1 05:31:28 2008 UTC vs.
Revision 1.11 by pcg, Wed Sep 3 04:58:46 2008 UTC

145nodes over an untrusted network. This document first gives an introduction 145nodes over an untrusted network. This document first gives an introduction
146to VPNs in general and then describes the specific implementation of \s-1GVPE\s0. 146to VPNs in general and then describes the specific implementation of \s-1GVPE\s0.
147.Sh "\s-1WHAT\s0 \s-1IS\s0 A \s-1VPN\s0?" 147.Sh "\s-1WHAT\s0 \s-1IS\s0 A \s-1VPN\s0?"
148.IX Subsection "WHAT IS A VPN?" 148.IX Subsection "WHAT IS A VPN?"
149\&\s-1VPN\s0 is an acronym, it stands for: 149\&\s-1VPN\s0 is an acronym, it stands for:
150.IP "" 4 150.IP "Virtual" 4
151.IX Xref "Virtual" 151.IX Item "Virtual"
152Virtual means that no physical network is created (of course), but a 152Virtual means that no physical network is created (of course), but a
153network is \fIemulated\fR by creating multiple tunnels between the member 153network is \fIemulated\fR by creating multiple tunnels between the member
154nodes by encapsulating and sending data over another transport network. 154nodes by encapsulating and sending data over another transport network.
155.Sp 155.Sp
156Usually the emulated network is a normal \s-1IP\s0 or Ethernet, and the transport 156Usually the emulated network is a normal \s-1IP\s0 or Ethernet, and the transport
157network is the Internet. However, using a \s-1VPN\s0 system like \s-1GVPE\s0 to connect 157network is the Internet. However, using a \s-1VPN\s0 system like \s-1GVPE\s0 to connect
158nodes over other untrusted networks such as Wireless \s-1LAN\s0 is not uncommon. 158nodes over other untrusted networks such as Wireless \s-1LAN\s0 is not uncommon.
159.IP "" 4 159.IP "Private" 4
160.IX Xref "Private" 160.IX Item "Private"
161Private means that non-participating nodes cannot decode (\*(L"sniff)\*(R" nor 161Private means that non-participating nodes cannot decode (\*(L"sniff)\*(R" nor
162inject (\*(L"spoof\*(R") packets. This means that nodes can be connected over 162inject (\*(L"spoof\*(R") packets. This means that nodes can be connected over
163untrusted networks such as the public Internet without fear of being 163untrusted networks such as the public Internet without fear of being
164eavesdropped while at the same time being able to trust data sent by other 164eavesdropped while at the same time being able to trust data sent by other
165nodes. 165nodes.
166.Sp 166.Sp
167In the case of \s-1GVPE\s0, even participating nodes cannot sniff packets 167In the case of \s-1GVPE\s0, even participating nodes cannot sniff packets
168send to other nodes or spoof packets as if sent from other nodes, so 168send to other nodes or spoof packets as if sent from other nodes, so
169communications between any two nodes is private to those two nodes. 169communications between any two nodes is private to those two nodes.
170.IP "" 4 170.IP "Network" 4
171.IX Xref "Network" 171.IX Item "Network"
172Network means that more than two parties can participate in the network, 172Network means that more than two parties can participate in the network,
173so for instance it's possible to connect multiple branches of a company 173so for instance it's possible to connect multiple branches of a company
174into a single network. Many so-called \*(L"\s-1VPN\s0\*(R" solutions only create 174into a single network. Many so-called \*(L"\s-1VPN\s0\*(R" solutions only create
175point-to-point tunnels, which in turn can be used to build larger 175point-to-point tunnels, which in turn can be used to build larger
176networks. 176networks.

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines