Previous:
About us
, Up:
Top
Concept Index
ACK
:
Authentication protocol
ADD_EDGE
:
The meta-protocol
ADD_SUBNET
:
The meta-protocol
Address
:
Host configuration variables
AddressFamily
:
Main configuration variables
ANS_KEY
:
The meta-protocol
authentication
:
Authentication protocol
binary package
:
Building and installing tinc
BindToAddress
:
Main configuration variables
BindToInterface
:
Main configuration variables
Broadcast
:
Main configuration variables
Cabal
:
Security
CHAL_REPLY
:
Authentication protocol
CHALLENGE
:
Authentication protocol
CIDR notation
:
Host configuration variables
Cipher
:
Host configuration variables
ClampMSS
:
Host configuration variables
client
:
How connections work
command line
:
Runtime options
Compression
:
Host configuration variables
connection
:
The connection
ConnectTo
:
Main configuration variables
daemon
:
Running tinc
data-protocol
:
The meta-connection
debug level
:
Runtime options
debug levels
:
Debug levels
DecrementTTL
:
Main configuration variables
DEL_EDGE
:
The meta-protocol
DEL_SUBNET
:
The meta-protocol
DEVICE
:
Scripts
Device
:
Main configuration variables
device files
:
Device files
DeviceType
:
Main configuration variables
Digest
:
Host configuration variables
DirectOnly
:
Main configuration variables
dummy
:
Main configuration variables
encapsulating
:
The UDP tunnel
encryption
:
Encryption of network packets
environment variables
:
Scripts
example
:
Example configuration
exec
:
Main configuration variables
Forwarding
:
Main configuration variables
frame type
:
The UDP tunnel
GraphDumpFile
:
Main configuration variables
Hostnames
:
Main configuration variables
http
:
Main configuration variables
hub
:
Main configuration variables
ID
:
Authentication protocol
IffOneQueue
:
Main configuration variables
IndirectData
:
Host configuration variables
INTERFACE
:
Scripts
Interface
:
Main configuration variables
IRC
:
Contact information
key generation
:
Generating keypairs
KEY_CHANGED
:
The meta-protocol
KeyExpire
:
Main configuration variables
libraries
:
Libraries
license
:
OpenSSL
LocalDiscovery
:
Main configuration variables
lzo
:
lzo
MACExpire
:
Main configuration variables
MACLength
:
Host configuration variables
MaxTimeout
:
Main configuration variables
meta-protocol
:
The meta-connection
META_KEY
:
Authentication protocol
Mode
:
Main configuration variables
multicast
:
Main configuration variables
multiple networks
:
Multiple networks
NAME
:
Scripts
Name
:
Main configuration variables
netmask
:
Network interfaces
NETNAME
:
Scripts
netname
:
Multiple networks
Network Administrators Guide
:
Configuration introduction
NODE
:
Scripts
OpenSSL
:
OpenSSL
options
:
Runtime options
PEM format
:
Host configuration variables
PING
:
The meta-protocol
PingInterval
:
Main configuration variables
PingTimeout
:
Main configuration variables
platforms
:
Supported platforms
PMTU
:
Host configuration variables
PMTUDiscovery
:
Host configuration variables
PONG
:
The meta-protocol
Port
:
Host configuration variables
port numbers
:
Other files
PriorityInheritance
:
Main configuration variables
private
:
Virtual Private Networks
PrivateKey
:
Main configuration variables
PrivateKeyFile
:
Main configuration variables
ProcessPriority
:
Main configuration variables
Proxy
:
Main configuration variables
PublicKey
:
Host configuration variables
PublicKeyFile
:
Host configuration variables
raw_socket
:
Main configuration variables
release
:
Supported platforms
REMOTEADDRESS
:
Scripts
REMOTEPORT
:
Scripts
ReplayWindow
:
Main configuration variables
REQ_KEY
:
The meta-protocol
requirements
:
Libraries
router
:
Main configuration variables
runtime options
:
Runtime options
scalability
:
tinc
scripts
:
Scripts
server
:
How connections work
signals
:
Signals
socks4
:
Main configuration variables
socks5
:
Main configuration variables
StrictSubnets
:
Main configuration variables
SUBNET
:
Scripts
Subnet
:
Host configuration variables
Subnet weight
:
Host configuration variables
SVPN
:
Security
switch
:
Main configuration variables
TCP
:
The meta-connection
TCPonly
:
Host configuration variables
TINC
:
Security
tinc
:
Introduction
tinc-down
:
Scripts
tinc-up
:
Network interfaces
tinc-up
:
Scripts
tincd
:
tinc
traditional VPNs
:
tinc
tunifhead
:
Main configuration variables
TunnelServer
:
Main configuration variables
tunnohead
:
Main configuration variables
UDP
:
Encryption of network packets
UDP
:
The UDP tunnel
UDPRcvBuf
:
Main configuration variables
UDPSndBuf
:
Main configuration variables
UML
:
Main configuration variables
Universal tun/tap
:
Configuration of Linux kernels
VDE
:
Main configuration variables
virtual
:
Virtual Private Networks
virtual network device
:
The UDP tunnel
VPN
:
Virtual Private Networks
vpnd
:
tinc
website
:
Contact information
WEIGHT
:
Scripts
zlib
:
zlib
Table of Contents
Top
1 Introduction
1.1 Virtual Private Networks
1.2 tinc
1.3 Supported platforms
2 Preparations
2.1 Configuring the kernel
2.1.1 Configuration of Linux kernels
2.1.2 Configuration of FreeBSD kernels
2.1.3 Configuration of OpenBSD kernels
2.1.4 Configuration of NetBSD kernels
2.1.5 Configuration of Solaris kernels
2.1.6 Configuration of Darwin (MacOS/X) kernels
2.1.7 Configuration of Windows
2.2 Libraries
2.2.1 OpenSSL
2.2.2 zlib
2.2.3 lzo
3 Installation
3.1 Building and installing tinc
3.1.1 Darwin (MacOS/X) build environment
3.1.2 Cygwin (Windows) build environment
3.1.3 MinGW (Windows) build environment
3.2 System files
3.2.1 Device files
3.2.2 Other files
4 Configuration
4.1 Configuration introduction
4.2 Multiple networks
4.3 How connections work
4.4 Configuration files
4.4.1 Main configuration variables
4.4.2 Host configuration variables
4.4.3 Scripts
4.4.4 How to configure
4.5 Generating keypairs
4.6 Network interfaces
4.7 Example configuration
5 Running tinc
5.1 Runtime options
5.2 Signals
5.3 Debug levels
5.4 Solving problems
5.5 Error messages
5.6 Sending bug reports
6 Technical information
6.1 The connection
6.1.1 The UDP tunnel
6.1.2 The meta-connection
6.2 The meta-protocol
6.3 Security
6.3.1 Authentication protocol
6.3.2 Encryption of network packets
6.3.3 Security issues
7 Platform specific information
7.1 Interface configuration
7.2 Routes
8 About us
8.1 Contact information
8.2 Authors
Concept Index