Previous:
About us
, Up:
Top
[
Contents
][
Index
]
Concept Index
Jump to:
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Index Entry
Section
A
ACK
:
Authentication protocol
Address
:
Host configuration variables
AddressFamily
:
Main configuration variables
ADD_EDGE
:
The meta-protocol
ADD_SUBNET
:
The meta-protocol
ANS_KEY
:
The meta-protocol
authentication
:
Authentication protocol
B
binary package
:
Building and installing tinc
BindToAddress
:
Main configuration variables
BindToInterface
:
Main configuration variables
Broadcast
:
Main configuration variables
C
Cabal
:
Security
CHALLENGE
:
Authentication protocol
CHAL_REPLY
:
Authentication protocol
CIDR notation
:
Host configuration variables
Cipher
:
Host configuration variables
ClampMSS
:
Host configuration variables
client
:
How connections work
command line
:
Runtime options
Compression
:
Host configuration variables
connection
:
The connection
ConnectTo
:
Main configuration variables
D
daemon
:
Running tinc
data-protocol
:
The meta-connection
debug level
:
Runtime options
debug levels
:
Debug levels
DecrementTTL
:
Main configuration variables
DEL_EDGE
:
The meta-protocol
DEL_SUBNET
:
The meta-protocol
Device
:
Main configuration variables
DEVICE
:
Scripts
device files
:
Device files
DeviceType
:
Main configuration variables
Digest
:
Host configuration variables
DirectOnly
:
Main configuration variables
dummy
:
Main configuration variables
E
encapsulating
:
The UDP tunnel
encryption
:
Encryption of network packets
environment variables
:
Scripts
example
:
Example configuration
exec
:
Main configuration variables
F
Forwarding
:
Main configuration variables
frame type
:
The UDP tunnel
G
GraphDumpFile
:
Main configuration variables
H
Hostnames
:
Main configuration variables
http
:
Main configuration variables
hub
:
Main configuration variables
I
ID
:
Authentication protocol
IffOneQueue
:
Main configuration variables
IndirectData
:
Host configuration variables
Interface
:
Main configuration variables
INTERFACE
:
Scripts
IRC
:
Contact information
K
key generation
:
Generating keypairs
KeyExpire
:
Main configuration variables
KEY_CHANGED
:
The meta-protocol
L
libraries
:
Libraries
LibreSSL
:
LibreSSL/OpenSSL
license
:
LibreSSL/OpenSSL
LocalDiscovery
:
Main configuration variables
lzo
:
lzo
M
MACExpire
:
Main configuration variables
MACLength
:
Host configuration variables
MaxTimeout
:
Main configuration variables
meta-protocol
:
The meta-connection
META_KEY
:
Authentication protocol
Mode
:
Main configuration variables
multicast
:
Main configuration variables
multiple networks
:
Multiple networks
N
Name
:
Main configuration variables
NAME
:
Scripts
netmask
:
Network interfaces
netname
:
Multiple networks
NETNAME
:
Scripts
Network Administrators Guide
:
Configuration introduction
NODE
:
Scripts
O
OpenSSL
:
LibreSSL/OpenSSL
options
:
Runtime options
P
PEM format
:
Host configuration variables
PING
:
The meta-protocol
PingInterval
:
Main configuration variables
PingTimeout
:
Main configuration variables
platforms
:
Supported platforms
PMTU
:
Host configuration variables
PMTUDiscovery
:
Host configuration variables
PONG
:
The meta-protocol
Port
:
Host configuration variables
port numbers
:
Other files
PriorityInheritance
:
Main configuration variables
private
:
Virtual Private Networks
PrivateKey
:
Main configuration variables
PrivateKeyFile
:
Main configuration variables
ProcessPriority
:
Main configuration variables
Proxy
:
Main configuration variables
PublicKey
:
Host configuration variables
PublicKeyFile
:
Host configuration variables
R
raw_socket
:
Main configuration variables
release
:
Supported platforms
REMOTEADDRESS
:
Scripts
REMOTEPORT
:
Scripts
ReplayWindow
:
Main configuration variables
requirements
:
Libraries
REQ_KEY
:
The meta-protocol
router
:
Main configuration variables
runtime options
:
Runtime options
S
scalability
:
tinc
scripts
:
Scripts
server
:
How connections work
signals
:
Signals
socks4
:
Main configuration variables
socks5
:
Main configuration variables
StrictSubnets
:
Main configuration variables
Subnet
:
Host configuration variables
SUBNET
:
Scripts
Subnet weight
:
Host configuration variables
SVPN
:
Security
switch
:
Main configuration variables
systemd
:
Linux
T
TCP
:
The meta-connection
TCPonly
:
Host configuration variables
tinc
:
Introduction
TINC
:
Security
tinc-down
:
Scripts
tinc-up
:
Scripts
tinc-up
:
Network interfaces
tincd
:
tinc
traditional VPNs
:
tinc
tunifhead
:
Main configuration variables
TunnelServer
:
Main configuration variables
tunnohead
:
Main configuration variables
U
UDP
:
The UDP tunnel
UDP
:
Encryption of network packets
UDPRcvBuf
:
Main configuration variables
UDPSndBuf
:
Main configuration variables
UML
:
Main configuration variables
Universal tun/tap
:
Configuration of Linux kernels
utun
:
Main configuration variables
V
VDE
:
Main configuration variables
virtual
:
Virtual Private Networks
virtual network device
:
The UDP tunnel
VPN
:
Virtual Private Networks
vpnd
:
tinc
W
website
:
Contact information
WEIGHT
:
Scripts
Z
zlib
:
zlib
Jump to:
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Table of Contents
1 Introduction
1.1 Virtual Private Networks
1.2 tinc
1.3 Supported platforms
2 Preparations
2.1 Configuring the kernel
2.1.1 Configuration of Linux kernels
2.1.2 Configuration of FreeBSD kernels
2.1.3 Configuration of OpenBSD kernels
2.1.4 Configuration of NetBSD kernels
2.1.5 Configuration of Solaris kernels
2.1.6 Configuration of Darwin (Mac OS X) kernels
2.1.7 Configuration of Windows
2.2 Libraries
2.2.1 LibreSSL/OpenSSL
2.2.2 zlib
2.2.3 lzo
3 Installation
3.1 Building and installing tinc
3.1.1 Darwin (Mac OS X) build environment
3.1.2 Cygwin (Windows) build environment
3.1.3 MinGW (Windows) build environment
3.2 System files
3.2.1 Device files
3.2.2 Other files
4 Configuration
4.1 Configuration introduction
4.2 Multiple networks
4.3 How connections work
4.4 Configuration files
4.4.1 Main configuration variables
4.4.2 Host configuration variables
4.4.3 Scripts
4.4.4 How to configure
4.5 Generating keypairs
4.6 Network interfaces
4.7 Example configuration
5 Running tinc
5.1 Runtime options
5.2 Signals
5.3 Debug levels
5.4 Solving problems
5.5 Error messages
5.6 Sending bug reports
6 Technical information
6.1 The connection
6.1.1 The UDP tunnel
6.1.2 The meta-connection
6.2 The meta-protocol
6.3 Security
6.3.1 Authentication protocol
6.3.2 Encryption of network packets
6.3.3 Security issues
7 Platform specific information
7.1 Interface configuration
7.2 Routes
7.3 Automatically starting tinc
7.3.1 Linux
7.3.2 Windows
7.3.3 Other platforms
8 About us
8.1 Contact information
8.2 Authors
Concept Index
Previous:
About us
, Up:
Top
[
Contents
][
Index
]