[Top] | [Contents] | [Index] | [ ? ] |
CIPE (the name is shortened from Crypto IP Encapsulation) is a package for an encrypting IP tunnel device. This can be used to build encrypting routers for VPN (Virtual Private Networks) and similar applications.
Copyright (C) 1996--2004 Olaf Titz. All rights reserved. This program including its documentation is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. The author can be contacted through the electronic mail address Olaf.Titz@inka.de. |
1. Introduction About routing, VPNs and encryption. 2. Installing the CIPE software package 3. Configuration of the CIPE software Configuration. 4. The PKCIPE tool The PKCIPE public key tool. 5. Usage examples Examples of CIPE configurations. 6. Protocol descriptions How the protocols work internally. 7. Odds and ends Concept Index Index.
-- The Detailed Node Listing ---
Introduction
1.1 Network layers and encryption Where encryption takes place. 1.2 IP routing and Virtual Private Networks About IP routing and VPNs. 1.3 How CIPE works The encapsulation method employed here. 1.4 CIPEs software components Which pieces of software CIPE consists of. 1.5 Notes on internals A look under the hood of CIPE.
Installing the CIPE software package
2.1 Prerequisites What you need before installing. 2.2 Protocols and ciphers Important compile-time options to select. 2.3 Advanced compiling Configuring the compile for different targets. 2.4 Installation Compiling and installing the software. 2.5 Compilation errors If something goes wrong. 2.6 Running CIPE Running the software.
Running CIPE
2.6.1 Program Names How the components of CIPE are named. 2.6.2 Loading the module Loading the kernel module. 2.6.3 Running the ciped
daemonRunning the daemon.
Configuration of the CIPE software
3.1 Specifying options How CIPE gets its parameters. 3.2 List of all parameters All valid and needed parameters. 3.3 Incompatibility of keys to older CIPE versions An incompatibility between Version 1.4 and earlier. 3.4 Working with SOCKS Routing with CIPE over a SOCKS5 relayer. 3.5 Dynamic carrier addresses How to deal with dynamic IP address assignment. 3.6 Error handling in ciped
How ciped deals with errors.
The PKCIPE tool
4.1 How it works Short overview on PKCIPE. 4.2 Public Keys What public keys are and how to use them. 4.3 Running the pkcipe
programRunning the pkcipe program.
Usage examples
5.1 General tips General useful tips on CIPE configuration. 5.2 Example 1 The classic VPN setups. 5.3 Example 2 A PKCIPE setup. 5.4 Connection modes Overview on different carrier network situations.
Protocol descriptions
6.1 The CIPE protocol Encrypted IP encapsulation used by CIPE. 6.2 The PKCIPE Protocol Public-key based setup and key exchange.
$Id: cipe.texinfo,v 1.37 2004/08/03 08:21:04 olaf81825 Exp $