old-www/HOWTO/Cipe+Masq-1.html

77 lines
3.0 KiB
HTML

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<META NAME="GENERATOR" CONTENT="SGML-Tools 1.0.9">
<TITLE>The Linux Cipe+Masquerading mini-HOWTO: Introduction</TITLE>
<LINK HREF="Cipe+Masq-2.html" REL=next>
<LINK HREF="Cipe+Masq.html#toc1" REL=contents>
</HEAD>
<BODY>
<A HREF="Cipe+Masq-2.html">Next</A>
Previous
<A HREF="Cipe+Masq.html#toc1">Contents</A>
<HR>
<H2><A NAME="s1">1. Introduction</A></H2>
<P>This is the Linux Cipe+Masquerading mini-HOWTO. It shows how to setup a
Virtual Private Network between your LAN and other LAN's using Cipe on
linux masquerading firewall machines. It also shows an example masquerading
firewall configuration.
<P>
<H2><A NAME="ss1.1">1.1 Copyright statement</A>
</H2>
<P>C)opyright 1998, 1999 Anthony Ciaravalo,
<A HREF="mailto:acj@home.com">acj@home.com</A>
<P>Unless otherwise stated, Linux HOWTO documents are copyrighted by their
respective authors. Linux HOWTO documents may be reproduced and distributed
in whole or in part, in any medium physical or electronic, as long as
this copyright notice is retained on all copies. Commercial redistribution
is allowed and encouraged; however, the author would like to be notified of
any such distributions.
<P>All translations, derivative works, or aggregate works
incorporating any Linux HOWTO documents must be covered under this
copyright notice. That is, you may not produce a derivative work
from a HOWTO and impose additional restrictions on its
distribution. Exceptions to these rules may be granted under
certain conditions; please contact the Linux HOWTO coordinator at
the address given below.
<P>If you have questions, please contact Tim Bynum, the Linux HOWTO
coordinator, at
<A HREF="mailto:tjbynum@wallybox.cei.net">tjbynum@wallybox.cei.net</A> or
<A HREF="mailto:linux-howto@metalab.unc.edu">linux-howto@metalab.unc.edu</A><P>
<H2><A NAME="ss1.2">1.2 Disclaimer</A>
</H2>
<P>Use of the information and examples in this document is at your own risk.
There are many security issues involved when connecting networks across
the internet. Even though information is encrypted, an improperly
configured firewall may result in a security breach. Precautions can be taken to
protect your cipe connections, but it does not guarantee 100% security.
The author does not guarantee the information provided in this document
will provide a secure networking environment. Even though I have tried to be
as accurate as possible creating this document, I am not responsible for any
problems or damages incurred due to actions taken based on the information
in this document.
<P>
<H2><A NAME="ss1.3">1.3 Feedback</A>
</H2>
<P>Send questions, comments, suggestions, or corrections to
<A HREF="mailto:acj@home.com">acj@home.com</A>.
<P>
<H2><A NAME="ss1.4">1.4 Getting the files</A>
</H2>
<P>This howto was written based on Cipe versions 1.0.1 and 1.2.0.
See reference section for link to Cipe home page.
<P>
<P>
<HR>
<A HREF="Cipe+Masq-2.html">Next</A>
Previous
<A HREF="Cipe+Masq.html#toc1">Contents</A>
</BODY>
</HTML>