Opinion: Best VPN to use with Fedora/Windows

Leonard Isham leonard.isham at gmail.com
Mon Jan 10 20:12:50 UTC 2005


On Mon, 10 Jan 2005 12:01:32 -0700, Kevin Fries <Kevin at hcico.com> wrote:
[snip]
> OK, maybe I am simplifying things a bit more than I should be, so let me
> ask:
> 
> My conceptual understanding of VPN was that computerA needs access to
> NetworkB as if it were located on the physical network even though it is
> somewhere else.  ComputerA contacts NetworkB which assigns ServerC to
> ask as a proxy.  All traffic destined for NetworkB from ComputerA is
> Sent from A->C, ServerC retransmits the request, receives the answer,
> then relays it back C->A.  This allows A to appear to be on the network.
> ~ If ServerC was to manage up to 10 VPN connections, it would need 10 or
> 11 (if it also had other duties as itself) IP addresses with each remote
> client having a unique IP.

A VPN is using a shared media to create a private connection.  This
could be bridged or routed.

> Now I can see how that could appear as a goofy type of router or more
> specifically a bridge.  Its actually more of a proxy, but at a basic
> level all proxies are actually routers.  And a bridge is simply a router
> where the network address is the same on both sides.
> 
> When they were talk about bridging, I assumed that they were talking
> about the proxy.  So when you talk about how you avoid bridging, how is
> my understanding of VPN's shortsighted?  What other options are there?

If you don't control the routing then I would use TUN (Routing) and
NAT to bypass any internal routing issues.

-- 
Leonard Isham, CISSP 
Ostendo non ostento.




More information about the fedora-list mailing list