Configuring the AltaVista Telecommuter Client
Configuration of the Tunnel client is straightforward for all four platforms (Windows 95/98/NT and MacOS), but make sure you have the following information from the administrator:
- Username
This is the name of the tunnel group on the Tunnel server to which you have access privileges. This name is case-sensitive and must exactly match what the tunnel administrator has set up on the tunnel server.
- Server key ID
The group name for the encryption key.
- Tunnel server
The IP address and tunnel port number.
- First Firewall
Should there be an intervening firewall from your connection point to the Internet, the IP address and tunnel port number are required. Intervening firewalls that keep traffic from leaving the network are rare, but check with your Internet service provider or network administrator to be sure.
- Second Firewall
The IP address and tunnel port number are needed to allow your tunnel traffic to pass through to the remote private network. The network administrator of the remote private network generally supplies this information.
- Key file
The
.eta
encryption key file is generated and distributed by the network administrator on the remote private network. This file will allow access to the private network to anyone who obtains it and should be treated as extremely confidential information. Loss or theft of this file should be reported to the tunnel network administrator immediately.
This information should be obtained for every tunnel network ...
Get Virtual Private Networks, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.