Configuring the AltaVista Telecommuter Client

Configuration of the Tunnel client is straightforward for all four platforms (Windows 95/98/NT and MacOS), but make sure you have the following information from the administrator:

Username

This is the name of the tunnel group on the Tunnel server to which you have access privileges. This name is case-sensitive and must exactly match what the tunnel administrator has set up on the tunnel server.

Server key ID

The group name for the encryption key.

Tunnel server

The IP address and tunnel port number.

First Firewall

Should there be an intervening firewall from your connection point to the Internet, the IP address and tunnel port number are required. Intervening firewalls that keep traffic from leaving the network are rare, but check with your Internet service provider or network administrator to be sure.

Second Firewall

The IP address and tunnel port number are needed to allow your tunnel traffic to pass through to the remote private network. The network administrator of the remote private network generally supplies this information.

Key file

The .eta encryption key file is generated and distributed by the network administrator on the remote private network. This file will allow access to the private network to anyone who obtains it and should be treated as extremely confidential information. Loss or theft of this file should be reported to the tunnel network administrator immediately.

This information should be obtained for every tunnel network ...

Get Virtual Private Networks, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.