first of all THANKS!

James Yonan wrote:
* Add an internal routing capability to the OpenVPN server to allow
client-to-client communication, without going through the tun interface on the
server.

why this is needed? ans what exactly this means?

* Right now clients are allocated a single, dynamic IP address.  It would be
nice if a connecting client could specify a full subnet to be tunneled.

would be welcome!

* It would be nice to provide for some client-side failover by allowing
--remote to specify a set of machines, or allow a hostname in --remote that
has been configured with multiple addresses in DNS.  The idea is that a server
would be randomly chosen from the list, and if the connect failed, another
would be tried.

would be nice.

* True point-to-multipoint capability -- essentially a generalization of the
current multi-client server model.  In point-to-multipoint mode, a host can
securely connect into a kind of "VPN cloud" that is fully distributed, without
a single point of failure.  The VPN cloud is like a small version of the
internet itself and uses a protcol such as OSPF to dynamically manage routing
information.  The key advantage of this model is that it is distributed rather
than being bound to a single server.  This means that VPN traffic will take a
direct path between any 2 points in the cloud, rather than needing to go
through a central server.

how does this effect the --redirect-gateway option? it's my favorite since I like that my vpn clients can only communicate with me (the server) and through me the rest of the world (intranet, other vpn point and internet). this is essential when I wanna make a central firewall and internet access policy. this is why it's not clear to me what do you mean by the above "client-to-client communication"?

# The server's virtual endpoints
ifconfig 10.8.0.1 10.8.0.2

this means this server has two enpoint in the server side?

--
  Levente                               "Si vis pacem para bellum!"


Reply via email to