Configuration of the Tunnel client is straightforward for all four platforms (Windows 95/98/NT and MacOS), but make sure you have the following information from the administrator:
This is the name of the tunnel group on the Tunnel server to which you have access privileges. This name is case-sensitive and must exactly match what the tunnel administrator has set up on the tunnel server.
The group name for the encryption key.
The IP address and tunnel port number.
Should there be an intervening firewall from your connection point to the Internet, the IP address and tunnel port number are required. Intervening firewalls that keep traffic from leaving the network are rare, but check with your Internet service provider or network administrator to be sure.
The IP address and tunnel port number are needed to allow your tunnel traffic to pass through to the remote private network. The network administrator of the remote private network generally supplies this information.
The .eta
encryption key file is generated and
distributed by the network administrator on the remote private
network. This file will allow access to the private network to anyone
who obtains it and should be treated as extremely confidential
information. Loss or theft of this file should be reported to the
tunnel network administrator immediately.
This information should be obtained for every tunnel network ...
No credit card required