Changes

Line 27: Line 27:     
As mentioned earlier, configuration scheme 2 (figure above) is an extension of configuration scheme 1. While configuration scheme 1 only depicts a connection between two tinc instances, you can see that configuration scheme 2 additionally contains two end devices (END1 and END2), each connected to a separate router's LAN. When this scheme is realized, not only will the two routers be able to communicate with each other, but the end devices will also be reachable to one another and from each router.
 
As mentioned earlier, configuration scheme 2 (figure above) is an extension of configuration scheme 1. While configuration scheme 1 only depicts a connection between two tinc instances, you can see that configuration scheme 2 additionally contains two end devices (END1 and END2), each connected to a separate router's LAN. When this scheme is realized, not only will the two routers be able to communicate with each other, but the end devices will also be reachable to one another and from each router.
It should also be noted the connection type used is '''Tunnel''' and not '''Transport'''. The tunnel protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by another set of IP headers.
      
In addition to traffic encryption, tinc VPN also supports automatic full mesh routing -  VPN traffic is always (if possible) sent directly to the destination, without going through intermediate hops.
 
In addition to traffic encryption, tinc VPN also supports automatic full mesh routing -  VPN traffic is always (if possible) sent directly to the destination, without going through intermediate hops.