Sophie

Sophie

distrib > * > 2010.0 > * > by-pkgid > a412ceb851151854794ced2a242192bb > files > 1178

howto-html-fr-20080722-1mdv2010.0.noarch.rpm

<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Petit guide du per&ccedil;age de pare-feux</title><link href="style.css" rel="stylesheet" type="text/css"><meta content="DocBook XSL Stylesheets V1.70.1" name="generator"><meta name="description" content="Comment utiliser ppp par-dessus ssh, telnet ou autre, de fa&ccedil;on &agrave; r&eacute;aliser une connexion r&eacute;seau transparente &agrave; travers un pare-feu. Valable aussi bien pour l'&eacute;laboration d'un VPN convivial que pour la perforation des pare-feu g&ecirc;nants."><link rel="start" href="index.html" title="Petit guide du per&ccedil;age de pare-feux"><link rel="next" href="ar01s01.html" title="1.&nbsp;Divers"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table summary="Navigation header" width="100%"><tr><th align="center" colspan="3">Petit guide du per&ccedil;age de pare-feux</th></tr><tr><td align="left" width="20%">&nbsp;</td><th align="center" width="60%">&nbsp;</th><td align="right" width="20%">&nbsp;<a accesskey="n" href="ar01s01.html">Suivant</a></td></tr></table><hr></div><div class="article" lang="fr"><div class="titlepage"><div><div><h1 class="title"><a name="N10002"></a>Petit guide du per&ccedil;age de pare-feux</h1></div><div><h3 class="subtitle"><i>

Version fran&ccedil;aise du petit guide <span class="foreignphrase" lang="en"><em class="foreignphrase">Firewall 
Piercing mini-HOWTO</em></span>

</i></h3></div><div><div class="author"><h3 class="author"><span class="firstname">Fran&ccedil;ois-Ren&eacute;</span> <span class="surname">Rideau</span></h3><code class="email">&lt;<a href="mailto:fare PLUS fwprc CHEZ tunes POINT org">fare PLUS fwprc CHEZ tunes POINT org</a>&gt;</code></div></div><div><p class="othercredit"><span class="contrib">Adaptation fran&ccedil;aise</span>: <span class="firstname">Arnaud</span> <span class="surname">Muller</span></p></div><div><p class="othercredit"><span class="contrib">Relecture de la version fran&ccedil;aise</span>: <span class="firstname">Yvon</span> <span class="surname">Benoist</span></p></div><div><p class="othercredit"><span class="contrib">Pr&eacute;paration de la publication de la v.f.</span>: <span class="firstname">Jean-Philippe</span> <span class="surname">Gu&eacute;rard</span></p></div><div><p class="releaseinfo">Version&nbsp;: 0.97</p></div><div><p class="pubdate">18 septembre 2006</p></div><div><div class="revhistory"><table summary="Revision history" width="100%" border="1"><tr><th colspan="3" valign="top" align="left"><b>Historique des versions</b></th></tr><tr><td align="left">Version 0.97.fr.1.0</td><td align="left">2006-09-18</td><td align="left">AM, YB, JPG</td></tr><tr><td colspan="3" align="left">
                Premi&egrave;re version fran&ccedil;aise.
         </td></tr><tr><td align="left">Version 0.97</td><td align="left">2001-11-24</td><td align="left">FRR</td></tr><tr><td colspan="3" align="left">

		Conversion au format SGML DocBook.
                <span class="emphasis"><em>Conversion to DocBook 
                SGML.</em></span>

         </td></tr></table></div></div><div><div class="abstract"><p class="title"><b>R&eacute;sum&eacute;</b></p><p>

Comment utiliser <span><strong class="command">ppp</strong></span> par-dessus 
<span><strong class="command">ssh</strong></span>, <span><strong class="command">telnet</strong></span> ou autre, de fa&ccedil;on &agrave; 
r&eacute;aliser une connexion r&eacute;seau transparente &agrave; travers un pare-feu. 
Valable aussi bien pour l'&eacute;laboration d'un VPN convivial que pour la 
perforation des pare-feu g&ecirc;nants.

</p></div></div></div><hr></div><div class="toc"><p><b>Table des mati&egrave;res</b></p><dl><dt><span class="sect1"><a href="ar01s01.html">1. Divers</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s01.html#N1006E">1.1. Avis de non-responsabilit&eacute;</a></span></dt><dt><span class="sect2"><a href="ar01s01.html#N1007B">1.2. Baratin juridique</a></span></dt><dt><span class="sect2"><a href="ar01s01.html#N1008C">1.3. Recherche responsable de la maintenance</a></span></dt><dt><span class="sect2"><a href="ar01s01.html#N10091">1.4. Remerciements</a></span></dt><dt><span class="sect2"><a href="ar01s01.html#N100AB">1.5. Derni&egrave;res versions</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s02.html">2. Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s02.html#N100C3">2.1. Avant propos</a></span></dt><dt><span class="sect2"><a href="ar01s02.html#N100DC">2.2. Les probl&egrave;mes de s&eacute;curit&eacute;.</a></span></dt><dt><span class="sect2"><a href="ar01s02.html#N100F5">2.3. Autres conditions requises</a></span></dt><dt><span class="sect2"><a href="ar01s02.html#N10134">2.4. Logiciels &agrave; t&eacute;l&eacute;charger</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s03.html">3. Compr&eacute;hension du probl&egrave;me</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s03.html#N101A1">3.1. Donner un nom aux choses</a></span></dt><dt><span class="sect2"><a href="ar01s03.html#N101AC">3.2. Le probl&egrave;me principal</a></span></dt><dt><span class="sect2"><a href="ar01s03.html#N101B3">3.3. Le probl&egrave;me annexe</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s04.html">4. La solution s&eacute;curis&eacute;e&nbsp;: percer en utilisant ssh</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s04.html#N10234">4.1. Principe</a></span></dt><dt><span class="sect2"><a href="ar01s04.html#N1025D">4.2. Exemple de session</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s05.html">5. La solution non s&eacute;curis&eacute;e&nbsp;: percer en utilisant telnet</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s05.html#N102E6">5.1. Principe</a></span></dt><dt><span class="sect2"><a href="ar01s05.html#N10311">5.2. fwprc</a></span></dt><dt><span class="sect2"><a href="ar01s05.html#N1034B">5.3. .fwprcrc</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s06.html">6. Routage</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s06.html#N1038A">6.1. Il y a un truc</a></span></dt><dt><span class="sect2"><a href="ar01s06.html#N103CF">6.2. Exemple de routage</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s07.html">7. Per&ccedil;age inverse</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s07.html#N10446">7.1. La logique</a></span></dt><dt><span class="sect2"><a href="ar01s07.html#N1046F">7.2. Obtenir le message de d&eacute;clenchement</a></span></dt><dt><span class="sect2"><a href="ar01s07.html#N10484">7.3. Autres outils automatiques pour le per&ccedil;age inverse</a></span></dt></dl></dd><dt><span class="sect1"><a href="ar01s08.html">8. Remarques finales</a></span></dt><dd><dl><dt><span class="sect2"><a href="ar01s08.html#N10496">8.1. Autres r&eacute;glages</a></span></dt><dt><span class="sect2"><a href="ar01s08.html#N104FF">8.2. Le suivi de ce petit guide</a></span></dt><dt><span class="sect2"><a href="ar01s08.html#N10508">8.3. Documents sur le sujet</a></span></dt><dt><span class="sect2"><a href="ar01s08.html#N1052F">8.4. Le mot de la fin</a></span></dt><dt><span class="sect2"><a href="ar01s08.html#N10552">8.5.  Copie suppl&eacute;mentaire de l&rsquo;avis tr&egrave;s important de non responsabilit&eacute; &mdash; croyez le&nbsp;!!!</a></span></dt></dl></dd></dl></div></div><div class="navfooter"><hr><table summary="Navigation footer" width="100%"><tr><td align="left" width="40%">&nbsp;</td><td align="center" width="20%">&nbsp;</td><td align="right" width="40%">&nbsp;<a accesskey="n" href="ar01s01.html">Suivant</a></td></tr><tr><td valign="top" align="left" width="40%">&nbsp;</td><td align="center" width="20%">&nbsp;</td><td valign="top" align="right" width="40%">&nbsp;1.&nbsp;Divers</td></tr></table></div></body></html>