The G box acts as a gateway with two network interfaces (Ethernet or any other transport that passes IP packets, such as Token Ring, FDDI, serial line, or a combination). The G box accepts connection packets, examines them, and communicates with the A box via the private link to check the authorization rules. If the A box allows the connection, a link is established but outgoing packets from your network are reassembled to hide information about your network. Each packet looks as if it came from the G box although it may have come from anywhere within your LAN. Thus packets leaving your network contain information only about the G box and no other information about the internal structure of your network.
The G box must be dedicated to running the Eagle software
and cannot be used for other purposes.
The Vulture subcomponent of the Eagle (described in
section ) ensures that no
other processes can be run.
The G box is connected to the A box with a null-modem RS-232 cable and communicates via PPP or SLIP. This link is not reachable from either the outside network or from other hosts on your local network.