mirror of
https://github.com/Rudd-O/qubes-network-server.git
synced 2025-03-01 14:22:35 +01:00
Merge pull request #15 from gunkaaa/patch-1
Fix broken link and image embeds
This commit is contained in:
commit
f0c6387fbf
@ -34,7 +34,7 @@ which give the user control over outbound connections taking place from
|
||||
user VMs. ProxyVMs in turn attach to NetVMs, which provide outbound
|
||||
connectivity for ProxyVMs and other user VMs alike.
|
||||
|
||||

|
||||

|
||||
|
||||
No provision is made for running a server in a virtualized environment,
|
||||
such that the server's ports are accessible by (a) other VMs (b) machines
|
||||
@ -48,7 +48,7 @@ attack vectors. The Qubes OS user interface provides no help either.
|
||||
|
||||
Qubes network server builds on that.
|
||||
|
||||

|
||||

|
||||
|
||||
With the Qubes network server software, it becomes possible to make
|
||||
network servers in user VMs available to other machines, be them
|
||||
|
@ -100,4 +100,4 @@ to your Qubes OS server. You are also able to run commands on the
|
||||
`exp-ssh` VM, directly from your manager machine.
|
||||
|
||||
Should you want to run commands on *other* VMs of your Qubes OS server,
|
||||
then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote management of Qubes OS servers.md).
|
||||
then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote%20management%20of%20Qubes%20OS%20servers.md).
|
||||
|
Loading…
x
Reference in New Issue
Block a user