Annotated edit history of
TunnelNotes version 6, including all changes.
View license author blame.
Rev |
Author |
# |
Line |
2 |
DanielLawson |
1 |
''Yesterday it worked.%%% |
|
|
2 |
Today it is not working.%%% |
|
|
3 |
Windows is like that.'' |
|
|
4 |
|
|
|
5 |
So are networks, oddly enough. |
|
|
6 |
|
|
|
7 |
There are many many ways you can set up a tunnel between two networked hosts. The MetaNet is one such example of a tunnel - it is a multi-point tunnel. |
|
|
8 |
|
|
|
9 |
Most tunnels are point-to-point. Some examples are: |
|
|
10 |
|
|
|
11 |
* [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information. |
6 |
StuartYeates |
12 |
* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under [Linux] atm. |
2 |
DanielLawson |
13 |
* [L2TP] - Layer 2 Tunnelling Protocol |
3 |
DanielLawson |
14 |
* [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information |
2 |
DanielLawson |
15 |
* [PPTP] - Point To Point Tunnel Protocol |
6 |
StuartYeates |
16 |
* [IPIP] - IP over [IP] Tunnel |
4 |
CraigBox |
17 |
|
|
|
18 |
You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS]. |
6 |
StuartYeates |
19 |
|
|
|
20 |
---- |
|
|
21 |
CategoryNetworking |