Annotated edit history of
TunnelNotes version 6 showing authors affecting page license.
View with all changes included.
Rev |
Author |
# |
Line |
2 |
DanielLawson |
1 |
''Yesterday it worked.%%% |
|
|
2 |
Today it is not working.%%% |
|
|
3 |
Windows is like that.'' |
|
|
4 |
|
|
|
5 |
So are networks, oddly enough. |
|
|
6 |
|
|
|
7 |
There are many many ways you can set up a tunnel between two networked hosts. The MetaNet is one such example of a tunnel - it is a multi-point tunnel. |
|
|
8 |
|
|
|
9 |
Most tunnels are point-to-point. Some examples are: |
|
|
10 |
|
|
|
11 |
* [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information. |
|
|
12 |
* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under [Linux] atm. |
|
|
13 |
* [L2TP] - Layer 2 Tunnelling Protocol |
|
|
14 |
* [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information |
|
|
15 |
* [PPTP] - Point To Point Tunnel Protocol |
5 |
MattBrown |
16 |
* [IPIP] - IP over [IP] Tunnel |
4 |
CraigBox |
17 |
|
|
|
18 |
You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS]. |
6 |
StuartYeates |
19 |
|
|
|
20 |
---- |
|
|
21 |
CategoryNetworking |