Annotated edit history of
TunnelNotes version 6 showing authors affecting page license.
View with all changes included.
| Rev |
Author |
# |
Line |
| 2 |
DanielLawson |
1 |
''Yesterday it worked.%%% |
| |
|
2 |
Today it is not working.%%% |
| |
|
3 |
Windows is like that.'' |
| |
|
4 |
|
| |
|
5 |
So are networks, oddly enough. |
| |
|
6 |
|
| |
|
7 |
There are many many ways you can set up a tunnel between two networked hosts. The MetaNet is one such example of a tunnel - it is a multi-point tunnel. |
| |
|
8 |
|
| |
|
9 |
Most tunnels are point-to-point. Some examples are: |
| |
|
10 |
|
| |
|
11 |
* [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information. |
| |
|
12 |
* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under [Linux] atm. |
| |
|
13 |
* [L2TP] - Layer 2 Tunnelling Protocol |
| |
|
14 |
* [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information |
| |
|
15 |
* [PPTP] - Point To Point Tunnel Protocol |
| 5 |
MattBrown |
16 |
* [IPIP] - IP over [IP] Tunnel |
| 4 |
CraigBox |
17 |
|
| |
|
18 |
You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS]. |
| 6 |
StuartYeates |
19 |
|
| |
|
20 |
---- |
| |
|
21 |
CategoryNetworking |