Differences between version 6 and revision by previous author of TunnelNotes.
Other diffs: Previous Major Revision, Previous Revision, or view the Annotated Edit History
Newer page: | version 6 | Last edited on Thursday, March 18, 2004 5:29:12 am | by StuartYeates | Revert |
Older page: | version 5 | Last edited on Thursday, March 18, 2004 12:13:37 am | by MattBrown | Revert |
@@ -8,11 +8,14 @@
Most tunnels are point-to-point. Some examples are:
* [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information.
-* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under Linux atm.
+* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under [
Linux]
atm.
* [L2TP] - Layer 2 Tunnelling Protocol
* [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information
* [PPTP] - Point To Point Tunnel Protocol
-* [IPIP] - IP over IP Tunnel
+* [IPIP] - IP over [
IP]
Tunnel
You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS].
+
+----
+CategoryNetworking