Penguin

Differences between current version and predecessor to the previous major change of TunnelNotes.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 6 Last edited on Thursday, March 18, 2004 5:29:12 am by StuartYeates
Older page: version 4 Last edited on Tuesday, April 1, 2003 3:10:29 pm by CraigBox Revert
@@ -8,10 +8,14 @@
  
 Most tunnels are point-to-point. Some examples are: 
  
 * [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information. 
-* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under Linux atm. 
+* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under [ Linux] atm. 
 * [L2TP] - Layer 2 Tunnelling Protocol 
 * [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information 
 * [PPTP] - Point To Point Tunnel Protocol 
+* [IPIP] - IP over [IP] Tunnel  
  
 You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS]. 
+  
+----  
+CategoryNetworking