|Newer page:||version 6||Last edited on Thursday, March 18, 2004 5:29:12 am||by StuartYeates|
|Older page:||version 4||Last edited on Tuesday, April 1, 2003 3:10:29 pm||by CraigBox||Revert|
@@ -8,10 +8,14 @@
Most tunnels are point-to-point. Some examples are:
* [SSH] Tunnels. Very easy to set up in user space. See [SSHNotes] for information.
-* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under Linux atm.
+* [IPSec] - The 'secure' way to set up tunnels. Kinda broken under Linux atm.
* [L2TP] - Layer 2 Tunnelling Protocol
* [GRE] - Generic Routing Encapsulation. See [GRETunnel] for information
* [PPTP] - Point To Point Tunnel Protocol
You may want to authenticate your users against another machine; look at [RADIUS] and [TACACS].