Let me apear _very_ foolish, and lost. What exactly is a 'tunnel protocol,' how do it and the 'key setup protocol,' relate to the bigger problem of ipsecurity? Is a tunnel protocol something like slip? Or is it a higher level protocol? j'