[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Tunnel Establishment Protocol II



Let me apear _very_ foolish, and lost.

What exactly is a 'tunnel protocol,' how do it and the 'key setup
protocol,' relate to the bigger problem of ipsecurity?  Is a tunnel
protocol something like slip?  Or is it a higher level protocol?

j'


References: