>Sorry if I don't understand, but could anyone give an example of a >configuration where you would see end-to-gateway-to-end use of tunnel >mode--i.e., what is at the other "end". Well, precisely that, really. Some people want a private tunnel back to the corporate firewall _and_ an encrypted tunnel to the ultimate endnode. Derrell