The key technology of VPDN is tunneling technology, which usually refers to Layer2Tunneling Protocol (L2TP).
实现VPDN主要使用的是隧道技术,目前常用的是第二层隧道协议(L2TP)。
Currently Windows XP provides a certain level of security by using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP).
目前WindowsXP中提供了某种程度的安全使用点对点隧道协议(PPTP)或第二层隧道协议(L2TP)。
According to the analysis of resource reservation protocol (RSVP), this paper puts forward an implementation scheme to the QoS of VPN, which is implemented by IPSec tunneling protocol.
本文在分析资源预留协议的基础上,给出一种基于IP安全协议隧道协议的虚拟专用网服务质量的实现方案。
The ESP header is located after the IP header and before the transport mode protocol (UDP or TCP) or before an encapsulated IP header when using tunneling.
ESP报头位于IP报头之后,传输模式(UDP或者TCP)之前,或者当使用隧道时是在封装的IP报头之前。
Tunneling (RFC 2893) : it allows you to encapsulate one packet head into the other and one protocol will communicate with others through the encapsulation in the other protocol.
隧道技术(RFC 2893):是指将一种协议报头封装在另一种协议报头中,这样,一种协议就可以通过另一种协议的封装进行通信。
The implementation of IP-over-IP tunneling (IPIP) and the Generalized Routing Encapsulation (GRE) protocol is based on the creation of a virtual device.
IPIP的实现和通用路由封装协议是基于一个虚拟设备的创建。
This paper detailed introduces some concrete methods in allusion to different instance in transition period, including dual protocol stacks, tunneling technology and protocol translation.
本文详细介绍了针对过渡期不同问题的具体解决方案,包括双协议栈、隧道技术和协议翻译机制。
This might be useful when tunneling K4000RC over a secure protocol such as SSH, for example, to remove one redundant level of authentication.
当你越过仪器的保护协议如ssh,这招可能有用。例如,移动一个验证的多余标准。
This might be useful when tunneling K4000RC over a secure protocol such as SSH, for example, to remove one redundant level of authentication.
当你越过仪器的保护协议如ssh,这招可能有用。例如,移动一个验证的多余标准。
应用推荐