answersLogoWhite

0

Teredo tunneling is a computer networking term that gives IPv6 capabilities to servers that are still using IPv4. It can only be used when they have no other connections to IPv6 sites.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What protocols can a windows xp computer use to establish a virtual private network cnnection to a remote access server?

Point-to-point tunneling protocol (PPTP) and Layer Two tunneling protocol (l2tp) with internet security protocol (ip/sec)


What is tunneling protocal?

Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing node in the public network are unaware that the transmission is part of a private network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.


How do you make flashplayer load faster?

Dear answerman try to use Auslogics Boost Speed program and use the internet options by automatic configurations ... i hope this will be better for your internet speed .. best regards Bacco Delan


A tunneling protocol is used to facilitate?

You use a tunneling protocol when you want to preserve confidentiality in information that is being sent across a network. This way listeners cannot understand the information.


What are advantage of VPN?

Virtual Private Network Advantages :Users working at home can use the VPN connections to connect to their company's private network. Organizations can use VPN connection to establish connections with geographically separate offices using the public network like internet. Communication over VPN connection is more secure because VPN uses the following two protocols for data encryption: Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (IPSec)


What type of instrument should Diana use to see an individual atom?

tunneling microscope


What are the tools that scientists used to observe atoms?

They could use an electron microscope or an STM (scanning tunneling microscope)


What is the Hebrew word for regards?

if you are talking about the use of the word "regards" in letters, it would be "bivracha" (בברכה), which means "with a blessing".


What are two main VPN components that protect data from eavesdropping?

Encryption and the use of tunneling for transport will protect data during transmission.


How do you say regards in Swahili?

Salaam (greetings).Give my greetings (regards) to your father): nisalamie baba yako."Regards" as the closing to a letter: wasalaam. This is the standard closing.


Who can use the Internet?

Anyone knows how to open an internet browser and is in a place that has internet can use the internet. like google


When to use best regards?

You can use "Best regards," (followed by a comma) in the closing of a business or friendly letter. On the next line, you can write your signature. If you are typing the letter, leave a blank line between "Best regards," and your typed name. In the blank line, write your signature.