answersLogoWhite

0

Teredo tunneling is a computer networking term that gives IPv6 capabilities to servers that are still using IPv4. It can only be used when they have no other connections to IPv6 sites.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What protocols can a windows xp computer use to establish a virtual private network cnnection to a remote access server?

Point-to-point tunneling protocol (PPTP) and Layer Two tunneling protocol (l2tp) with internet security protocol (ip/sec)


What is tunneling protocal?

Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing node in the public network are unaware that the transmission is part of a private network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.


How do you make flashplayer load faster?

Dear answerman try to use Auslogics Boost Speed program and use the internet options by automatic configurations ... i hope this will be better for your internet speed .. best regards Bacco Delan


What are advantage of VPN?

Virtual Private Network Advantages :Users working at home can use the VPN connections to connect to their company's private network. Organizations can use VPN connection to establish connections with geographically separate offices using the public network like internet. Communication over VPN connection is more secure because VPN uses the following two protocols for data encryption: Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (IPSec)


A tunneling protocol is used to facilitate?

You use a tunneling protocol when you want to preserve confidentiality in information that is being sent across a network. This way listeners cannot understand the information.


What type of instrument should Diana use to see an individual atom?

tunneling microscope


What are the tools that scientists used to observe atoms?

They could use an electron microscope or an STM (scanning tunneling microscope)


What is the Hebrew word for regards?

if you are talking about the use of the word "regards" in letters, it would be "bivracha" (בברכה), which means "with a blessing".


How do you say regards in Swahili?

Salaam (greetings).Give my greetings (regards) to your father): nisalamie baba yako."Regards" as the closing to a letter: wasalaam. This is the standard closing.


What are two main VPN components that protect data from eavesdropping?

Encryption and the use of tunneling for transport will protect data during transmission.


When to use best regards?

You can use "Best regards," (followed by a comma) in the closing of a business or friendly letter. On the next line, you can write your signature. If you are typing the letter, leave a blank line between "Best regards," and your typed name. In the blank line, write your signature.


In regards to cabling which media type is best for coffee house owner interested in offering internet access to customers?

If you are not concidering having gaming then you should use wireless internet so that those customers that have they're own laptop with wireless can log into it as well as any computers you have in your cafe'