Solved

ipv6 teredo tunnel

Posted on 2014-01-16
4
520 Views
Last Modified: 2014-02-01
I am still confused about the the teredo tunnel. It says that it is an automatic tunnel. But where is the tunnel built? Is it from the host to the teredo server or teredo relay? How does it do it automatically?
Also, why can it work with a NAT device?

Thanks
0
Comment
Question by:leblanc
  • 3
4 Comments
 
LVL 92

Expert Comment

by:John Hurst
ID: 39787216
I simply ignore it. I have NCP Secure Entry which builds an IPv4 tunnel to clients. I think Shrew Soft does the same as well.

So the IPv6 tunnel sitting in the Network is not used. It does not connect to anything.

.... Thinkpads_User
0
 
LVL 1

Author Comment

by:leblanc
ID: 39787330
What I meant to say was I read a white paper on teredo and I'd like to understand more about the technology.
0
 
LVL 92

Accepted Solution

by:
John Hurst earned 500 total points
ID: 39787342
Here is a decent article in Wikipedia about Teredo tunneling that seem fairly decent.

http://en.wikipedia.org/wiki/Teredo_tunneling

If you are not using IPv6 (I am not) then it is not used so far as I know. I have a VPN home office router and IPv6 is disabled. There are only a half dozen devices on the network, so no need for IPv6.

Happy reading.   ... Thinkpads_User
0
 
LVL 92

Expert Comment

by:John Hurst
ID: 39827168
@pitachip - Thanks and I was happy to help.

.... Thinkpads_User
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now