On Tue, Dec 11, 2012 at 12:45 PM, Kyle Mestery (kmestery)
wrote:
> On Dec 10, 2012, at 11:27 AM, Jesse Gross wrote:
>> On Sat, Dec 8, 2012 at 5:35 AM, Kyle Mestery (kmestery)
>> wrote:
>>> On Dec 7, 2012, at 10:15 PM, Jesse Gross wrote:
On Fri, Dec 7, 2012 at 1:47 PM, Kyle Mestery wrote:
On Dec 10, 2012, at 11:27 AM, Jesse Gross wrote:
> On Sat, Dec 8, 2012 at 5:35 AM, Kyle Mestery (kmestery)
> wrote:
>> On Dec 7, 2012, at 10:15 PM, Jesse Gross wrote:
>>> On Fri, Dec 7, 2012 at 1:47 PM, Kyle Mestery wrote:
Some tunneling protocols require manipulation of the packet before
On Sat, Dec 8, 2012 at 5:35 AM, Kyle Mestery (kmestery)
wrote:
> On Dec 7, 2012, at 10:15 PM, Jesse Gross wrote:
>> On Fri, Dec 7, 2012 at 1:47 PM, Kyle Mestery wrote:
>>> Some tunneling protocols require manipulation of the packet before the outer
>>> IP header is placed on the packet. An examp
On Dec 7, 2012, at 10:15 PM, Jesse Gross wrote:
> On Fri, Dec 7, 2012 at 1:47 PM, Kyle Mestery wrote:
>> Some tunneling protocols require manipulation of the packet before the outer
>> IP header is placed on the packet. An example of a tunneling protocol with
>> this attribute is LISP. For these
On Fri, Dec 7, 2012 at 1:47 PM, Kyle Mestery wrote:
> Some tunneling protocols require manipulation of the packet before the outer
> IP header is placed on the packet. An example of a tunneling protocol with
> this attribute is LISP. For these protocols, a way to manipulate the packet
> (for examp