Summary
As you review the ways in which tunneling can be deployed, it is very important to consider how the technology can be deployed in your specific environment. The network infrastructures of no two companies are alike, and it would be impossible to create a guide that would cover all types of network configurations. By carefully considering the technical information about the features of tunneling in Windows 2000, the goals you are trying to achieve, and the existing configuration of your environment, you should be able to define a deployment plan that works very well.