SlideShare a Scribd company logo
1 of 23
Download to read offline
Tunneling Configuration
Tunneling Configuration
• Teredo Tunneling Pseudo-Interface
  Configuration
• 6to4 Tunneling Configuration
Tunneling Configuration
• Teredo
  – Run “cmd.exe” as administrator
  – Enter “route print”
     • Able to see “Teredo Tunneling Pseudo-Interface”
        – Index Number is “29”
Tunneling Configuration
• Checking your Teredo Tunnel status
  – In “cmd.exe” enter “netsh”

  – Next enter “interface” and “ipv6” respectively

  – Enter commend “show interface” to check ipv6
    interface that are running right now
Tunneling Configuration



• Index of Teredo is 29
• Default interface MTU is 4 Gigabytes
Tunneling Configuration
• Examine Teredo Tunnel by entering “show
  teredo”



• *** Create default route to send all IPv6 traffic
  to Teredo Tunnel
  – Enter “add route ::/0 interface=XX”
     • XX is Teredo Tunnel interface number
Tunneling Configuration


• Now you can test IPv6 Website by using ping
Tunneling Configuration
• Check back your Teredo Tunnel Status by
  entering “show teredo”




• Remove static route that you entered before
  – Enter “delete route ::/0 interface=XX”
  – XX is your Teredo Tunnel index
Tunneling Configuration


• Reset netsh to default configuration
  – Entering “netsh interface ipv6 reset”




  – Restart your PC
Tunneling Configuration
• 6to4 Tunnel
  – Run “cmd.exe” as administrator
  – Enter “route print”
     • Able to see “Microsoft 6to4 Adapter”
        – Index Number is “25”
Tunneling Configuration
• Checking your 6to4 Tunnel status
  – In “cmd.exe” enter “netsh”

  – Next enter “interface” and “ipv6” respectively

  – Enter commend “show interface” to check ipv6
    interface that are running right now
Tunneling Configuration



• Index of 6to4 Adapter is 25
Tunneling Configuration
• Create your tunnel by going to
  “tunnelbroker.net” and signup your account
• Signup complete login and click at “Create
  Regular Tunnel”
Tunneling Configuration
• Enter your IPv4 End Point
  – IP is not private IP address
• Click “Create Tunnel” to create your 6to4
  tunnel
• 6to4 Tunnel was generated and can see your
  6to4 Tunnel IPv6 address
Tunneling Configuration
• Copy configurations from “Example
  Configuration” tab
• Paste them in “cmd.exe” by running as
  Administrator
• Your 6to4 Tunnel name is “IP6Tunnel”
Tunneling Configuration
• IP6Tunnel shows connected
  – Use command “show interface” at netsh interface
    ipv6 state
Tunneling Configuration


• Now you can test IPv6 Website by using ping
Tunneling Configuration
• Remove 6to4 Tunnel route




• Remove 6to4 Tunnel interface from your PC
Tunneling Configuration
• Reset netsh to default configuration
  – Entering “netsh interface ipv6 reset”




  – Restart your PC

More Related Content

What's hot

CentOS Server Gui Initial Configuration
CentOS Server Gui Initial ConfigurationCentOS Server Gui Initial Configuration
CentOS Server Gui Initial ConfigurationKaan Aslandağ
 
Building a moat bastion server
Building a moat   bastion serverBuilding a moat   bastion server
Building a moat bastion servernseemiller
 
ClusterDesktop Socks5 Proxy
ClusterDesktop Socks5 ProxyClusterDesktop Socks5 Proxy
ClusterDesktop Socks5 ProxyEmil Parashkevov
 
Network programming using python
Network programming using pythonNetwork programming using python
Network programming using pythonAli Nezhad
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASADhruv Sharma
 
Improving monitoring systems Interoperability with OpenMetrics
Improving monitoring systems Interoperability with OpenMetricsImproving monitoring systems Interoperability with OpenMetrics
Improving monitoring systems Interoperability with OpenMetricsChan Shik Lim
 
Per tenant QoS enhancements in Openvswitch
Per tenant QoS enhancements in OpenvswitchPer tenant QoS enhancements in Openvswitch
Per tenant QoS enhancements in OpenvswitchMonica Gawas
 
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wiresharkDRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wiresharkmeazza_15
 
Aeonmike pf clustering doc guide
Aeonmike pf clustering doc guideAeonmike pf clustering doc guide
Aeonmike pf clustering doc guideConrad Cruz
 
How do I construct a python web server using this code? #import socket modul...
How do I construct a python web server using this code?  #import socket modul...How do I construct a python web server using this code?  #import socket modul...
How do I construct a python web server using this code? #import socket modul...hwbloom25
 
Speedy App: Frontend Performance Considerations
Speedy App: Frontend Performance ConsiderationsSpeedy App: Frontend Performance Considerations
Speedy App: Frontend Performance ConsiderationsPierre Spring
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverIPMAX s.r.l.
 
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2Kentaro Ebisawa
 
Docker-OVS
Docker-OVSDocker-OVS
Docker-OVSsnrism
 
Ftp configuration in rhel7
Ftp configuration in rhel7Ftp configuration in rhel7
Ftp configuration in rhel7Balamurugan M
 
RuSiem events collection and forwarding
RuSiem events collection and forwardingRuSiem events collection and forwarding
RuSiem events collection and forwardingOlesya Shelestova
 

What's hot (20)

CentOS Server Gui Initial Configuration
CentOS Server Gui Initial ConfigurationCentOS Server Gui Initial Configuration
CentOS Server Gui Initial Configuration
 
Building a moat bastion server
Building a moat   bastion serverBuilding a moat   bastion server
Building a moat bastion server
 
ClusterDesktop Socks5 Proxy
ClusterDesktop Socks5 ProxyClusterDesktop Socks5 Proxy
ClusterDesktop Socks5 Proxy
 
Tomcat openssl
Tomcat opensslTomcat openssl
Tomcat openssl
 
Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Improving monitoring systems Interoperability with OpenMetrics
Improving monitoring systems Interoperability with OpenMetricsImproving monitoring systems Interoperability with OpenMetrics
Improving monitoring systems Interoperability with OpenMetrics
 
Per tenant QoS enhancements in Openvswitch
Per tenant QoS enhancements in OpenvswitchPer tenant QoS enhancements in Openvswitch
Per tenant QoS enhancements in Openvswitch
 
Tomcat openssl
Tomcat opensslTomcat openssl
Tomcat openssl
 
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wiresharkDRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
 
Aeonmike pf clustering doc guide
Aeonmike pf clustering doc guideAeonmike pf clustering doc guide
Aeonmike pf clustering doc guide
 
How do I construct a python web server using this code? #import socket modul...
How do I construct a python web server using this code?  #import socket modul...How do I construct a python web server using this code?  #import socket modul...
How do I construct a python web server using this code? #import socket modul...
 
Speedy App: Frontend Performance Considerations
Speedy App: Frontend Performance ConsiderationsSpeedy App: Frontend Performance Considerations
Speedy App: Frontend Performance Considerations
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP server
 
Identity service keystone ppt
Identity service keystone pptIdentity service keystone ppt
Identity service keystone ppt
 
Nfs
NfsNfs
Nfs
 
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
 
Docker-OVS
Docker-OVSDocker-OVS
Docker-OVS
 
Ftp configuration in rhel7
Ftp configuration in rhel7Ftp configuration in rhel7
Ftp configuration in rhel7
 
RuSiem events collection and forwarding
RuSiem events collection and forwardingRuSiem events collection and forwarding
RuSiem events collection and forwarding
 

Viewers also liked

Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
Tunneling by tunnel boring machine
Tunneling by tunnel boring machineTunneling by tunnel boring machine
Tunneling by tunnel boring machineVISHAL KUMAR SINGH
 
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRC
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRCDELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRC
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRCAl Hakam Khan
 
tunnel boring machine
tunnel boring machinetunnel boring machine
tunnel boring machineNaquiakhter
 
Tunnel boring machine
Tunnel boring machineTunnel boring machine
Tunnel boring machinerutuldave
 
PPT ON TRENCHLESS TECHNOLOGY
PPT ON TRENCHLESS TECHNOLOGY PPT ON TRENCHLESS TECHNOLOGY
PPT ON TRENCHLESS TECHNOLOGY MD AMANULLAH
 
Microtunneling presentation 2014
Microtunneling presentation 2014Microtunneling presentation 2014
Microtunneling presentation 2014Jamal A'Bed
 

Viewers also liked (10)

I pv6 for cmu
I pv6 for cmuI pv6 for cmu
I pv6 for cmu
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Tunneling by tunnel boring machine
Tunneling by tunnel boring machineTunneling by tunnel boring machine
Tunneling by tunnel boring machine
 
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRC
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRCDELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRC
DELHI METRO UNDERGROUND TUNNELING : SHAHBAZ KHAN DMRC
 
TRENCHLESS TECHNOLOGY
TRENCHLESS TECHNOLOGYTRENCHLESS TECHNOLOGY
TRENCHLESS TECHNOLOGY
 
tunnel boring machine
tunnel boring machinetunnel boring machine
tunnel boring machine
 
Tunnel boring machine
Tunnel boring machineTunnel boring machine
Tunnel boring machine
 
PPT ON TRENCHLESS TECHNOLOGY
PPT ON TRENCHLESS TECHNOLOGY PPT ON TRENCHLESS TECHNOLOGY
PPT ON TRENCHLESS TECHNOLOGY
 
Microtunneling presentation 2014
Microtunneling presentation 2014Microtunneling presentation 2014
Microtunneling presentation 2014
 

Similar to Tunneling configuration

CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4VISHNU N
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Ahmed El-Arabawy
 
commandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfcommandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfAchRaf264021
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsEng. Emad Al-Atoum
 
200519 TMU Ubiquitous Robot
200519 TMU Ubiquitous Robot200519 TMU Ubiquitous Robot
200519 TMU Ubiquitous RobotNoriakiAndo
 
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)Linh Nguyen
 
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rules
Uccn1003  -may10_-_lect04a_-_intro_to_routing_rulesUccn1003  -may10_-_lect04a_-_intro_to_routing_rules
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rulesShu Shin
 

Similar to Tunneling configuration (20)

Ccnacommand 140205001152-phpapp01
Ccnacommand 140205001152-phpapp01Ccnacommand 140205001152-phpapp01
Ccnacommand 140205001152-phpapp01
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Ccna commands
Ccna commands   Ccna commands
Ccna commands
 
Ip6 tables in linux
Ip6 tables in linuxIp6 tables in linux
Ip6 tables in linux
 
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
Ccna commands
Ccna commandsCcna commands
Ccna commands
 
Ccna commands
Ccna commandsCcna commands
Ccna commands
 
commandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfcommandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdf
 
Day 13 2 switch config
Day 13 2 switch configDay 13 2 switch config
Day 13 2 switch config
 
Netmiko library
Netmiko libraryNetmiko library
Netmiko library
 
Ccna command
Ccna commandCcna command
Ccna command
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching Commands
 
200519 TMU Ubiquitous Robot
200519 TMU Ubiquitous Robot200519 TMU Ubiquitous Robot
200519 TMU Ubiquitous Robot
 
CCNP.ppt
CCNP.pptCCNP.ppt
CCNP.ppt
 
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)
Solution Manager Technical Monitoring - BOBJ (Part 2 of 3 - Auto-Configure)
 
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rules
Uccn1003  -may10_-_lect04a_-_intro_to_routing_rulesUccn1003  -may10_-_lect04a_-_intro_to_routing_rules
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rules
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Tunneling configuration