Crypto tunnels Crypto tunnels offer Ability to create (multiple) single-port tunnels Results in minimal access to the remote machine Can be created without administrator interaction Most common Crypto tunnels use SSH or SSL