Create tunnels over TCP/IP networks with shaping, encryption, and compression
