Use the local computer as a tunnel endpoint at one end of the tunnel. Specify the computers that can be reached through the ...