Global Information Lookup Global Information

IP tunnel information


An IP tunnel is an Internet Protocol (IP) network communications channel between two networks. It is used to transport another network protocol by encapsulation of its packets.

IP tunnels are often used for connecting two disjoint IP networks that don't have a native routing path to each other, via an underlying routable protocol across an intermediate transport network. In conjunction with the IPsec protocol they may be used to create a virtual private network between two or more private networks across a public network such as the Internet. Another prominent use is to connect islands of IPv6 installations across the IPv4 Internet.

IP tunnelling encapsulation

In IP tunnelling, every IP packet, including addressing information of its source and destination IP networks, is encapsulated within another packet format native to the transit network.

At the borders between the source network and the transit network, as well as the transit network and the destination network, gateways are used that establish the end-points of the IP tunnel across the transit network. Thus, the IP tunnel endpoints become native IP routers that establish a standard IP route between the source and destination networks. Packets traversing these end-points from the transit network are stripped from their transit frame format headers and trailers used in the tunnelling protocol and thus converted into native IP format and injected into the IP stack of the tunnel endpoints. In addition, any other protocol encapsulations used during transit, such as IPsec or Transport Layer Security, are removed.

IP in IP, sometimes called ipencap, is an example of IP encapsulation within IP and is described in RFC 2003. Other variants of the IP-in-IP variety are IPv6-in-IPv4 (6in4) and IPv4-in-IPv6 (4in6).

IP tunneling often bypasses simple firewall rules transparently since the specific nature and addressing of the original datagrams are hidden. Content-control software is usually required to block IP tunnels.

and 25 Related for: IP tunnel information

Request time (Page generated in 0.8284 seconds.)

IP tunnel

Last Update:

An IP tunnel is an Internet Protocol (IP) network communications channel between two networks. It is used to transport another network protocol by encapsulation...

Word Count : 467

IP in IP

Last Update:

IP in IP is an IP tunneling protocol that encapsulates one IP packet in another IP packet. To encapsulate an IP packet in another IP packet, an outer header...

Word Count : 519

Tunnel Setup Protocol

Last Update:

networking, the Tunnel Setup Protocol (TSP) is an experimental networking control protocol used to negotiate IP tunnel setup parameters between a tunnel client...

Word Count : 302

Virtual private network

Last Update:

of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. Transport Layer Security (SSL/TLS) can tunnel an entire...

Word Count : 3697

Tunneling protocol

Last Update:

packets that actually provide the service. Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite, but usually violates the...

Word Count : 1864

IP

Last Update:

of allomorphy IP in IP, an IP tunneling protocol List of IP version numbers Ip Man (disambiguation) All pages with titles containing IP IP3 (disambiguation)...

Word Count : 451

Mobile IP

Last Update:

through the tunnel. In many applications (e.g., VPN, VoIP), sudden changes in network connectivity and IP address can cause problems. Mobile IP was designed...

Word Count : 1562

IPsec

Last Update:

In tunnel mode, the entire IP packet is encrypted and authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode...

Word Count : 5081

IP multicast

Last Update:

IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific...

Word Count : 4076

Layer 2 Tunneling Protocol

Last Update:

mode. The IP protocol number for ESP is 50 (compare TCP's 6 and UDP's 17). At this point, a secure channel has been established, but no tunneling is taking...

Word Count : 1826

IPv4

Last Update:

bridged across the Internet via a virtual private network (VPN) or an IP tunnel, which encapsulates packets, including their headers containing the private...

Word Count : 5540

Internet protocol suite

Last Update:

The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar...

Word Count : 6288

List of IP protocol numbers

Last Update:

This is a list of the IP protocol numbers found in the field Protocol of the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...

Word Count : 120

Iproute2

Last Update:

networking in the Linux kernel, including routing, network interfaces, tunnels, traffic control, and network-related device drivers. iproute2 is an open-source...

Word Count : 269

HTTP

Last Update:

CONNECT The CONNECT method requests that the intermediary establish a TCP/IP tunnel to the origin server identified by the request target. It is often used...

Word Count : 7790

VTun

Last Update:

networking application which can set up Virtual Tunnels over TCP/IP networks. It supports Internet Protocol (IP), Point-to-Point Protocol (PPP) and Serial...

Word Count : 261

GPRS Tunnelling Protocol

Last Update:

GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE...

Word Count : 2229

OpenVPN

Last Update:

via the Universal TUN/TAP driver. It can create either a layer-3 based IP tunnel (TUN), or a layer-2 based Ethernet TAP that can carry any type of Ethernet...

Word Count : 1965

User Datagram Protocol

Last Update:

It provides datagrams, suitable for modeling other protocols such as IP tunneling or remote procedure call and the Network File System. It is simple, suitable...

Word Count : 2676

Wide area network

Last Update:

across the Internet via a virtual private network (VPN) or other form of IP tunnel that encapsulates packets, including their headers containing the private...

Word Count : 1116

Voice over IP

Last Update:

Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication...

Word Count : 9910

Virtual Extensible LAN

Last Update:

MAC frame in a UDP datagram for transport across an IP network, creating an overlay network or tunnel. Open vSwitch is an example of a software-based virtual...

Word Count : 554

Reserved IP addresses

Last Update:

Assigned Numbers Authority (IANA) have reserved various Internet Protocol (IP) addresses for special purposes. IPv4 designates special usage or applications...

Word Count : 648

Internet Protocol

Last Update:

The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries...

Word Count : 1948

Secure Socket Tunneling Protocol

Last Update:

not support site-to-site VPN tunnels. SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will...

Word Count : 747

PDF Search Engine © AllGlobal.net