In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example, allow private network communications to be sent across a public network (such as the Internet), or for one network protocol to be carried over an incompatible network, through a process called encapsulation.
Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, it can hide the nature of the traffic that is run through a tunnel.
The tunneling protocol works by using the data portion of a packet (the payload) to carry the packets that actually provide the service. Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite, but usually violates the layering when using the payload to carry a service not normally provided by the network. Typically, the delivery protocol operates at an equal or higher level in the layered model than the payload protocol.
and 24 Related for: Tunneling protocol information
In computer networking, Layer 2 TunnelingProtocol (L2TP) is a tunnelingprotocol used to support virtual private networks (VPNs) or as part of the delivery...
Secure Socket TunnelingProtocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an...
(SASL) protocolTunnel encapsulation for a variety of tunneling scenarios: IPv6 over IPv4 tunnels IPv4 over IPv6 tunnels IPv6 over UDP/IPv4 tunnels for built-in...
GPRS TunnellingProtocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE...
plaintext tunnelingprotocols include Layer 2 TunnelingProtocol (L2TP) when it is set up without IPsec and Point-to-Point TunnelingProtocol (PPTP) or...
Look up tunneling in Wiktionary, the free dictionary. Tunneling or tunnelling may refer to: Digging tunnels (the literal meaning) Hobby tunneling Quantum...
port 3544. For 6to4, the most common IPv6 over IPv4 tunnelingprotocol, requires that the tunnel endpoint have a public IPv4 address. However, many hosts...
L2F, or Layer 2 Forwarding, is a tunnelingprotocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet...
installed in an SAS drive bay, and the enclosure can use the Serial ATA TunnelingProtocol (STP) to make use of the drive.: 16, 17 There are keyed parts to...
Encapsulation (GRE) is a tunnelingprotocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point...
tunnel is created by an intermediary called a proxy server which is usually located in a DMZ. Tunneling can also allow communication using a protocol...
to block IP tunnels. The first specification of IP tunneling was in RFC 1075, which described DVMRP, the first IP multicast routing protocol. Because multicast...
This is a list of the IP protocol numbers found in the field Protocol of the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...
alternative to DPD. The IPsec protocols AH and ESP can be implemented in a host-to-host transport mode, as well as in a network tunneling mode. In transport mode...
IP in IP is an IP tunnelingprotocol that encapsulates one IP packet in another IP packet. To encapsulate an IP packet in another IP packet, an outer header...
paths between endpoints. MPLS can encapsulate packets of various network protocols, hence the multiprotocol component of the name. MPLS supports a range...
network. All GSNs should have a Gn interface and support the GPRS tunnelingprotocol. There are two key variants of the GSN, namely gateway GPRS support...
University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket TunnelingProtocol are provided in a single VPN...
packets. An example of this technique is tunneling complete TCP traffic over ping requests and replies. ICMP tunneling works by injecting arbitrary data into...
be provided by using encryption and tunneling. The common tunnelingprotocol used is Layer 2 TunnelingProtocol and the common encryption mechanism used...
example, protocols are often stacked in a tunneling arrangement to accommodate the connection of dissimilar networks. For example, IP may be tunneled across...