SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia /

What is Tunneling Protocol?

A tunneling protocol is the one utilized by computer networks in cases where the network protocol or the delivery protocol encapsulates an unsuited payload protocol at a peer level or lower than it. The protocol is termed as such because this appears as if it makes its way through the various types of packets. It is sometimes recognized with the name “encapsulation protocol” but this label is very vague for the reason that there are other network protocols which are also designed to perform the process of encapsulation.

Transferring Virtual Private 

Tunneling protocol is widely used in transmitting large amounts of protocols through the typical networks. In addition, it may serve as a medium for transferring virtual private networks (VPNs) that are already encrypted.
This protocol comes as an advantage since tunneling may be employed in transporting a payload over the mismatched delivery-network. Tunneling protocol is also helpful when it comes to presentation of a safe passageway over a suspicious-looking network.
In common cases, tunneling may differ with some other forms of layered protocol including TCP/IP and OSI. There are times when a delivery protocol functions at a more advanced level in the model compared to that of a payload protocol. Rarely, however, does both the delivery and payload protocol work at similar level.

OSI Model

Wrapping of protocols is a product of the mechanism performed by the conventional layered protocols. This works in line with the other models such as the OSI model and TCP/IP model, which does not belong in the category of protocols that carry out tunneling.
There are different procedures that may be employed by these tunneling protocols so as to do its job successfully. One of which is the utilization of data encryption for the purpose of transferring a vulnerable payload protocol through a public network, in which the most common type is the Internet. Lastly, this process solely offers the functionality of the VPN.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
All Modules Included at 1 Price
Attack on Exchange Server?
Cross-site Request Forgery
Encyclopedia Part 2
Encyclopedia Part 3
Encyclopedia Part 4
Encyclopedia Part 5
Encyclopedia Part 6
Encyclopedia Part 7
Hyper V Virtual UTM Appliance
Sec-Point
Security Point
VPN Firewall
What is a 2.4 GHz Wi-Fi?
What is a Script Kiddie?
What is a Web Application Firewall?
What is an Elite Hacker?
What is ComboFix?
What is Denial-of Service Attack?
What is Diffie-Hellman Encryption?
What is ISSAP?
What is ISSMP?
What is Penetration Test?
What is RC4 Encryption?
What is Spanning Tree Protocol?
What is the 5.8 GHz Wi-Fi?
What is Tunneling Protocol?
What is War Dialing?
WiFi Pen Test Appliance
Windows Operating System
WPA2 Encryption

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef