Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 3:  Infrastructure Security (Domain 3.0; 20%)
      9  3.3  Security Topologies

Previous Topic/Section
Why Use NAT?
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Pop Quiz 3.1
Next Topic/Section

3.3.4  Tunneling
(Page 1 of 2)

Tunneling is the process of encapsulating a protocol within packets carried by a lower-level network, to provide a virtual point-to-point connection. For example, many VPNs run over TCP/IP networks, embedding another TCP/IP network’s traffic, sometimes using a completely different host addressing scheme such as NAT, within the outer network’s packets.

In many cases, the complete packet traveling on the “virtual network” is placed into the data area of the physical network’s packets, just as with any other application. The lower layers of the outer network are not even aware that another network’s traffic is piggybacking over them.

Tunneling can provide an authenticated, encrypted, tamper-resistant channel of communication over the Internet, between two points, as we discussed in section 2.1 on Remote Access protocols and technologies.

Tunneling software takes care of encapsulating the packets for transmission, and then receiving and decoding them at the other end of the tunnel and placing them onto the local network as if they had originated there. It can exist at various network layers, such as OSI layers 2 and 3, or higher application layers.

Tunneling

Tunneling involves encapsulating a protocol within packets carried by a lower-level network.

It provides a virtual point-to-point connection. Tunneling can provide a “private” authenticated, encrypted, tamper-resistant connection between two points over the Internet.



Previous Topic/Section
Why Use NAT?
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Pop Quiz 3.1
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.