Tunneling Protocols

by John Slawson
Oct. 2, 2017 1 comment Infosecwriters Encryption & Authentication

A tunneling protocol can be defined as the action of a network protocol, otherwise known as the delivery protocol, to encapsulate a different payload protocol or to provide a secure path through an untrusted network. This payload can be any data that was compressed for transmission in order not to congest a network. In order to understand tunneling protocols and how they operate, a network engineer must first be familiar with TCP/IP networking model. The Transmission Control Protocol and the Internet Protocol are a group of communications protocols used for the Internet

http://www.infosecwriters.com/Papers/JSlawson_Tunneling.pdf

Avatar
Irina Alexandra Negrii 1 month, 1 week ago

tunnelling protocols only need to be on the radar of networking or IT professionals, who have to ensure their systems can block unwanted tunnels and are configured to apply security protocols to data sent in using a known tunnel, like data sent through a VPN.

Reply