Network Tunneling

L2TP Tunneling is a best virtual 1:1 connectivity for different branches with two geographical locations.

VPN Tunneling Protocols. Tunneling enables the encapsulation of a packet from one type of protocol within the data-gram of a different protocol. For example, VPN uses PPTP to encapsulate IP packets over a public network, such as the Internet.

One approach to tunneling is the Point-to-Point Tunneling Protocol  developed by Microsoft and several other companies. The PPTP keeps proprietary data reasonably secure, even though part of the path(s) between or among end users exists in public communication channels.

The PPTP makes it possible for authorized users to gain access to a private network – called a virtual private network  -through an Internet service provider (ISP) or online service. Another commonly used tunneling protocol is generic routing encapsulation (GRE), developed by Cisco Systems. There are numerous, less common tunneling protocols.

Tunneling, and the use of a VPN, is not intended as a substitute for encryption/decryption. In cases where a high level of security is necessary, the strongest possible encryption should be used within the VPN itself, and tunneling should serve only as a convenience.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s