Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Tunneling protocol

Index Tunneling protocol

In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another. [1]

41 relations: CERT Coordination Center, Communication protocol, Computer network, Encapsulation (networking), Encryption, Firewall (computing), Frame (networking), Generic Routing Encapsulation, GPRS Tunnelling Protocol, HTTP tunnel, Hypertext Transfer Protocol, ICMP tunnel, Internet protocol suite, IP in IP, IPsec, IPv4, IPv6, Layer 2 Tunneling Protocol, List of IP protocol numbers, Network address, Network packet, Network Virtualization using Generic Routing Encapsulation, Open Systems Interconnection, OpenVPN, OSI model, Payload (computing), Plaintext, Point-to-Point Protocol, Port forwarding, Proxy server, Pseudo-wire, Secure Shell, Secure Socket Tunneling Protocol, Server (computing), Server Message Block, SOCKS, TUN/TAP, Tunnel broker, Virtual Extensible LAN, Virtual private network, Web browser.

CERT Coordination Center

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

New!!: Tunneling protocol and CERT Coordination Center · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Tunneling protocol and Communication protocol · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Tunneling protocol and Computer network · See more »

Encapsulation (networking)

In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.

New!!: Tunneling protocol and Encapsulation (networking) · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Tunneling protocol and Encryption · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Tunneling protocol and Firewall (computing) · See more »

Frame (networking)

A frame is a digital data transmission unit in computer networking and telecommunication.

New!!: Tunneling protocol and Frame (networking) · See more »

Generic Routing Encapsulation

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.

New!!: Tunneling protocol and Generic Routing Encapsulation · See more »

GPRS Tunnelling Protocol

GPRS Tunneling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS and LTE networks.

New!!: Tunneling protocol and GPRS Tunnelling Protocol · See more »

HTTP tunnel

HTTP tunneling is used to create a network link between two computers in conditions of restricted network connectivity including firewalls, NATs and ACLs, among other restrictions.

New!!: Tunneling protocol and HTTP tunnel · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: Tunneling protocol and Hypertext Transfer Protocol · See more »

ICMP tunnel

An ICMP tunnel establishes a covert connection between two remote computers (a client and proxy), using ICMP echo requests and reply packets.

New!!: Tunneling protocol and ICMP tunnel · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Tunneling protocol and Internet protocol suite · See more »

IP in IP

IP in IP is an IP tunneling protocol that encapsulates one IP packet in another IP packet.

New!!: Tunneling protocol and IP in IP · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Tunneling protocol and IPsec · See more »

IPv4

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).

New!!: Tunneling protocol and IPv4 · See more »

IPv6

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.

New!!: Tunneling protocol and IPv6 · See more »

Layer 2 Tunneling Protocol

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

New!!: Tunneling protocol and Layer 2 Tunneling Protocol · See more »

List of IP protocol numbers

Below are the Assigned Internet Protocol Numbers found in the Protocol field of the IPv4 header and the Next Header field of the IPv6 header.

New!!: Tunneling protocol and List of IP protocol numbers · See more »

Network address

A network address is an identifier for a node or host on a telecommunications network.

New!!: Tunneling protocol and Network address · See more »

Network packet

A network packet is a formatted unit of data carried by a packet-switched network.

New!!: Tunneling protocol and Network packet · See more »

Network Virtualization using Generic Routing Encapsulation

Network Virtualization using Generic Routing Encapsulation (NVGRE) is a network virtualization technology that attempts to alleviate the scalability problems associated with large cloud computing deployments.

New!!: Tunneling protocol and Network Virtualization using Generic Routing Encapsulation · See more »

Open Systems Interconnection

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

New!!: Tunneling protocol and Open Systems Interconnection · See more »

OpenVPN

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.

New!!: Tunneling protocol and OpenVPN · See more »

OSI model

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

New!!: Tunneling protocol and OSI model · See more »

Payload (computing)

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.

New!!: Tunneling protocol and Payload (computing) · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Tunneling protocol and Plaintext · See more »

Point-to-Point Protocol

In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.

New!!: Tunneling protocol and Point-to-Point Protocol · See more »

Port forwarding

In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.

New!!: Tunneling protocol and Port forwarding · See more »

Proxy server

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

New!!: Tunneling protocol and Proxy server · See more »

Pseudo-wire

In computer networking and telecommunications, a pseudowire (or pseudo-wire) is an emulation of a point-to-point connection over a packet-switching network (PSN).

New!!: Tunneling protocol and Pseudo-wire · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Tunneling protocol and Secure Shell · See more »

Secure Socket Tunneling Protocol

Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel.

New!!: Tunneling protocol and Secure Socket Tunneling Protocol · See more »

Server (computing)

In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".

New!!: Tunneling protocol and Server (computing) · See more »

Server Message Block

In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.

New!!: Tunneling protocol and Server Message Block · See more »

SOCKS

SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.

New!!: Tunneling protocol and SOCKS · See more »

TUN/TAP

In computer networking, TUN and TAP are virtual network kernel interfaces.

New!!: Tunneling protocol and TUN/TAP · See more »

Tunnel broker

In the context of computer networking, a tunnel broker is a service which provides a network tunnel.

New!!: Tunneling protocol and Tunnel broker · See more »

Virtual Extensible LAN

Virtual Extensible LAN (VXLAN) is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments.

New!!: Tunneling protocol and Virtual Extensible LAN · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Tunneling protocol and Virtual private network · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: Tunneling protocol and Web browser · See more »

Redirects here:

Network tunnel, Protocol tunneling, SSH tunnel, SSH tunneling, Secure Shell tunneling, Ssh tunnel, Tunneling protocols, Tunneling software, Tunnelling protocol, Tunnelling protocols.

References

[1] https://en.wikipedia.org/wiki/Tunneling_protocol

OutgoingIncoming
Hey! We are on Facebook now! »