IP tunneling

(redirected from IP tunnel)
Also found in: Wikipedia.

IP tunneling

Carrying a protocol from another networking system within an IP packet; for example, transmitting NetWare IPX packets within IP. See tunneling.
References in periodicals archive ?
The current Phone Chassis solution is two 5-car cabinets at the main site, connected to a pair of voice T1 PRI trunks that use IP tunnel communications through multiple redundant CLAN cards via our internal LAN to 4 Definity cabinets and 15 Avaya media gateways.
VoIP Armor directly addresses and solves the problems of inconsistent voice quality and reliability of VoIP calls by creating an adaptive self-healing IP tunnel that adds reliability and protects against any negative network conditions such as starvation, loss, latency and jitter.
The LMA also creates a binding cache entry (BCE) and establishes an IP tunnel to the MAG for the MN.
After receiving the result of a process of authentication and authorization RAT-CCSM and MCCSM begin the process of establishment of an IP tunnel or reject the request.
Authentication is the most important security element of a multiprotocol IP tunnel.
Mobile IP tunnel establishment at unmatched scale, with session throughput enabled in the hundreds of thousands under load for modular, scaled support of small to very large network systems
In fact, they can optionally be connected to their "home" subnet through an IP tunnel so the backbone security and service model is preserved -- again simplifying administration and ensuring network resources are rigorously protected.
The IP Tunnel can also be utilized as a secondary path for fault tolerant mission critical applications.
All wireless traffic is transparently bridged, at LAN-speeds over secure IP tunnels, and remains encrypted across the corporate wired network until it reaches Aruba's centralized wireless security system.
IPSec VPNs create encrypted and authenticated IP tunnels from site to site across an IP network.
The company was the first to market a commercially viable DDoS protection solution and provides protected hosting services, web proxies, IP tunnels, and the ecologically friendly LotusCloud VM, a dedicated server environment that is 16 times more efficient than its bare metal counterpart.