Point-to-Point Tunneling Protocol

Also found in: Wikipedia.

Point-to-Point Tunneling Protocol

(communications, protocol)
(PPTP) A tunneling protocol for connecting Windows NT clients and servers over Remote Access Services (RAS). PPTP can be used to create a Virtual Private Network between computers running NT. It is an extension of PPP sponsored by Microsoft.

Microsoft Point to Point Encryption may be used with PPTP to provide an encrypted connection but PPTP itself does not use encryption.

Compare: Layer Two Tunneling Protocol.

Mentioned in ?
References in periodicals archive ?
With point-to-point tunneling protocol (PPTP), security was too thin, and access was all or nothing; once the tunnel was opened, the whole world had access to JRI's network.
It combines the best of Cisco's Layer 2 Forwarding protocol and Microsoft's Point-to-Point Tunneling Protocol.
Additional features of the WireSpeed R517 modem include Virtual Private Network (VPN) support via Point-To-Point Tunneling Protocol (PPTP) for telecommuters who need to access their corporate network from their homes or satellite offices; True Always On feature that allows users to configure modem to remember the system's security password; and Port Forwarding that allows users to safely play gaming applications over the Internet while their local network remains secure.
The prevailing standard for tunneling is Microsoft's Point-to-Point Tunneling Protocol (PPTP), which is supported within Windows 95/98 and Windows NT.
Other alternatives include Microsoft's Point-to-Point Tunneling Protocol (PPTP), and L2TP, which combines PPTP with the similar Cisco Systems' Layer 2 Forwarding Protocol.
Mentor Graphics Corporation (NASDAQ:MENT) today announced availability of the Nucleus[R] Point-to-Point Tunneling Protocol (PPTP) software.
Microsoft's point-to-point tunneling protocol (PPTP) creates tunnels for transporting multiprotocol traffic over the Internet, but its capabilities are more limited than IPSec's.
The Point-to-Point Tunneling Protocol (PPTP) is a networking technology widely used for implementing Virtual Private Networks (VPNs).
Three popular tunneling protocols have emerged: Microsoft's point-to-point tunneling protocol (PPTP), the Layer 2 tunneling protocol (L2TP), and the IP security protocol (IPSec) which is backed by the Internet Engineering Task Force (IETF).
Furthermore, enterprises must select from multiple protocols, Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), IP Security (IPSec) protocol and MPLS.
The most prevalent tunneling protocols are the point-to-point tunneling protocol (PPTP) and IPSec.
EtherFast uses point-to-point tunneling protocol, so users can access other networks in a VPN via the Internet over a secure connection.