tunneling protocol

(redirected from Tunneling protocols)

tunneling protocol

A network protocol that encapsulates packets at a peer level or below. It is used to transport multiple protocols over a common network as well as provide the vehicle for encrypted virtual private networks (VPNs). It is said to "tunnel" because it "pushes through" packets of different types.

Encapsulate Same or Lower Layer
In a regular protocol, the lower layer protocol encapsulates packets from the higher level protocol. For example, a network layer 3 packet encapsulates a transport layer 4 packet, and a data link layer 2 packet encapsulates a network layer 3 packet.

In contrast, a tunneling protocol encapsulates a packet of the same or lower layer. For example, generic routing encapsulation (GRE) can contain a layer 3 IPX packet within a layer 3 IP packet. A virtual private LAN service (VPLS) encapsulates a layer 2 Ethernet frame within a layer 3 IP packet. See IP tunneling, L2TP, SSTP, GRE and VPLS.
References in periodicals archive ?
The vast amount of VPN protocols supported includes PPTP, SSTP, L2TP, IPsec, OpenVPN and tunneling protocols like Ethernet-over-IP and IP-IP.
Designed to accelerate Network Virtualization workloads, the FastLinQ QL34512 adapter delivers intelligent offloads for NVGRE, VxLAN and GENEVE tunneling protocols, providing an innovative solution delivering flexibility and cost savings for next generation enterprise, hyperscale CSP, tier 2/3 CSP, and telco data centers.
5 features such as the highly anticipated Copy-Fields action, as well as other new features that significantly boost the performance of OpenFlow based applications, such as a hashing function on user-defined ordered lists, MPLS payload matching and broader encapsulation/decapsulation support for layer 2 tunneling protocols.
The easy-to-install software appliance enables static routing of IP multicast traffic through the firewall, without requiring tunneling protocols.
OVS is computationally demanding on x86 machines, especially when dealing with high throughput, high packet rates, and tunneling protocols like NVGRE that leave fewer cycles to run the desired virtual functions.
To make dedicated, secure and authenticated paths, or tunnels, available through the shared IP network infrastructure, the carriers combine so-called tunneling protocols with encryption, authentication and access control technologies.
They do this by combining tunneling protocols with encryption, authentication and access control technologies to provide dedicated, secure and authenticated paths, or tunnels, through the shared IP network infrastructure.
They do this by combining tunneling protocols with encryption, authentication, and access-control technologies to provide dedicated, secure, and authenticated paths or "tunnels" through the shared IP network infrastructure.