tunneling protocol


Also found in: Dictionary, Medical, Wikipedia.

tunneling protocol

A network protocol that encapsulates packets at a peer level or below. It is used to transport multiple protocols over a common network as well as provide the vehicle for encrypted virtual private networks (VPNs). It is said to "tunnel" because it "pushes through" packets of different types.

Encapsulate Same or Lower Layer
In a regular protocol, the lower layer protocol encapsulates packets from the higher level protocol. For example, a network layer 3 packet encapsulates a transport layer 4 packet, and a data link layer 2 packet encapsulates a network layer 3 packet.

In contrast, a tunneling protocol encapsulates a packet of the same or lower layer. For example, generic routing encapsulation (GRE) can contain a layer 3 IPX packet within a layer 3 IP packet. A virtual private LAN service (VPLS) encapsulates a layer 2 Ethernet frame within a layer 3 IP packet. See IP tunneling, L2TP, SSTP, GRE and VPLS.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Support for Layer 2 Tunneling Protocol (L2TP) has also been added to all Ruckus 802.11n access points used as standalone APs.
It also supports layer-2 tunneling protocol (L2TP) in conjunction with IPSec.<p>Test results <p>In performance and security testing, we assessed the TMS both as a firewall and combined firewall/IPS.
The F5[R] ARN for Windows Server 2008 will help enable enterprises achieve powerful deployment advantages, featuring support for the updated versions of Microsoft Internet Information Services (IIS) and Terminal Services, as well as Microsoft technologies such as Windows PowerShell and SSTP (Secure Socket Tunneling Protocol).
With point-to-point tunneling protocol (PPTP), security was too thin, and access was all or nothing; once the tunnel was opened, the whole world had access to JRI's network.
* The data are sent by tunneling protocol (GTP--GPRS Tunneling Protocol) increasing the communication security.
It combines the best of Cisco's Layer 2 Forwarding protocol and Microsoft's Point-to-Point Tunneling Protocol.
For the GPRS, the GSM network is updated of the several nodes SGSN (Serving GPRS Support Node) and one GGSN (Gateway GPRS Support Node) through which the GPRS communicates using GTP (GPRS Tunneling Protocol) with external packet networks (PN), e.g.
Windows 2000 makes a good argument for itself on the security front as well, with its support for IP Security, Layer 2 Tunneling Protocol and Virtual Private Networking.
HSP includes a variety of protocol modules, covering the most widely used VPN (Virtual Private Network) protocols -- IPSec (Internet Protocol Security) and PPTP (Point-to-Point Tunneling Protocol).
With the use of protocols (communication rules) such as PPTP (Point-To-Point Tunneling Protocol) or IPsec (Internet Protocol Security), you can utilize the public Internet for private communication much like the phone company uses the public lines to allow private conversations between two users.