:start
<h2>Tunneling protocol</h2><div class="wp-caption alignright" style="width: 310px"><a href="http://upload.wikimedia.org/wikipedia/en/9/9a/L2tp_pkt_exchg.PNG" target="_blank"><img title="Tunneling protocol" alt="Tunneling protocol" src="http://upload.wikimedia.org/wikipedia/en/9/9a/L2tp_pkt_exchg.PNG" width="300" height="270" /></a> </div><div class="wp-caption alignright" style="width: 310px"><a href="http://ipv6.com/images/diagrams/vpn4.gif" target="_blank"><img title="Tunneling protocol" alt="Tunneling protocol" src="http://ipv6.com/images/diagrams/vpn4.gif" width="150" height="135" /></a> </div><div class="wp-caption alignright" style="width: 310px"><a href="http://www.windowsecurity.com/img/upl/image0021176478082703.jpg" target="_blank"><img title="Tunneling protocol" alt="Tunneling protocol" src="http://www.windowsecurity.com/img/upl/image0021176478082703.jpg" width="150" height="135" /></a> </div>
<p>Tunneling typically contrasts with a layered protocol model such as those of OSI or TCP/IP. The delivery protocol usually operates at a higher level in the model than does the payload protocol, or at the same level.</p>
<p>To understand a particular protocol stack, network engineers must understand both the payload and delivery protocol sets.</p>
<p>As an example of network layer over network layer, Generic Routing Encapsulation, a protocol running over IP (IP Protocol Number 47), often serves to carry IP packets, with RFC 1918 private addresses, over the Internet using delivery packets with public IP addresses. In this case, the delivery and payload protocols are compatible, but the payload addresses are incompatible with those of the delivery network.</p>
<p>In contrast, an IP payload might believe it sees a data link layer delivery when it is carried inside the Layer 2 Tunneling Protocol, which appears to the payload mechanism as a protocol of the data link layer. L2TP, however, actually runs over the transport layer using User Datagram Protocol (UDP) over IP. The IP in the delivery protocol could run over any data-link protocol from IEEE 802.2 over IEEE 802.3 (i.e., standards-based Ethernet) to the Point-to-Point Protocol (PPP) over a dialup modem link.</p>
<p><strong>Tunneling protocol</strong>s may use data encryption to transport insecure payload protocols over a public network, thereby providing VPN functionality. IPsec has an end-to-end Transport Mode, but can also operate in a tunneling mode through a trusted security gateway.</p>
<p>A secure shell tunnel consists of an encrypted tunnel created through a SSH protocol connection. Users may set up SSH tunnels to transfer unencrypted traffic over a network through an encrypted channel. For example, Microsoft Windows machines can share files using the Server Message Block (SMB) protocol, a non-encrypted protocol. If one were to mount a Microsoft Windows file-system remotely through the Internet, someone snooping on the connection could see transferred files. To mount the Windows file-system securely, one can establish a SSH tunnel that routes all SMB traffic to the remote fileserver through an encrypted channel. Even though the SMB protocol itself contains no encryption, the encrypted SSH channel through which it travels offers security.</p>
<p>To set up an SSH tunnel, one configures an SSH client to forward a specified local port to a port on the remote machine. Once the SSH tunnel has been established, the user can connect to the specified local port to access the network service. The local port need not have the same port number as the remote port.</p>
<p>SSH tunnels provide a means to bypass firewalls that prohibit certain Internet services â" so long as a site allows outgoing connections. For example, an organization may prohibit a user from accessing Internet web pages directly without passing through the organization's proxy filter (which provides the organization with a means of monitoring and controlling what the user sees through the web). But users may not wish to have their web traffic monitored or blocked by the organization's proxy filter. If users can connect to an external SSH server, they can create a SSH tunnel to forward a given port on their local machine to port 80 on a remote web-server. To access the remote web-server, users would point their browser to the local port at http://localhost/.</p>
<p>Some SSH clients support dynamic port forwarding that allows the user to create a SOCKS 4/5 proxy. In this case users can configure their applications to use their local SOCKS proxy server. This gives more flexibility than creating a SSH tunnel to a single port as previously described. SOCKS can free the user from the limitations of connecting only to a predefined remote port and server. If an application doesn't support SOCKS, one can use a "socksifier" to redirect the application to the local SOCKS proxy server. Some "socksifiers" support SSH directly, thus avoiding the need for a SSH client.</p>
<p>Users can also use tunneling to "sneak through" a firewall, using a protocol that the firewall would normally block, but "wrapped" inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of "wrapping", this trick can function to get around the intended firewall policy.</p>
<p>Another HTTP-based tunneling method uses the HTTP CONNECT method/command. A client issues the HTTP CONNECT command to a HTTP proxy. The proxy then makes a TCP connection to a particular server:port, and relays data between that server:port and the client connection. Because this creates a security hole, CONNECT-capable HTTP proxies commonly restrict access to the CONNECT method. The proxy allows access only to a whitelist of specific authorized servers.</p>
<p>This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.</p>
<h3>Related Sites for Tunneling protocol</h3>
<ul>
<li>Internet Draft, <strong>Tunneling</strong> TCP based protocols through Web proxy ... <a href="http://www.web-cache.com/Writings/Internet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt" target="_blank">read Tunneling protocol</a></li>
<li>Understanding GPRS <strong>Tunneling Protocol</strong> on SRX Series Devices ... <a href="http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/understanding_grps-tunneling.html" target="_blank">read Tunneling protocol</a></li>
<li>RFC 4851: The Flexible Authentication via Secure <strong>Tunneling</strong> ... <a href="http://www.rfc-archive.org/getrfc.php?rfc=4851" target="_blank">read Tunneling protocol</a></li></ul>
:end
tags: Tunneling, protocol, Tunneling protocol, protocol, ssh, port, over
[category ]
Subscribe to:
Post Comments (Atom)
0 Response to "Tunneling protocol is ..."
Post a Comment