Virtual Tunneling Protocol

Source: Internet
Author: User

Virtual Tunneling Protocol Tunneling is a technique for encrypting data communication between a private network or a dedicated device through a public network infrastructure. The content of the communication can be a packet of any communication protocol. The tunneling protocol encapsulates the packets for these protocols to be sent in a new package. The new packet header provides routing information so that the encapsulated data can be passed through the public network, and the logical path through which it passes is called a tunnel. When the packet arrives at the end of the communication, it is unpacked and forwarded to the final destination. Tunneling technology refers to the whole process including data encapsulation, transmission and data unpacking.


The second layer corresponds to the data link (data-link) layer, exchanging data in frames (frame) for the unit. PPTP, L2TP, and layer2forwarding (L2F) are the second-tier tunneling protocols that encapsulate the load in a "point-to-point communication Protocol (PPP)" frame, which is encapsulated in a tunneling protocol and then routed over the network. Because the second Layer Tunneling protocol is based on PPP communication protocol, it also inherits some useful functions, such as user authentication, dynamic address assignment, data compression, data encryption, etc. With the use of Extensibleauthenticationprotocol (EAP), a variety of advanced user authentication methods, such as one-time passwords and smart cards, can be supported.


The third layer corresponds to the network layer, with the packet (packet) as the data Exchange unit. The Ip-over-ip and IPSec tunneling patterns are examples of third-tier tunneling protocols that encapsulate IP packet processing (such as compression, encryption), encapsulating additional IP headers, and then transmitting them over an IP network.


For the second-layer tunneling technique, the tunnel is like a session. The two endpoints of the tunnel must agree to the creation of the tunnel and negotiate the settings between them, such as the assignment or encryption of the address, the parameters of the compression, and so on. The tunnel must have a process of establishing, maintaining, and then terminating.


The third-tier tunneling technique usually assumes that all aspects of the setup problem are not negotiated during the communication process and are handled manually in advance. For these protocols, there may be no tunnel maintenance phase.


Once the tunnel is established, you can start transmitting data. The tunnel's client or server side uses the tunnel transport protocol to prepare the data to be transmitted, and when the data reaches the other end, the header of the tunnel transport protocol is removed, and the data is forwarded to the destination network.


Virtual Tunneling Protocol

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.