A “tunnel” is solely a link between two locations through another material. An honest analogy may be a tunnel that goes below a mountain. Either side of the mountain area unit connected up through an immediate path; during this case the “mountain” is that the net. Thus primarily a tunnel may be a direct crosscut through the net.
Although by definition a tunnel isn't encrypted, generally the explanation that you just area unit making one is that you just wish to feature some encoding to that. Let’s say you've got a branch workplace in one location employing a regular net association then you would like to attach to a server somewhere at your home base location. Since the information you're transferring between offices is probably going sensitive, you wouldn’t wish somebody to be able to read that information whereas travel over the net. That’s wherever a VPN tunnel comes into play.
Virtual private network technology relies on the concept of tunneling. VPN tunneling involves establishing and maintaining a logical network association (that might contain intermediate hops). On this association, packets created in an exceedingly specific VPN protocol format square measure encapsulated at intervals another base or carrier protocol, then transmitted between VPN shopper and server, and at last de-encapsulated on the receiving facet.
Several electronic network protocols are enforced specifically to be used with VPN tunnels. The Three most well liked VPN tunneling protocols listed below still vie with one another for acceptance within the business. These protocols are typically incompatible with one another.
1- L2TP
2- PPTP
3- IPsec
View More Information About VPN Tunnel
Although by definition a tunnel isn't encrypted, generally the explanation that you just area unit making one is that you just wish to feature some encoding to that. Let’s say you've got a branch workplace in one location employing a regular net association then you would like to attach to a server somewhere at your home base location. Since the information you're transferring between offices is probably going sensitive, you wouldn’t wish somebody to be able to read that information whereas travel over the net. That’s wherever a VPN tunnel comes into play.
Virtual private network technology relies on the concept of tunneling. VPN tunneling involves establishing and maintaining a logical network association (that might contain intermediate hops). On this association, packets created in an exceedingly specific VPN protocol format square measure encapsulated at intervals another base or carrier protocol, then transmitted between VPN shopper and server, and at last de-encapsulated on the receiving facet.
Several electronic network protocols are enforced specifically to be used with VPN tunnels. The Three most well liked VPN tunneling protocols listed below still vie with one another for acceptance within the business. These protocols are typically incompatible with one another.
1- L2TP
2- PPTP
3- IPsec
View More Information About VPN Tunnel
No comments:
Post a Comment