Previous Page | Next Page

  1. Introduction
  2. Network Models
  3. Network Layers
  4. TCP/IP Protocols
  5. Microsoft Protocols
  6. IPX/SPX Protocols
  7. AppleTalk Protocols
  8. SNA Protocols
  9. Other Protocols
  10. Authentication Protocols
  11. Encryption Protocols
  12. Tunneling Protocols
  13. Terms and Definitions
  14. Credits

Tunneling Protocols

  • IPIP tunneling - Tunneling IP packets in IP packets.
  • IPSec - Internet protocol security, developed by IETF, implemented at layer 3. it is a collection of security measures that address data privacy, integrity, authentication, and key management, in addition to tunneling. Does not cover key management. A VPN tunneling Protocol.
  • L2F - Layer2 Forwarding, works at the link layer of the OSI model. It has no encryption. It is being replaced by L2TP. A VPN tunneling Protocol.
  • L2TP - Layer2 Tunneling Protocol. (RFC 2661) Combines features of L2F and PPTP and works at the link layer. No encryption or key management is included in specifications. A VPN tunneling Protocol. It uses IPSec for encryption.
  • PPTP - Point-to-Point Tunneling Protocol (RFC 2637) works at the link layer. No encryption or key management included in specifications. A VPN tunneling Protocol used to send secure communications from point to point.
  • Socks - handled at the application layer.