11-24-2012 01:01 AM - edited 03-04-2019 06:13 PM
Hi coluld any one please share the knowledge on what are tunnels and why do we use. How many diffrent types of tunnels exist and when do we use those specific tunnels.
Thanks in advance,
Naveen
11-24-2012 04:21 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
Generally, they support a virtual link between the tunnel end points.
Why they are used is for some reason the underlying physical path can't be used for some purpose.
A couple of examples: you want to link two of your business sites internal networks together across the Internet. You might create a tunnel link between two of your routers across the Internet. Your internal network "sees" a link between those routers logically like a direct link between those two routers. They "do not see" the Internet.
You have a private WAN link between two of your sites, but the information is extremely sensitive. You define an encrypted tunnel across the link and transmit your data through it. Again, your network just "sees" a link between the two sites, but if anyone can tap you physical link, the contents are secured by encryption.
Unsure of how many types exist but most you're likely to encounter are probably some variant of GRE or IPSec encapsulated tunnels.
11-24-2012 04:25 AM
Dear Naveen,
Please find the info as below:
what are tunnels:
Tunneling is the process of placing an entire packet within another packet(encapsulation) before it's transported over the Internet
why do we use:
The purpose of the tunneling protocol is to add a layer of security that protects each packet on its journey over the Internet
How many diffrent types of tunnels exist and when do we use those specific tunnels.
for more info you please go through the link below:
http://www.cisco.com/en/US/docs/ios/12_4/interface/configuration/guide/inb_tun.html#wp1045623
Tunnels are used by many different technologies to solve different network challenges, and the resulting variety of tunnel types makes it difficult to determine which tunneling technique to use. The different carrier protocols can be grouped according to the OSI layer model.
shows the different carrier protocols grouped by OSI layer. Below the table, each carrier protocol is defined, and if the tunnel configuration is not covered within this module, a link to the appropriate module is included.
Please rate the helpful posts.
Regards
Thanveer
"Everybody is genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is a stupid."
11-24-2012 07:20 AM
Sometimes it's useful to encapsulate one tunnel in another. For example, IPsec tunnels don't support multicasts. This will pevent a routing protocol working, such as OSPF. However, GRE does support multicasts so traffic can first be encapsulated within a GRE tunnel before IPsec encapsulation.
11-24-2012 07:51 AM
Key point Shillings, Thanks good info given.
Regards
Thanveer
"Everybody is genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is a stupid."
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide