Professional Documents
Culture Documents
APPLICATIONS
-Atishay Jain, 10783017
3T5, CSED, Thapar University
INTRODUCTION
For a Lehman, a tunnel can be defined as – “A tunnel provides a route
for moving from one of its ends to another, hiding details of the route in
between.” Thus, by the definition of a tunnel, its purpose is to connect two
points or places such that the route in between is not a concern of the
travelers. Similar is the case with network tunnels. A network tunnels,
performs the function of connecting two points across a network such that,
the route travelled in between can be considered as not present for the client
application that relies on the tunneling server/client for operation. This is
obtained by the means of encapsulation of the client data in a packet of the
protocol supported by the tunneling application, at the server side and
decapsulation at the client side.
• Decapsulate.
• Send
• Decapsulate
4. Misuse- Access
blocked sites:
Tunneling can also be
used to "sneak
through" a firewall. A
protocol that is blocked
by the firewall is
"wrapped" inside a
protocol that is not
blocked by the firewall,
such as HTTP. If the
firewall policy has not
been written to exclude
this kind of "wrapping",
this trick can be used to
get around the
intended firewall policy.