O'Reilly logo

Learning Network Forensics by Samir Datt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of tunneling protocols

As we have learned in the previous sections, a tunnel is a way of shipping a foreign protocol across a network that will not support it directly. Let's take a look at the different tunneling protocols and their characteristics to see how this is done.

The Point-to-Point Tunneling Protocol

Point-to-Point Tunneling Protocol is also known as PPTP. This was created by a consortium including Microsoft and other companies. PPTP is a fast protocol that, besides Windows, is also available to Linux and Mac users.

While PPTP does not have an inbuilt capability to provide traffic encryption, it relies on the Point-to-Point Protocol (PPP) to provide security measures during transmission.

PPTP allows traffic with different protocols ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required