CHAPTER

Protocol Tunneling

4

INFORMATION IN THIS CHAPTER

How Protocol Tunneling Works

Dangers of Protocol Tunneling

Defending against Protocol Tunneling

The Future of Protocol Tunneling

You’re at work and bored as usual. You decide to take some time off from monitoring network security alerts to download some music. You hop on the Internet, download a peer-to-peer (P2P) file-sharing program, and install it on your company laptop. Nice. Now you’re ready to download.

Your first few searches don’t seem to work, and soon you’ve figured out why. At the bottom of the window is a little icon that indicates that the file-sharing program has detected a firewall. You are being blocked by your company’s Internet policies. The software needs ...

Get Seven Deadliest Network Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.