Computers and laptops
Browser extensions
Home and office network
Manual settings
Smartphones and tablets

Common tunneling protocols and their features

VPN tunneling protocols. Common tunneling protocols

September 04, 2020

Tunneling provides data transfer between two points - the ends of the tunnel - in such a way that the entire network infrastructure lying between them is hidden for the source and the sink of the data.

Tunneling protocols are represented by a special technology that defines the methods of packing, transferring and unpacking data over a VPN connection. Depending on the implementation method, several protocol options are distinguished. They are selected depending on the open system used. The most common are PPTP and L2TP.

Multiple Tunnel Implementation Options

There are two types:

  • voluntary type;
  • required type.

In the first case, the client starts the process of initializing the connection to the VPN network. For the process to work without failures, it is necessary to provide a high-quality connection between the client and the server, it will be used by the client for the tunnel connection.

With the obligatory laying, the connection is formed between several routers, servers or VPN access devices. The remote access server configures VPN using the dial-up server itself, and therefore acts as a client for the tunnel. It is worth remembering that in the case of setting up forced tunnels, the user's laptop will not be counted as one of the endpoints of the tunnel.

Distinctive features and subtleties of the work of various tunnels

The tunneling protocol PPTP ensures the security of the transmitted data even when it is transmitted over public networks. Once logged in, users gain access to a separate private network. Can be provided by any internet service provider. A private network is created in a tunnel environment, which allows various corporations to regularly expand their own corporate network over a private channel using the public Internet.

L2TP uses Layer 2 forwarding in addition to the standard PPTP. A similar system is used to support VPN networks as part of the provision of services by an Internet provider. By itself, the system is not capable of providing the necessary data protection and privacy of all participants. But, it is worth highlighting the special encryption protocol used in the tunnel. It uses a variety of packet-switched network connections. This solution allows the endpoints of the network to be placed on different devices.

Such a system means that connections can be interrupted on the LAN hubs, preventing various expenses, including for long distance calls.

Tunneling is the best option for protecting data in a corporate network, which allows not only to reliably protect the transmitted data, but also to encrypt it when necessary. Tunnels can also be considered as special protection for the transmission of unsupported protocols over various types of networks.