N/w Tunneling Presentation

  • Uploaded by: atishay811
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View N/w Tunneling Presentation as PDF for free.

More details

  • Words: 402
  • Pages: 14
Network Tunneling – The Concept, the Applications Atishay Jain, 10783017 BE 3rd Year, Thapar University.

Atishay Jain,Network Tunneling

1

Contents 1

Introduction – The What?

2

A little basics – The How?

3

Applications – The Positives !

4

Misuse – The Negatives !

5

Conclusion – That Does it ! Atishay Jain,Network Tunneling

2

Introduction – What it is? v Some terms, you might be interested in – Proxy(URL Translation), Tunnel(Ultrasurf), Work at Home, Virtual Private Networks, etc…

“A tunnel provides a route for moving from one of its ends to another, hiding details of the route in between”

Atishay Jain,Network Tunneling

3

Intro – contd… vFormal Definition: “The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol” Atishay Jain,Network Tunneling

4

The Basics – the How? L2 for delivery

Layer 2 Tunneled in L3

Layer 3 Goes to L3

Layer 3 A normal packet

Layer 4

Atishay Jain,Network Tunneling

5

Types Popular Types

HTTP Encapsulation

SSH Encapsulation This tunneling involves encapsulation into the SSH protocol – for obvious reasons security.

Others: L2 Encapsulation, IPv6 to IPv4, Proprietary Protocols, etc…

Plugging within a HTTP packet can be for various reasons – HTTP is most used, normally accessible - I hope you get an idea malicious as well as non-malicious …

Atishay Jain,Network Tunneling

6

SSH Port Forwarding

Atishay Jain,Network Tunneling

7

HTTP & HTTPS

vHTTP inside HTTP, the most popular…

Atishay Jain,Network Tunneling

8

Terms v Proxy and URL Translation. v SOCK 4/5. v Tunnel Broker – RFC 3053 v Tunneling Software

Atishay Jain,Network Tunneling

9

Applications – the Positives ! Work at Home Secure Transfer

IPv6 in IPv4 Prepare an IPv6 packet. •Encrypt it in IPv4 packet with the address of a translation server. •Cross the old IPv4 routers •Decapsulate. •

Encapsulate information in primitive protocol •Encapsulate in a secure protocol •Send •Decapsulate •

Tunneling

VPN

Atishay Jain,Network Tunneling

10

VPN & Work at Home Concept

Atishay Jain,Network Tunneling

11

Misuse – The Negatives ! vAccessing Blocked Material …..

Atishay Jain,Network Tunneling

12

Conclusion – That Does it ! vGood and Bad is of each technology… vTunneling has changed the way we live… vPreventing misuse is next to impossible, but I think we would never want internet to get lost over these issues.

Atishay Jain,Network Tunneling

13

Thank You ! Atishay Jain 10783017

Atishay Jain,Network Tunneling

14

Related Documents

Network Tunneling
May 2020 10
Nw Sec
November 2019 17
Tunneling Effect
November 2019 12
Cursosap Nw
November 2019 15
Micro Tunneling
June 2020 8

More Documents from ""