Solved

Tunneling and firewalls

Posted on 2014-03-25
5
188 Views
Last Modified: 2014-03-25
Exactly how tdoes tunneling fix any firewall issues ?

Many Thanks
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Expert Comment

by:bigbigpig
ID: 39954366
I'm having a hard time interpreting your question.  What kind of firewall issues are you having?  What sort of tunneling do you want to do, from where, to where?
0
 
LVL 8

Expert Comment

by:Lee Ingalls
ID: 39954378
A little more information may be required... but tunneling will not "fix firewall issues". Tunneling allows you to pass through a firewall if that is what you meant.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39954454
tunnelling may allow you to bypass a restrictive rule on a firewall, if that firewall doesn't block your tunnel.

correctly configured, it can also allow you to set up inbound connections when your firewall isn't configured to allow that - this is because much tunnelling is in fact a specialized form of port forwarding (albeit from another server rather than from the outside of your firewall)

however, as previous posters have said, you need to provide more context for a fuller answer.
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39954621
Thank you, and I will try to provide more details in future posts
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39954642
@NewJerseyDave - we are happy to answer your question here, you just didn't give enough detail for a full answer. Feel free to expand in reply to this :)
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ready for our next Course of the Month? Here's what's on tap for June.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question