Solved

Tunneling and firewalls

Posted on 2014-03-25
5
165 Views
Last Modified: 2014-03-25
Exactly how tdoes tunneling fix any firewall issues ?

Many Thanks
0
Comment
Question by:Anthony Lucia
5 Comments
 
LVL 10

Expert Comment

by:bigbigpig
Comment Utility
I'm having a hard time interpreting your question.  What kind of firewall issues are you having?  What sort of tunneling do you want to do, from where, to where?
0
 
LVL 7

Expert Comment

by:Lee Ingalls
Comment Utility
A little more information may be required... but tunneling will not "fix firewall issues". Tunneling allows you to pass through a firewall if that is what you meant.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
Comment Utility
tunnelling may allow you to bypass a restrictive rule on a firewall, if that firewall doesn't block your tunnel.

correctly configured, it can also allow you to set up inbound connections when your firewall isn't configured to allow that - this is because much tunnelling is in fact a specialized form of port forwarding (albeit from another server rather than from the outside of your firewall)

however, as previous posters have said, you need to provide more context for a fuller answer.
0
 

Author Closing Comment

by:Anthony Lucia
Comment Utility
Thank you, and I will try to provide more details in future posts
0
 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
@NewJerseyDave - we are happy to answer your question here, you just didn't give enough detail for a full answer. Feel free to expand in reply to this :)
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now