[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 205
  • Last Modified:

Tunneling Architecture

Do Tunnels generally require a separate tunneling agent or executable to perform tunneling, or do the apps package the data in this manner themselves?

Thanks
0
Anthony Lucia
Asked:
Anthony Lucia
2 Solutions
 
Dash AmrCommented:
It all depends on so many variables like what you  want to secure and how, and how fast is your connections and the amount of data you need to tunnel, in saying that 2 main types of tunneling

Secure shell tunneling
Tunneling to circumvent firewall policy

but I would say not all apps packages will be able to secure your data as you wish out of the box. you need need a separate client to initiate the tunnel
0
 
Dave HoweCommented:
depends on what you are tunnelling, to where, and with what.

the simplest form of tunnel is one you use every day - https. By creating a TLS connection, a web browser is able to send and receive http (web) traffic securely.  the web browser handles all of that for you though, so no other/special software is needed.

in most cases, the tunnelling app is separate, and you use it with otherwise normal (non-tunnelling) software, How you then configure that software varies depending on the app and the protocol you are tunnelling. VPN typically pretends to be a network card, hence the tunnelling is completely transparent to the tunnelled app.  SSH tunnels open explicit listening ports, and you have to connect to those to have the traffic tunnelled. This is TCP only (while vpn can handle UDP) and has a predetermined destination.

proxy-configured tunnelling usually (again) opens a listening port, but the app must be configured to use the port as a proxy and can then specify a final destination. If you use ssh in this configuration (-D or dynamic mode) then you can configure a web browser as a "socks 4a" proxy, and web browse as normal (albeit with internet servers seeing you coming "from" the ssh server, and your internal monitors seeing only a ssh link from you to the ssh server (and no separate connection for the tunnelled traffic)
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now