Solved

Tunneling Architecture

Posted on 2014-03-26
2
197 Views
Last Modified: 2014-03-26
Do Tunnels generally require a separate tunneling agent or executable to perform tunneling, or do the apps package the data in this manner themselves?

Thanks
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 4

Accepted Solution

by:
Dash Amr earned 250 total points
ID: 39956939
It all depends on so many variables like what you  want to secure and how, and how fast is your connections and the amount of data you need to tunnel, in saying that 2 main types of tunneling

Secure shell tunneling
Tunneling to circumvent firewall policy

but I would say not all apps packages will be able to secure your data as you wish out of the box. you need need a separate client to initiate the tunnel
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 250 total points
ID: 39957026
depends on what you are tunnelling, to where, and with what.

the simplest form of tunnel is one you use every day - https. By creating a TLS connection, a web browser is able to send and receive http (web) traffic securely.  the web browser handles all of that for you though, so no other/special software is needed.

in most cases, the tunnelling app is separate, and you use it with otherwise normal (non-tunnelling) software, How you then configure that software varies depending on the app and the protocol you are tunnelling. VPN typically pretends to be a network card, hence the tunnelling is completely transparent to the tunnelled app.  SSH tunnels open explicit listening ports, and you have to connect to those to have the traffic tunnelled. This is TCP only (while vpn can handle UDP) and has a predetermined destination.

proxy-configured tunnelling usually (again) opens a listening port, but the app must be configured to use the port as a proxy and can then specify a final destination. If you use ssh in this configuration (-D or dynamic mode) then you can configure a web browser as a "socks 4a" proxy, and web browse as normal (albeit with internet servers seeing you coming "from" the ssh server, and your internal monitors seeing only a ssh link from you to the ssh server (and no separate connection for the tunnelled traffic)
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
php extract($_REQUEST) 5 90
Windows 2012 PKI in a hybrid org 3 57
Strange proxy setting on slower than usual laptop 8 34
Local User Account Group Policy 8 51
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
The related questions "How do I recover the passwords for my Q-See DVR" and "How can I reset my Q-See DVR to eliminate a password" are seen several times a week.  Here we discuss the grim reality of the situation.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question