Class-40 Ipv6 IP Tunneling- Practical of VPN in Hindi | CCNP



Class-40 Ipv6 IP Tunneling- Practical of VPN in Hindi | CCNP

Class-40 Ipv6 IP Tunneling- Practical of VPN in Hindi | CCNP

Class-40 Ipv6 IP Tunneling- Practical of VPN in Hindi | CCNP

Tunneling protocol is a communications protocol that allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network through a process called encapsulation

A technique of inter networking called Tunneling is used when source and destination networks of same type are to be connected through a network of different type. For example, let us consider an Ethernet to be connected to another Ethernet through a WAN

Why is this Technique called Tunneling?

In this particular example, the IP packet does not have to deal with WAN, the host A and B also do not have to deal with the WAN. The multi protocol routers M1 and M2 will have to understand about IP and WAN packets. Therefore, the WAN can be imagined to be equivalent to a big tunnel extending between multi protocol routers M1 and M2 and the technique is called Tunneling.

Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite. So, in other words, when data moves from host A to B it covers all the different level of the specified protocol (OSI, TCP/IP, etc.), while moving between different levels, data conversion (encapsulation) to suit different interfaces of the particular layer is called tunneling.

How does packet encapsulation work?

Data traveling over a network is divided into packets. A typical packet has two parts: the header, which indicates the packet’s destination and which protocol it uses, and the payload, which is the packet’s actual contents.

Why is encapsulation useful?

All packets use networking protocols — standardized ways of formatting data — to get to their destinations. However, not all networks support all protocols. Imagine a company wants to set up a wide area network (WAN) connecting Office A and Office B. The company uses the IPv6 protocol, which is the latest version of the Internet Protocol (IP), but there is a network between Office A and Office B that only supports IPv4.

what is a VPN tunnel?

A VPN is a secure, encrypted connection over a publicly shared network. Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network.

Many VPNs use the IPsec protocol suite. IPsec is a group of protocols that run directly on top of IP at the network layer.

Another protocol in common use for VPNs is Transport Layer Security (TLS). This protocol operates at either layer 6 or layer 7 of the OSI model depending on how the model is interpreted.

What is split tunneling?

Usually, when a user connects their device to a VPN, all their network traffic goes through the VPN tunnel. Split tunneling allows some traffic to go outside of the VPN tunnel.

Generic Routing Encapsulation (GRE) is one of several tunneling protocols. GRE encapsulates data packets that use one routing protocol inside the packets of another protocol. GRE is one way to set up a direct point-to-point connection across a network, for the purpose of simplifying connections between separate networks.

GRE adds two headers to each packet: the GRE header and an IP header. The GRE header indicates the protocol type used by the encapsulated packet. The IP header encapsulates the original packet’s IP header and payload.
What is IP-in-IP?

IP-in-IP is a tunneling protocol for encapsulating IP packets inside other IP packets.

What is SSH tunneling?

The Secure Shell (SSH) protocol sets up encrypted connections between client and server, and can also be used to set up a secure tunnel.

What are some other tunneling protocols?

In addition to GRE, IPsec, IP-in-IP, and SSH, other tunneling protocols include:

Point-to-Point Tunneling Protocol (PPTP)
Secure Socket Tunneling Protocol (SSTP)
Layer 2 Tunneling Protocol (L2TP)
Virtual Extensible Local Area Network (VXLAN)

Visit us for

Education : www.a2itsoft.com Development : www.a2itonline.com
whats app / Call us :+91 -7415151523, +91-7814141400

Learn free on Youtube: https://www.youtube.com/c/A2ITOnline

Our Instagram Page: https://www.instagram.com/a2it_online/

Our Facebook Page: https://www.facebook.com/A2itonline

Our Linkedin Page: https://www.linkedin.com/company/a2itonline-zccgroup/

Now Get Free Video Courses, E-Books, Event Updates & Class Notes Anywhere Anytime
LEARN ANYWHERE WITH A2IT IOS AND ANDROID APP

https://a2itsoft.com/free-app

Free Download Educational App with Step-by-Step Guide To Learn or Teach in Smarter Way.

Disclaimer- Some contents are used for educational purpose under fair use. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. .