the creation of an encrpyted/secured link over a public network. The secured link can support alternate protocols to the public network, although this is transparent to the user. Tunnelling is also used in the context of establishing a secure, open link through a corporate Firewall.
Encapsulation of complete datagrams within other datagrams. Frequently used to transmit non-IP protocols across IP networks.
Tunnelling refers to encapsulation of protocol A within protocol B, such that A treats B as though it were a datalink layer. Tunnelling is used to get data between administrative domains which use a protocol that is not supported by the internet connecting those domains. See also: Administrative Domain.
A virus that avoids standard interfaces to infect files. This allows the virus to infect files and go unnoticed by a behavior blocker. One evasion technique used by attackers is tunnelling malicious communications through the standard port of another application (e.g., port 80 for HTTP) to avoid firewalls.
Tunnelling refers to encapsulation of protocol A within protocolB, such that A treats B as though it were a datalink layer.Tunnelling is used to get data between administrative domainswhich use a protocol that is not supported by the internetconnecting those domains. See also: Administrative Domain. twisted pair