Beruflich Dokumente
Kultur Dokumente
Tunnelling Protocols
B00297486
COMP09022 Network Design
Coursework 1
B00297486
Table of Contents
1. Executive Summary ............................................................................................. 2
2. Introduction .......................................................................................................... 3
3. Statement of Methodology ................................................................................... 4
4. Why is Tunnelling used ........................................................................................ 5
5. Tunnelling Protocols ............................................................................................ 6
5.1
5.2
5.3
6. Conclusion ......................................................................................................... 10
References ............................................................................................................... 11
Page 1 of 11
Coursework 1
B00297486
1. Executive Summary
The aim of this report is to review various Tunnelling Protocols, why they are used
and how they may be linked to other Tunnelling Protocols, and to explain why they
have been developed. The report also describes standardised Tunneling Protocols
and why one protocol may be used over another
Page 2 of 11
Coursework 1
B00297486
2. Introduction
The purpose of this report is to describe some tunnelling protocols, why tunnelling is
used, to explain why they have been developed and to also explain the reason why
one protocol is used over another. In this report, each protocol examined will give
information on the protocol, and explain why tunnelling is used, and why it may be
necessary.
Page 3 of 11
Coursework 1
B00297486
3. Statement of Methodology
In order to carry out this report, various sources were reviewed. These texts were
analysed to provide an understanding of various standardised Tunnelling Protocols
and why they are used.
Page 4 of 11
Coursework 1
B00297486
Page 5 of 11
Coursework 1
B00297486
5. Tunnelling Protocols
There are several tunnelling protocols, three of which are detailed below, Layer 2
Tunnelling Protocol (L2TP), Point to Point Tunnelling Protocol (PPTP) and Layer 2
Forwarding Protocol (L2F).
All three are linked in some way, PPTP was developed by Microsoft, Cisco realised
there was some absences within the protocol, so set about to improve it. This led to
L2F being developed. Then working with IETF, L2TP was developed. Looking at the
protocols, L2TP would seem to be the most secure of all three protocols. They all
use PPP to send data from one point to the other.
Page 6 of 11
Coursework 1
B00297486
Page 7 of 11
Coursework 1
B00297486
PPTP uses an improved Generic Routing Encapsulation (GRE). This allows for
flow control and the control of congestion encapsulated datagram which carried
PPP packets, this permits the efficient use of bandwidth.
As stated in RFC2637, The PPTP protocol is implemented only by the PAC and
PNS. No other systems need to be aware of PPTP. (Hamzeh, et al., 1999)
PPTP uses the same encryption as PPP. This can include Extensible
Authentication Protocol (EAP), Shiva Password Authentication Protocol (SPAP),
Password Authentication Protocol (PAP) and Microsoft Challenge-Handshake
Authentication Protocol (MS-CHAP)
Coursework 1
B00297486
Page 9 of 11
Coursework 1
B00297486
6. Conclusion
In conclusion, although there are a few tunnelling protocols, the above three
protocols would seem to be the most commonly used. The protocol that seems to be
the favoured is Layer 2 Tunnelling Protocol, as L2TP uses PPP and can be used
with IPsec to authenticate and encrypt each packet.
Page 10 of 11
Coursework 1
B00297486
References
Christensson, P., 2006. PPTP Definitions. [Online]
Available at: http://techterms.com/definition/pptp
[Accessed 06th March 2016].
eTutorials.org, 2008-2015. Tunnelling Protocols. [Online]
Available at:
http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/
Part+III+Virtual+Private+Networks+VPNs/Chapter+9+Cisco+IOS+IPSec+Introductio
n/Tunneling+Protocols/
[Accessed 03rd March 2016].
Hamzeh, K. et al., 1999. RFC2637. [Online]
Available at: https://www.ietf.org/rfc/rfc2637.txt
[Accessed 06th March 2016].
Infocellar, Unknown. Tunneling Protocols. [Online]
Available at: http://www.infocellar.com/networks/IPVPN/Tunneling-Protocols.htm
[Accessed 06th March 2016].
Macao., C. M. o., 2015. Multiplexing and Demultiplexing. [Online]
Available at:
http://macao.communications.museum/eng/exhibition/secondfloor/MoreInfo/2_8_6_
Multiplexing.html
[Accessed 14th March 2016].
Microsoft, 2016. Point-To-Point Tunnelling Protocol. [Online]
Available at: https://technet.microsoft.com/en-us/library/cc958045.aspx
[Accessed 06th March 2016].
Technology, A., 2003. Addpac PPTP. [Online]
Available at: http://www.addpac.com/addpac_kor2015/files/PPTP.pdf
[Accessed 06th March 2016].
THAKUR, D., Unknown. Multiplexing - What is Multiplexing ?Explain its Multiplexing
Methods. [Online]
Available at: http://ecomputernotes.com/computernetworkingnotes/multipleaccess/multiplexing-what-is-multiplexing-explain-its-multiplexing-methods
[Accessed 14th March 2016].
Townsley, W. et al., 1999. RFC2661. [Online]
Available at: https://tools.ietf.org/html/rfc2661
[Accessed 06th Month 2016].
Page 11 of 11