Fact-checked by Grok 2 weeks ago

IP tunnel

An IP tunnel, also known as IP in IP tunneling, is a networking technique that encapsulates an original (the ) within a new outer IP packet (the tunnel header) to transport it across an intermediate IP network, effectively creating a virtual point-to-point link between endpoints while hiding the inner packet's details from intermediate routers. This encapsulation uses the IP number 4 for IPv4 or equivalent mechanisms for , allowing the outer header to route the packet to the tunnel where the inner packet is decapsulated and forwarded to its final destination. IP tunnels serve multiple purposes in modern networks, including enabling the transition from IPv4 to by carrying packets over IPv4 infrastructure, connecting disjoint or remote networks such as in or environments, and providing a foundation for secure communications through integration with protocols like . For instance, they facilitate virtual private networks (VPNs) by simulating direct connections over public IP networks, bypassing limitations of physical topology. Common implementations include automatic tunneling for transition and manual tunnels for specific enterprise needs. Despite their utility, IP tunnels introduce architectural considerations, such as (MTU) fragmentation risks and potential vulnerabilities like that can evade or amplify denial-of-service attacks if not properly secured. In terms of , tunnels can operate in a "pipe model" to preserve inner packet markings for end-to-end or a "uniform model" to treat the tunnel as part of the path, influencing how is prioritized across domains. Management of IP tunnels is standardized through MIB modules for and configuration over IPv4 and IPv6 networks.

Overview

Definition and Basics

An IP tunnel is a networking technique that encapsulates an original , referred to as the or inner packet, within another IP packet known as the or outer packet, thereby creating a virtual point-to-point connection over an intervening network. This encapsulation uses the protocol number 4 for IPv4-in-IPv4 or 41 for IPv6-in-IPv4 in the outer header. This process allows the inner packet to traverse networks that may otherwise be incompatible with or restrict the original traffic, treating the tunnel as a logical link between endpoints. Key terminology in IP tunneling includes the tunnel endpoints, which consist of the ingress point where encapsulation occurs—adding the outer IP header to the inner packet—and the egress point where decapsulation takes place, stripping the outer header to forward the original inner packet. The inner header carries the source and destination addresses of the original communication, while the outer header provides routing information for transit across the tunnel path; decapsulation ensures the inner packet is restored intact at the egress for delivery to its final destination. IP tunneling operates specifically at the network layer (Layer 3 of the ), distinguishing it from tunneling at lower layers like the (e.g., Ethernet encapsulation) or higher layers such as the , where protocols would wrap non-IP payloads or handle user-level data differently.

Primary Purposes

IP tunnels primarily enable the connection of otherwise incompatible or disjoint networks, such as carrying packets across intervening infrastructure that does not directly support the inner protocol, thereby addressing challenges in heterogeneous or segmented environments. This capability allows isolated endpoints to communicate effectively. Another core purpose is to extend network reach, permitting the logical connection of remote sites or disjoint domains over underlying infrastructure, thereby creating virtual links that simulate direct adjacency. tunnels also support protocol transitions, such as carrying traffic within IPv4 packets during the migration from IPv4 to , ensuring compatibility between evolving network standards without immediate full infrastructure upgrades. IP tunnels provide a foundation for secure communications, serving as a basis for integrating and protocols like to safeguard transmissions over untrusted public networks. On the performance front, tunnels facilitate the aggregation of flows, which can optimize efficiency and reduce protocol overhead in scenarios requiring consolidated bandwidth management. In practice, organizations often employ IP tunnels to interconnect branch offices across the public internet, eliminating the need for costly dedicated lines while maintaining seamless data exchange between locations.

Technical Fundamentals

Encapsulation Mechanism

In IP tunneling, the encapsulation mechanism involves wrapping an original (inner) IP packet within a new (outer) IP packet to transport it across an intermediate network that may not support the inner packet's protocol or addressing. At the ingress tunnel endpoint, the process begins by decrementing the Time to Live (TTL) field in the inner IP header by one, as if it were being forwarded normally. An outer IP header is then prepended to the inner packet, with the outer header's source address set to the ingress endpoint's address and the destination address set to the egress endpoint's address. The outer header's Protocol field is typically set to 4 for IP-in-IP encapsulation, indicating that the payload is another IP packet, though other values may be used depending on additional tunnel headers. For IPv6 outer headers, the Next Header field is set to 41 for IPv6 encapsulation. Optionally, intermediate protocol headers—such as those for Generic Routing Encapsulation (GRE) or security protocols—can be inserted between the outer IP header and the inner packet to provide features like multiplexing or authentication, increasing the overall header length. The outer header's Total Length field is updated to reflect the size of the entire encapsulated datagram, its Header Checksum is recalculated, and other fields like Type of Service (TOS) are often copied from the inner header for consistency. This results in the inner packet being treated as opaque payload by the outer network's routers, which forward it based solely on the outer header. The decapsulation process occurs at the egress endpoint, where the outer (and any optional intermediate headers) is stripped away upon receipt of the tunneled packet. The inner is then inspected, and its is not further decremented during this step to avoid double-counting the tunnel traversal. If the inner has reached zero, the packet is discarded with an ICMP Time Exceeded message generated if applicable. The decapsulated inner packet is subsequently forwarded to its original destination as a standard , using the inner header's information. This endpoint-based processing ensures that the tunnel remains transparent to the endpoints of the original communication. Encapsulation introduces overhead by adding 20 bytes for a basic IPv4 outer header, or up to 60 bytes when including optional headers like outer headers or GRE, which expands the total packet size and can necessitate adjustments to the (MTU). To mitigate this, tunnel endpoints often use , where the effective MTU is reduced by the overhead amount (e.g., subtracting 20-40 bytes for IPv4/IPv6 headers), preventing excessive fragmentation along the path. If the encapsulated packet exceeds the path MTU, the ingress endpoint may fragment the inner packet before encapsulation or set the Don't Fragment bit in the outer header to trigger ICMP feedback for dynamic MTU adjustment. Error handling in IP tunneling distinguishes between the outer and inner headers to maintain across the tunnel. The outer header includes its own , which is verified by intermediate routers and the egress to detect transmission s in the tunnel path; if invalid, the entire packet is dropped, and an ICMP message may be sent to the ingress . The inner packet's remains unchanged and is only validated post-decapsulation, preserving end-to-end error detection. Fragmentation issues arise if the inner packet is larger than the tunnel MTU, potentially leading to reassembly at the egress , which can introduce delays or if fragments are dropped; thus, protocols recommend avoiding fragmentation by preferring smaller inner packets or enabling to signal reductions proactively.

Header Structure and Processing

In IP tunneling, the outer IP header encapsulates the original packet, using the IP addresses of the tunnel endpoints as source and destination to route the tunneled traffic across the network. The outer header's protocol field specifies the tunneling mechanism, such as IP protocol number 4 for IP-in-IP encapsulation or 47 for (GRE). Other fields, like the (TOS), may be copied from the inner header to preserve quality-of-service markings, while the total length reflects the entire encapsulated , and the (TTL) is set to ensure delivery to the egress . The inner , which carries the original packet's source and destination addresses, remains largely preserved during transit to maintain the integrity of the end-to-end . It is typically unchanged except for the having been decremented at the ingress endpoint to account for the tunnel traversal as a single logical hop, preventing excessive decrementing that could occur if treated as multiple router hops. IP options from the inner header are not copied to the outer header, which can affect processing for features like or timestamps. At the ingress , the encapsulator adds the outer to the inner packet (following the encapsulation mechanism of wrapping the original as ) and forwards it based on the outer destination toward the egress . Intermediate routers along the path process the packet as standard traffic, examining only the outer header for routing decisions and decrementing the outer without awareness of the encapsulated content. Upon arrival at the egress , the outer header and any tunnel-specific headers are stripped, and the inner packet is forwarded based on its original destination , with checks to ensure the allows continued delivery. Key challenges in header processing include preventing recursive tunneling, where a tunneled packet is erroneously re-encapsulated, potentially causing loops; implementations address this by discarding packets at the encapsulator if the inner source address matches the local interface or if the outer destination is the same device. Handling IP options poses another issue, as their exclusion from the outer header may bypass security filters or complicate , requiring careful configuration to avoid fragmentation or drops.

Common Protocols and Types

Generic Routing Encapsulation (GRE)

(GRE) is a that enables the encapsulation of a wide variety of protocols inside virtual point-to-point links over an network. Defined in RFC 2784, GRE provides a lightweight mechanism for transporting arbitrary payload packets by wrapping them in a GRE header and an outer , using protocol number 47 to identify GRE packets in IPv4 networks. This design allows GRE to support multiprotocol encapsulation without relying on , making it suitable for scenarios where flexibility is prioritized over . An extension in RFC 2890 adds optional fields to the GRE header for enhanced functionality in traffic identification and ordering. The GRE header consists of a fixed portion followed by optional fields, ensuring minimal overhead for basic operations. The fixed header consists of a 2-octet Flags and field (with bits 13-15 set to 0 for the version) followed by a 2-octet Type field that specifies the encapsulated protocol (e.g., 0x0800 for IPv4 or 0x809B for IPX). The Flags field includes specific bits for optional elements: (bit 0), reserved (bit 1), (bit 2, per 2890), and sequence number (bit 3, per 2890); the remaining bits are reserved and must be zero. Optional fields include a 2-octet and 2-octet Reserved1 if the checksum bit is set, a 4-octet for identification to demultiplex traffic in shared tunnels, and a 4-octet Sequence Number for maintaining packet order by incrementing per flow and discarding out-of-sequence packets at the receiver. This structure supports multiprotocol payloads by relying on the Protocol Type to route the inner packet appropriately after decapsulation. GRE excels in use cases involving non-IP protocols and multicast traffic, where native IP networks may lack support. It enables the tunneling of legacy protocols such as IPX or over modern infrastructures, preserving their headers intact for end-to-end delivery without requiring protocol-specific adaptations. Additionally, GRE natively handles and broadcast packets, facilitating dynamic routing protocol exchanges like OSPF or EIGRP across tunnels that would otherwise be restricted in unicast-only environments. Configuring a basic GRE tunnel on routers involves creating a virtual tunnel interface and specifying endpoints, without any encryption parameters. The process starts with entering global configuration mode and creating the interface using interface Tunnel <number>, followed by assigning an with ip address <ip> <mask>. The tunnel source is set via tunnel source <local-ip-or-interface>, and the destination with tunnel destination <remote-ip>, establishing the point-to-point link. is then enabled on the tunnel interface to forward traffic, such as with ip route statements or dynamic protocols, allowing encapsulated packets to traverse the network seamlessly.

IPsec-Based Tunneling

IPsec-based tunneling provides a secure method for encapsulating IP packets to create virtual private networks over public infrastructure, primarily through tunnel mode operations defined in the IPsec architecture. In this mode, the entire original IP packet, including its header and payload, is encapsulated within a new outer IP header that specifies the tunnel endpoints, typically security gateways or hosts acting as gateways. This encapsulation enables end-to-end protection across untrusted networks by applying security protocols such as Encapsulating Security Payload (ESP) or Authentication Header (AH) after the outer IP header and before the inner packet. ESP in tunnel mode offers comprehensive protection by encrypting the inner to ensure , while also supporting optional integrity checks. The ESP header is inserted after the outer , followed by the encrypted inner packet, and includes an ESP trailer that adds padding for alignment, a pad length field, and a next header indicator pointing to the inner . An optional Integrity Check Value (ICV) is appended after the inner packet to provide and integrity, computed using algorithms like . For encryption, common algorithms such as are employed to protect against , with the (IV) included in the ESP header for secure key derivation. AH in tunnel mode focuses on and without , protecting the entire inner and selected fields of the outer against tampering. The header, placed after the outer , contains fields such as the Security Parameter Index (SPI) for identifying the (SA), a sequence number for ordering, and an ICV for verifying using mechanisms like . Unlike , AH does not alter the packet length significantly but ensures anti-replay protection through a sliding window mechanism on sequence numbers, preventing duplicate . Security associations for IPsec tunnel mode are established and managed via the (IKE) protocol, specifically IKEv2, which automates key negotiation and SA creation between peers. IKEv2 conducts an initial exchange to mutually authenticate endpoints, derive shared keys using Diffie-Hellman, and negotiate parameters like encryption algorithms (e.g., for confidentiality) and integrity methods (e.g., for data origin authentication). Subsequent child SAs are created for the actual IP traffic, specifying traffic selectors to define the protected flows, ensuring that tunnel mode SAs provide robust anti-replay via 64-bit sequence numbers by default. A key distinction of tunnel mode from transport mode lies in the scope of protection: tunnel mode secures the full inner IP packet, including its header, making it ideal for gateway-to-gateway or host-to-gateway scenarios where the original packet's routing information must remain hidden, whereas transport mode only protects the payload and upper-layer protocols for direct end-to-end communications. This full encapsulation in tunnel mode adds an outer IP header but introduces processing overhead during header construction and decryption at the tunnel endpoints.

Applications and Use Cases

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) rely on IP tunnels to establish secure, private connections over public IP networks, encapsulating internal traffic within outer IP packets to form protected overlays. This architecture isolates VPN traffic from the underlying infrastructure, enabling confidentiality, integrity, and controlled access as if the networks were directly connected. Common implementations combine tunneling protocols like (GRE) for basic encapsulation with IPsec for encryption and authentication, creating robust overlays suitable for enterprise environments. In site-to-site VPNs, tunnels connect entire networks by establishing endpoints on routers or gateways at each location, forming a virtual mesh that routes traffic securely between sites. These configurations typically use point-to-point or full-mesh topologies, where tunnel endpoints handle encapsulation and decapsulation, minimizing the need for complex (CPE). For example, in an setup for connectivity, routers at and branches establish GRE-over-IPsec tunnels, with traffic selectors defining to protect specific flows like internal application traffic while allowing selective bypass for public-facing services. Remote access VPNs extend this model by creating client-to-gateway tunnels, allowing mobile users to connect securely from remote devices to the corporate . These setups often employ in tunnel mode, where the client initiates a connection to a gateway that authenticates and assigns virtual addresses for seamless integration. Authentication mechanisms include digital certificates for mutual verification of client and gateway identities, or integration with servers via the (EAP) within IKEv2 to support username/password or multi-factor methods.

IPv6 Transition Mechanisms

IP tunneling plays a crucial role in IPv6 transition mechanisms by enabling the encapsulation and transmission of packets across existing IPv4 infrastructures, facilitating gradual deployment without immediate full network upgrades. These mechanisms address compatibility challenges during the coexistence of IPv4 and , allowing isolated IPv6 domains or hosts to connect seamlessly. 6to4 tunneling provides an automatic method for sites to communicate over IPv4 clouds without requiring explicit tunnel configuration. It embeds the IPv4 address of the tunnel endpoint into the prefix using the 2002::/16 range, enabling anycast-based relay routers to decapsulate and forward packets to the native Internet. This approach relies on protocol 41 encapsulation for IPv6-in-IPv4 tunneling and is particularly suited for connecting multiple networks across public IPv4 backbones. Teredo extends connectivity to nodes behind IPv4 Network Address Translators (NATs) by tunneling packets within datagrams, overcoming restrictions that block direct protocol 41 tunnels. It assigns globally routable addresses to clients using a prefix that incorporates the NAT's public IPv4 address and , with Teredo servers and relays handling qualification, encapsulation, and decapsulation processes. Operating on 3544, Teredo supports communication and integrates with for security, making it effective for individual hosts in residential or enterprise environments with needs. ISATAP facilitates intra-site IPv6 connectivity by treating an IPv4 network as a virtual non-broadcast multiple access (NBMA) for packets, enabling automatic tunneling between dual-stack (IPv4/) nodes. It uses a specific address format where the interface identifier embeds the host's IPv4 , allowing routers and hosts to discover each other via IPv4 or advertisements without dedicated tunnel brokers. Designed for enterprise or campus networks, ISATAP supports dynamic address autoconfiguration and integrates with existing IPv4 infrastructure to deploy incrementally within a single administrative domain. As native adoption has reached approximately 45-50% globally as of , these tunneling mechanisms—, Teredo, and ISATAP—have seen reduced usage due to their interim nature and operational complexities, such as reliance on public relays and potential security vulnerabilities. They are now considered deprecated or rarely used in modern deployments, with major vendors like recommending native connectivity over tunnels where possible. However, legacy support persists in operating systems and routers for , ensuring that remaining IPv4-only environments can still access resources during the ongoing transition.

Historical Development

Origins and Early Adoption

IP tunneling techniques were developed in the early to address key limitations in the burgeoning , including inadequate support for , , and the of diverse network protocols amid the transition toward dominance. These challenges arose as the () became the , yet many networks still relied on non-IP protocols and lacked native mechanisms for efficient data transport across heterogeneous environments. The first widely applicable protocol for general-purpose IP tunneling was (GRE), introduced in October 1994 by Systems engineers Stan Hanks, Tony Li, Dino Farinacci, and Paul Traina through 1701. GRE provided a simple, extensible framework for encapsulating arbitrary protocols within IP packets, reducing the need for protocol-specific tunneling mechanisms and supporting features like policy routing. This specification was later obsoleted and refined in 2784 in 2000 to address ambiguities and enhance compatibility. Early adoption of IP tunneling focused on enterprise networks, where GRE enabled the interconnection of legacy protocols such as and over IP backbones, allowing organizations to maintain existing infrastructures while leveraging the growing IP ecosystem. This approach proved valuable in bridging disparate systems without requiring immediate overhauls, particularly in corporate settings transitioning from proprietary protocols to IP-centric architectures. Key contributions to the foundational concepts of IP tunneling came from IETF working groups active in the early 1990s, notably the Working Group, chartered in June 1992 to develop protocols for host mobility using encapsulation techniques between home and foreign networks. These efforts laid the groundwork for tunneling as a core enabler of virtual network overlays and protocol flexibility.

Key Milestones and Evolution

The standardization of underwent significant evolution in the early 2000s to enhance its tunneling capabilities for secure IP communications. The initial architecture was defined in the 2401 suite, published in November 1998, which outlined security associations and protocols for both transport and tunnel modes to protect IP traffic. This suite laid the groundwork for IP tunneling by encapsulating packets to provide confidentiality and integrity over untrusted networks. By 2005, the architecture was updated in 4301, introducing a more modular design that improved tunnel mode efficiency, simplified , and better supported both IPv4 and environments through refined security association processing. These changes addressed limitations in the original suite, such as interoperability issues, making tunneling more robust for widespread deployment in virtual private networks. Parallel to IPsec advancements, the early 2000s saw key developments in tunneling mechanisms to facilitate the transition from IPv4 infrastructure. The protocol, standardized in 3056 in February 2001, enabled automatic tunneling of packets over IPv4 networks by embedding IPv4 addresses into prefixes, allowing sites to connect without manual tunnel configuration. This approach supported dual-stack environments where islands communicated across IPv4 backbones. Building on such techniques, Teredo was specified in 4380 in February 2006, providing a UDP-based tunneling solution to traverse IPv4 Network Address Translators (NATs), thus enabling connectivity for hosts behind restrictive firewalls during the dual-stack transition phase. These s reflected the IETF's focus on stateless, scalable tunneling to accelerate adoption amid slow native deployment. In the 2010s, IP tunneling evolved with the rise of (SDN) and cloud-native architectures, enabling dynamic and automated tunnel management. SDN frameworks, emerging prominently after the specification in 2008, integrated IP tunneling protocols like GRE and into programmable overlays, allowing centralized control for virtual in data centers. For instance, cloud providers adopted tunnel-based for hybrid environments; AWS introduced VPC in 2014, which leverages underlying IP encapsulation to enable private connectivity between virtual private clouds without public internet exposure, supporting scalable inter-region and cross-account tunneling post-2014. This integration marked a shift toward API-driven tunnel , enhancing elasticity in cloud infrastructures. As matured in the 2010s, certain tunneling mechanisms faced deprecation due to reliability concerns and the preference for native protocols. The IETF issued advisory guidelines in RFC 6343 in March 2011, recommending against new deployments owing to issues like relay router instability and security vulnerabilities in automatic tunneling. This was followed by RFC 7526 in April 2015, which deprecated the prefix for relays, urging operators to migrate to native or more stable alternatives like 6rd. These recommendations underscored a broader industry shift away from transitional tunnels toward dual-stack or full native implementations, with global IPv6 traffic adoption exceeding 25% by the late 2010s and reaching over 40% as of 2025. In the 2020s, IP tunneling continued to evolve with advancements in and . The Geneve protocol, standardized in RFC 8926 in November 2020, provided a flexible encapsulation framework for overlay networks in cloud and environments, supporting options for enhanced programmability and with SDN. These developments reflect ongoing adaptations to support , , and hybrid cloud deployments as of 2025.

Advantages and Limitations

Benefits

IP tunneling offers significant flexibility in network design by enabling protocol-agnostic transport, where packets from diverse protocols can be encapsulated within packets for transmission across networks. This capability supports easy , allowing administrators to create isolated virtual topologies—such as full or arbitrary configurations—without requiring physical changes. For instance, it facilitates the emulation of traditional services like leased lines or over shared IP backbones, accommodating multiple protocols and non-unique addressing schemes. A key benefit is cost-efficiency, as IP tunneling leverages existing public IP infrastructure to avoid the expenses associated with new cabling, dedicated hardware, or leased lines. This approach can yield savings of 50 to 75 percent compared to traditional setups, particularly for connecting distant sites where costs are distance-insensitive and lower than point-to-point circuits. In applications, such efficiencies enable organizations to outsource connectivity management to service providers, further reducing costs and operational burdens. IP tunneling enhances for large-scale deployments, such as global VPNs, by supporting efficient through virtual tunnels that minimize endpoint modifications. Network-based implementations amortize equipment and across multiple users, allowing seamless expansion without proportional increases in physical infrastructure. In multi-site networks, this translates to reduced administrative overhead for tables, as tunnels enable route aggregation and simplify compared to maintaining individual entries for each remote location.

Challenges and Drawbacks

IP tunneling introduces performance overhead primarily due to the encapsulation and decapsulation processes, which add extra headers to packets and require computational resources for processing. This encapsulation increases packet size, leading to higher consumption and potential fragmentation, while the associated CPU load on routers and endpoints can degrade throughput, especially in high-speed environments where is combined with tunneling. For instance, in IPsec-based tunnels, and decryption further amplify and usage, as the protocols must handle both computations and the additional overhead from tunnel headers. Security risks arise when tunnels lack proper , exposing inner packet contents to and sniffing attacks, particularly in protocols like GRE that do not inherently provide confidentiality. Even with via IPsec, complexities in —such as generating, distributing, and refreshing cryptographic keys—can introduce vulnerabilities if not handled securely, including risks from weak pre-shared keys or improper in public key infrastructures. Additionally, tunnels can bypass traditional network filters and firewalls if those devices are not configured to inspect tunneled , potentially increasing the and complicating defense mechanisms. The operational complexity of IP tunneling often manifests in debugging difficulties, as traffic is obscured within layers of encapsulation, making it challenging to trace issues across diverse vendor implementations and network paths. Compatibility problems between different tunneling protocols or devices can lead to failures, requiring meticulous configuration to ensure seamless operation. A notable example is (PMTUD) failures in tunnels like GRE, where the added encapsulation overhead reduces the effective MTU, and if ICMP "Fragmentation Needed" messages are blocked or mishandled, packets may be dropped silently, resulting in blackholing and connectivity loss.

References

  1. [1]
    RFC 2983: Differentiated Services and Tunnels
    1. Conventions used in this document An IP tunnel encapsulates IP traffic in another IP header as it passes through the tunnel; the presence of these two IP ...
  2. [2]
    RFC 1853 - IP in IP Tunneling - IETF Datatracker
    This document discusses implementation techniques for using IP Protocol/Payload number 4 Encapsulation for tunneling with IP Security and other protocols.
  3. [3]
  4. [4]
    draft-ietf-intarea-tunnels-15 - IP Tunnels in the Internet Architecture
    This document focuses on tunnels that transit IP packets, ie, in which an IP packet is the payload of another protocol, other than a typical link layer.
  5. [5]
    RFC 2983: Differentiated Services and Tunnels
    Conventions used in this document An IP tunnel encapsulates IP traffic in another IP header as it passes through the tunnel; the presence of these two IP ...
  6. [6]
    Resolve IPv4 Fragmentation, MTU, MSS, and PMTUD Issues ... - Cisco
    Tunnels can bypass Access Control Lists (ACLs) and firewalls. If you tunnel through a firewall, you bypass the passenger protocol being tunneled. Therefore ...
  7. [7]
    Demystifying NAT Traversal with VPN IPsec - LIVEcommunity
    Dec 30, 2023 · NAT Traversal solves incompatibility between NAT and IPsec by adding a UDP header to encapsulate the IPsec ESP header, allowing NAT to perform ...NAT Traversal over IPSEC Tunnel - LIVEcommunity - 497IPSec Tunnel with NAT configuration - LIVEcommunity - 431147More results from live.paloaltonetworks.com
  8. [8]
    What is tunneling? | Tunneling in networking - Cloudflare
    Tunneling is a way to move packets from one network to another. Tunneling works via encapsulation: wrapping a packet inside another packet.Learning Objectives · Why Is Encapsulation Useful? · What Is A Vpn Tunnel?<|control11|><|separator|>
  9. [9]
    IP Tunnels - HPE Aruba Networking
    An IP tunnel provides a virtual link between endpoints on different networks, enabling data exchange as if they were directly connected.
  10. [10]
    What is IPSec? - IPSec Protocol Explained - Amazon AWS
    The Internet Engineering Task Force developed IPSec in the 1990s to ensure data confidentiality, integrity, and authenticity when accessing public networks.
  11. [11]
    IPsec aggregate for redundancy and traffic load-balancing
    Sep 26, 2019 · This article explains the use of Ipsec aggregate for redundancy and traffic load-balancing. This feature allows to load-balance traffic and set up redundancy ...
  12. [12]
    Implementing Tunnels - Cisco
    This module describes the various types of tunneling techniques available using Cisco IOS software. Configuration details and examples are provided.<|control11|><|separator|>
  13. [13]
    RFC 2003: IP Encapsulation within IP
    This document specifies a method by which an IP datagram may be encapsulated (carried as payload) within an IP datagram.
  14. [14]
    Chapter: Configuring IP-in-IP Tunnels - Routers - Cisco
    Dec 1, 2023 · IP-in-IP tunneling refers to the encapsulation and decapsulation of an IP packet as a payload in another IP packet.
  15. [15]
    RFC 2784: Generic Routing Encapsulation (GRE)
    ### Summary of RFC 2784: Generic Routing Encapsulation (GRE)
  16. [16]
    RFC 2784 - Generic Routing Encapsulation (GRE) - IETF Datatracker
    This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol.
  17. [17]
    RFC 2890 - Key and Sequence Number Extensions to GRE
    This document describes enhancements by which two fields, Key and Sequence Number, can be optionally carried in the GRE Header.Missing: structure | Show results with:structure
  18. [18]
  19. [19]
    RFC 4303 - IP Encapsulating Security Payload (ESP)
    Substructure of Payload Data * If tunnel mode is being used, then the IPsec implementation can add Traffic Flow Confidentiality (TFC) padding (see Section ...
  20. [20]
    RFC 4302: IP Authentication Header
    ### Summary of AH in Tunnel Mode (RFC 4302)
  21. [21]
    RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2)
    Below is a merged summary of IKE for Key Exchange in IPsec Tunneling based on RFC 7296, combining all the provided segments into a single, comprehensive response. To retain all details efficiently, I’ll use a structured format with text for the overview and a table for key processes, payloads, and configurations. This ensures maximum density while remaining clear and organized.
  22. [22]
    RFC 2764 - A Framework for IP Based Virtual Private Networks
    This document describes a framework for Virtual Private Networks (VPNs) running across IP backbones. It discusses the various different types of VPNs.
  23. [23]
    RFC 3056: Connection of IPv6 Domains via IPv4 Clouds
    This memo specifies an optional interim mechanism for IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup.
  24. [24]
    RFC 4380: Teredo: Tunneling IPv6 over UDP through Network ...
    We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling ...
  25. [25]
    RFC 5214: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
    ISATAP connects dual-stack (IPv6/IPv4) nodes over IPv4 networks, automatically tunneling IPv6 packets in IPv4, viewing IPv4 as a link layer for IPv6.
  26. [26]
    IPv6 in 2025 - Transitioning to IPv6 - Cisco Blogs
    Oct 31, 2025 · The IPv6 transition has been underway for nearly 30 years, with IPv6 traffic on the Internet now surpassing 50% by all measures [1]. Most ...
  27. [27]
    [PDF] IPv6 - Cisco Live
    • Deprecated/rarely used: 6to4, Teredo, ISATAP, NAT-PT, SeND, Mobile IPv6 ... Cisco Live San Diego 2025 IPv6 Learning Map. BRKENT-3002. IPv6 Security in the ...
  28. [28]
    What Is Teredo Tunneling? Simple Guide to IPv6 Transition
    Oct 13, 2025 · Bear in mind that transition mechanisms are “transitional” and it is quite likely that it is on the decline.<|control11|><|separator|>
  29. [29]
    [PDF] The evolution of multicast - UCSB Computer Science
    In addition to simple DVMRP tunnels between workstations, the MBone now has native multicast capability; that is, routers are capable of handling multicast ...
  30. [30]
    RFC 1701 - Generic Routing Encapsulation (GRE) - IETF Datatracker
    This document specifies a protocol for performing encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol.
  31. [31]
    [PDF] Interface and Hardware Component Configuration Guide, Cisco IOS ...
    Although TCP/IP now disables split horizon limitations by default, protocols such as AppleTalk and IPX are still constrained by split horizon. Subinterfaces ...
  32. [32]
    IP Routing for Wireless/Mobile Hosts (mobileip) - IETF Datatracker
    Group history ; 1992-11-30, (System), Changed milestone "Post an Internet-Draft documenting the Mobile Hosts protocol.", resolved as "Done" ; 1992-07-30, (System) ...Missing: 1990s | Show results with:1990s
  33. [33]
    RFC 2401: Security Architecture for the Internet Protocol
    The security protocol header appears after the outer IP header, and before the inner IP header. If AH is employed in tunnel mode, portions of the outer IP ...<|control11|><|separator|>
  34. [34]
    RFC 3056 - Connection of IPv6 Domains via IPv4 Clouds
    This memo specifies an optional interim mechanism for IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup.
  35. [35]
    What is VPC peering? - Amazon Virtual Private Cloud
    VPC peering is a networking connection between two VPCs, enabling traffic routing using private IPs, and is not a gateway or VPN.Missing: native | Show results with:native
  36. [36]
    RFC 6343 - Advisory Guidelines for 6to4 Deployment
    This document provides advice to network operators about deployment of the 6to4 technique for automatic tunneling of IPv6 over IPv4.Missing: maturation shift
  37. [37]
    RFC 7526 - Deprecating the Anycast Prefix for 6to4 Relay Routers
    This document requests that RFC 3068 ("An Anycast Prefix for 6to4 Relay Routers") and RFC 6732 ("6to4 Provider Managed Tunnels") be made obsolete and moved to ...
  38. [38]
    Types of Tunneling
    The advantage of using tunneling protocols is that data packets of different protocols can be transmitted over the Internet.
  39. [39]
  40. [40]
  41. [41]
  42. [42]
    [PDF] Implementing Virtual Private Networking for Enabling Lower Cost ...
    Why a VPN? The bottom line for most VPN implementations is cost savings. Virtual Private Networks. (VPNs) now can provide cost saving of 50 to 75 percent by ...
  43. [43]
  44. [44]
  45. [45]
    [PDF] Guide to IPsec VPNs - NIST Technical Series Publications
    Jun 1, 2020 · IPsec is a network layer security control for protecting communications. It is a framework of open standards for private communications over IP ...