Reader small image

You're reading from  Learning Network Forensics

Product typeBook
Published inFeb 2016
Publisher
ISBN-139781782174905
Edition1st Edition
Concepts
Right arrow
Author (1)
Samir Datt
Samir Datt
author image
Samir Datt

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
Read more about Samir Datt

Right arrow

Types of tunneling protocols


As we have learned in the previous sections, a tunnel is a way of shipping a foreign protocol across a network that will not support it directly. Let's take a look at the different tunneling protocols and their characteristics to see how this is done.

The Point-to-Point Tunneling Protocol

Point-to-Point Tunneling Protocol is also known as PPTP. This was created by a consortium including Microsoft and other companies. PPTP is a fast protocol that, besides Windows, is also available to Linux and Mac users.

While PPTP does not have an inbuilt capability to provide traffic encryption, it relies on the Point-to-Point Protocol (PPP) to provide security measures during transmission.

PPTP allows traffic with different protocols to be encrypted and then encapsulated in an IP datagram to be sent across an IP network such as the Internet.

PPTP encapsulates PPP frames in the IP datagrams using a modified version of Generic Routing Encapsulation (GRE). A TCP connection is used...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Learning Network Forensics
Published in: Feb 2016Publisher: ISBN-13: 9781782174905

Author (1)

author image
Samir Datt

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
Read more about Samir Datt