Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Tunneling

I mentioned tunneling earlier in the chapter, but now is an excellent time to dig a little deeper. This is where the difference between pure IPSec and the Microsoft L2TP/IPSec tunnel can be explained. Tunneling is also referred to as encapsulation because the original packet is encapsulated inside a new packet. For those of you familiar with the early days of Novell NetWare, they used a form of IP Tunneling to encapsulate IPX packets within IP for transmission across an IP-only network. In the case of NetWare, however, encapsulation was used not for security purposes, but because the operating system couldn't "speak" native IP. This example is just to illustrate that the concept of tunneling is nothing new and is often used for reasons ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book