Tunneling Protocol

Tunneling is used in information technology (IT) to move data or communications across a network using protocols that are not compatible or supported by that network. Learn more about tunneling protocols and their various use cases in this definition.

What Is a Tunneling Protocol?

A tunneling protocol is a communication protocol strategy that allows IT teams to share incompatible or private information across a network via communication “tunnels.” This is done by wrapping or hiding the data packets inside other data packets. 

The most widely used application of tunneling protocols is in virtual private networks (VPN). Concepts of data encapsulation and data layering are used in tunneling protocols to safely carry data through a non-secure network or environment.

What Do Tunneling Protocols Do and How Are They Used?

Tunneling protocols are most commonly used for third-party data protection, online streaming, hiding IP addresses, public Wi-Fi use, or bypassing any bandwidth throttling imposed by internet service providers (ISPs). A more advanced use case for tunneling protocols supports remote user access to corporate networks. 

Tunneling protocols can also be used for malicious intent. For example, malicious actors use tunneling protocols to circumvent the firewall in an operating system.

Types of Tunneling Protocols

  • Open VPN: This is a type of open source VPN in which each operating system needs its own independent implementation of the VPN.  
  • Layer Two Tunneling Protocol (L2TP): L2TP was created as a result of the partnership between Microsoft and Cisco. It runs over a user datagram protocol (UDP) to provide fast and firewall-friendly service. 
  • Secure Socket Tunneling Protocol (SSTP): Available for Windows, Mac, and Linux users, SSTP requires the client’s system to connect through the transmission control port (TCP). 
  • Point-to-Point Tunneling Protocol (PPTP): This type of tunneling protocol is outdated and rarely used. In legacy networks or systems where it’s still implemented, it can be used to transfer data between enterprise servers. Data is transferred to a remote client through a VPN using a TCP/IP data network.  

Benefits of Using Tunneling Protocols

These are a few of the key benefits that can come from applying tunneling protocols to enterprise networks:

  • Secure remote access: Companies can allow their remote employees to securely connect to the corporate network.
  • Data repackaging and data security: Tunneling protocols can protect against hackers and other types of malicious actors by repackaging data in such a way that data traffic does not appear to be part of a private or corporate network. 
  • Expanded web access: Blocked websites and other incompatible resources can be accessed through various tunneling protocols. 

VPNs are some of the most popular applications of the tunneling protocol. Learn about the Best Enterprise VPN Solutions here.

Ali Azhar
Ali Azhar
Ali is a professional writer with diverse experience in content writing, technical writing, social media posts, SEO/SEM website optimization, and other types of projects. Ali has a background in engineering, allowing him to use his analytical skills and attention to detail for his writing projects.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...


An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...