What is SSL Tunneling?

SSL Tunneling involves a client that requires an SSL connection to a backend service or secures a server via a proxy server. This proxy server opens the connection between the client and the backend service and copies the data to both sides without any direct interference in the SSL connection.

SSL Tunneling



Tunneling

A technique of inter-networking called Tunneling is used when source and destination networks of the same type are to be connected through a network of different types. Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite. 

So, in other words, when data moves from host A to B it covers all the different levels of the specified protocol (OSI, TCP/IP, etc.) while moving between different levels, data conversion (Encapsulation) to suit different interfaces of the particular layer is called tunneling.

For example, let us consider an Ethernet to be connected to another Ethernet through a WAN as:

Tunneling

The task is sent on an IP packet from host A of Ethernet-1 to host B of Ethernet-2 via a WAN. 

Similar Reads

Steps

Host A constructs a packet that contains the IP address of Host B. It then inserts this IP packet into an Ethernet frame and this frame is addressed to the multiprotocol router M1 Host A then puts this frame on Ethernet. When M1 receives this frame, it removes the IP packet, inserts it in the payload packet of the WAN network layer packet, and addresses the WAN packet to M2. The multiprotocol router M2 removes the IP packet and sends it to host B in an Ethernet frame....

How Does Encapsulation Work?

Data travels from one place to another in the form of packets, and a packet has two parts, the first one is the header which consists of the destination address and the working protocol and the second thing is its contents....

Why is this Technique Called Tunneling?

In this particular example, the IP packet does not have to deal with WAN, and the host’s A and B also do not have to deal with the WAN. The multiprotocol routers M1 and M2 will have to understand IP and WAN packets. Therefore, the WAN can be imagined to be equivalent to a big tunnel extending between multiprotocol routers M1 and M2 and the technique is called Tunneling....

Types of Tunneling Protocols

Generic Routing Encapsulation Internet Protocol Security Ip-in-IP SSH Point-to-Point Tunneling Protocol Secure Socket Tunneling Protocol Layer 2 Tunneling Protocol Virtual Extensible Local Area Network...

What is SSL Tunneling?

SSL Tunneling involves a client that requires an SSL connection to a backend service or secures a server via a proxy server. This proxy server opens the connection between the client and the backend service and copies the data to both sides without any direct interference in the SSL connection....