What is tunneling as it applies to a virtual network?
Tunneling into a virtual network or private network refers to the process of using a public network to transmit data for use in the private network. This requires some encapsulation and other methods for protecting data as it moves through the public network space.
Typically, tunneling protocols allow for data to be sent in an IP format through the global internet, and be unpacked or disassembled for private network use at a private destination in the form of a VPN server. Tunneling can facilitate things like remote printing and file sharing inside private networks when the remote user is off-site and has to use the internet for a transport system.
The in-network server is the “unpacking” point for encrypted and encapsulated data. Protocols for tunneling include Microsoft Point-to-Point Tunneling Protocol (PPTP) and Cisco Generic Routing Encapsulation (GRE). Various types of SSH protocols allow for tunneling practices.
It is important to note that security for tunneling practices varies according to the particular setup. Data that is tunneling into a private network, whether it is a virtual network or other network, may not be beginning-to-end encrypted, so that it becomes vulnerable when it enters through the network server. There may be additional items attached to data packets moving through the internet that have to be interpreted and managed by the receiver. However, in general, tunneling provides an excellent way for network administrators to allow virtual and remote access without compromising sensitive data out in the public internet world.
Tags
Written by Justin Stoltzfus | Contributor, Reviewer

Justin Stoltzfus is a freelance writer for various Web and print publications. His work has appeared in online magazines including Preservation Online, a project of the National Historic Trust, and many other venues.
More Q&As from our experts
- What is the difference between little endian and big endian?
- How can unstructured data benefit your business's bottom line?
- What are some of the dangers of using machine learning impulsively without a business plan?
Related Terms
- Distributed Computing System
- Hacking Tool
- Geotagging
- Mosaic
- InfiniBand
- Snooping Protocol
- Botnet
- Net Send
- Presence
- Fat Client
Related Articles

AI in the Army: How Virtual Assistants Will Impact US Military Ranks

Finite State Machine: How It Has Affected Your Gaming For Over 40 Years

How Cloud Computing is Changing Cybersecurity
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- The Business' Guide to Building Responsible AI
- The CIO Guide to Information Security
- Robotic Process Automation: What You Need to Know
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?