Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 4 Protocol Tunneling

CHAPTER

Protocol Tunneling

4

INFORMATION IN THIS CHAPTER

How Protocol Tunneling Works

Dangers of Protocol Tunneling

Defending against Protocol Tunneling

The Future of Protocol Tunneling

You’re at work and bored as usual. You decide to take some time off from monitoring network security alerts to download some music. You hop on the Internet, download a peer-to-peer (P2P) file-sharing program, and install it on your company laptop. Nice. Now you’re ready to download.

Your first few searches don’t seem to work, and soon you’ve figured out why. At the bottom of the window is a little icon that indicates that the file-sharing program has detected a firewall. You are being blocked by your company’s Internet policies. The software needs port 45114 open, but it is closed. A little experimentation reveals that the company is blocking traffic on most ports. It’s frustrating; it is like they don’t want you downloading. Worse, the thought occurs to you that they might even monitor your Internet use.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint