Tunneling Protocol - Tunneling To Circumvent Firewall Policy

Tunneling To Circumvent Firewall Policy

Users can also use tunneling to "sneak through" a firewall, using a protocol that the firewall would normally block, but "wrapped" inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of "wrapping", this trick can function to get around the intended firewall policy.

Another HTTP-based tunneling method uses the HTTP CONNECT method/command. A client issues the HTTP CONNECT command to a HTTP proxy. The proxy then makes a TCP connection to a particular server:port, and relays data between that server:port and the client connection. Because this creates a security hole, CONNECT-capable HTTP proxies commonly restrict access to the CONNECT method. The proxy allows access only to a whitelist of specific authorized servers.

Read more about this topic:  Tunneling Protocol

Famous quotes containing the words tunneling to, tunneling, circumvent and/or policy:

    Our major universities are now stuck with an army of pedestrian, toadying careerists, Fifties types who wave around Sixties banners to conceal their record of ruthless, beaverlike tunneling to the top.
    Camille Paglia (b. 1947)

    Our major universities are now stuck with an army of pedestrian, toadying careerists, Fifties types who wave around Sixties banners to conceal their record of ruthless, beaverlike tunneling to the top.
    Camille Paglia (b. 1947)

    If tragedy elicits our compassion, comedy appeals to our self-interest. The former confronts life’s failures with noble fortitude, the latter seeks to circumvent them with shrewd nonchalance. The one leaves us momentarily in a mood of resignation, the other in a condition of euphoria.
    Harry Levin (b. 1912)

    Letting a hundred flowers blossom and a hundred schools of thought contend is the policy for promoting the progress of the arts and the sciences and a flourishing culture in our land.
    Mao Zedong (1893–1976)