You use a tunneling protocol when you want to preserve confidentiality in information that is being sent across a network. This way listeners cannot understand the information.
L2tp
L2TP over IPSec
Tunneling in Cisco refers to the process of encapsulating one type of network protocol within another protocol to facilitate secure communication over a public or untrusted network. This technique is commonly used in Virtual Private Networks (VPNs) to create a secure "tunnel" for data packets, ensuring confidentiality and integrity. Cisco devices support various tunneling protocols, such as GRE (Generic Routing Encapsulation) and IPsec, which allow for the transport of data between remote sites or users and the corporate network. Tunneling enhances security by encrypting data and masking the original source and destination addresses.
Secure Socket Tunneling Protocol (SSTP) is a new VPN protocol that uses port 443, which is also used by Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS). SSTP is used to transport Point-to-Point Protocol (PPP) traffic through an SSL channel. Currently it is only available on newer operating systems such as Windows Vista and Windows Server 2008.
PPTP is term used in computer security that is a protocol of implementing virtual private networks. The acronym PPTP stands for Point to Point Tunneling Protocol.
Point-to-point tunneling protocol (PPTP) and Layer Two tunneling protocol (l2tp) with internet security protocol (ip/sec)
Layer 2 Tunneling Protocol (L2TP)
ISL IS A CISCO PROPRIETARY TUNNELING PROTOCOL, BUT 802.1 q IS A OPEN STANDARD PROTOCOL
PPTP tunneling was developed by Microsoft.
L2tp
There are actually two different GTP protocols. GTP (Go Text Protocol) is basically an application layer protocol, although the definition is a bit fuzzy. GTP (GPRS Tunneling Protocol) is a transport layer protocol that is used in conjunction with another transport layer protocol (TCP or UDP).
OpenVPN is often considered one of the strongest tunneling protocols due to its robust encryption and secure authentication methods. It is widely used for creating secure point-to-point or site-to-site connections over the internet.