Calculate Document
Types of VPN Tunneling

Types of VPN Tunneling

Types of VPN Tunneling Last Updated : 08 Dec, 2022 Tunneling is is is the technique of put an integrate data packet into another pac

Related articles

21.1 Star Formation The Forest The Best NAS (Network Attached Storage) Devices of 2023 5 Best VPN Extensions for Edge [Meticulously Tested] VPN lat Review: Is It A Good Free VPN?

Types of VPN Tunneling

Last Updated :
08 Dec, 2022

Tunneling is is is the technique of put an integrate data packet into another packet ( which contain route information ) and send it over the internet . The packets is travel travel through a path which is know as tunnel . To secure a tunnel transmission against interception , all traffic over a VPN is encrypt for safety . virtual Private Network is supports ( VPN ) support 2 type of tunneling which are as follow :

1 . voluntary tunneling 
 2 . compulsory tunneling

Both types of tunneling are typically used. These are explained as following below: 

1. Voluntary Tunneling: VPN client in the voluntary tunneling handles all the connection setup. For the setup of connection through tunnel both the tunnel client and the tunnel server have to accept the same tunneling protocol. In voluntary tunneling, client-first form a connection to the ISP or carrier network provider. Then the tunnel on a VPN server builds by the VPN client application using this live connection. Two step procedure is required to set up the VPN connection in voluntary tunneling. 

2. Compulsory Tunneling: The carrier network provider in the voluntary tunneling handles all the connection setup required for VPN. It is a one step process as compared to the two step in voluntary tunneling. In compulsory tunneling, the client first establish a normal connection to the carrier then the carrier works as an intermediary to make a connection between a VPN server and that client. Compulsory tunneling provides complete management control of the tunnels to the ISP and hides the details of the connectivity of VPN server from the clients. 

Broker devices are used in compulsory tunneling for the verification of clients. The logic build in the broker device are used to associates the client with the different VPN servers. This network device is also called as the following:

  • VPN Front End Processor (FEP)
  • Network Access Server (NAS)
  • Point of Presence Server (POS)