beautypg.com

Configuring tunneling, Overview, Ipv6 over ipv4 tunneling – H3C Technologies H3C SecPath F1000-E User Manual

Page 90: Implementation

background image

78

Configuring tunneling

Overview

Tunneling is an encapsulation technology. It uses one network protocol to encapsulate packets of another

network protocol and transfer them over a virtual point-to-point connection. The virtual connection is
called a tunnel. Packets are encapsulated and de-encapsulated at both ends of a tunnel. Tunneling refers

to the whole process from data encapsulation to data transfer to data de-encapsulation.
Tunneling provides the following features:

Transition techniques, such as IPv6 over IPv4 tunneling, to interconnect IPv4 and IPv6 networks.

Virtual private networks (VPNs) for guaranteeing communication security, such as IPv4 over IPv4
tunneling, IPv4/IPv6 over IPv6 tunneling, Generic Routing Encapsulation (GRE), and IPsec

tunneling.

Unless otherwise specified, the term "tunnel" used throughout this chapter refers to an IPv6 over IPv4,

IPv4 over IPv4, IPv4 over IPv6, or IPv6 over IPv6 tunnel.

NOTE:

For more information about GRE, see "Configuring GRE."

For more information about IPsec, see "Configuring IPsec."

IPv6 over IPv4 tunneling

Implementation

IPv6 over IPv4 tunneling adds an IPv4 header to IPv6 data packets so that IPv6 packets can pass an IPv4
network through a tunnel to realize internetworking between isolated IPv6 networks, as shown in

Figure

64

. The IPv6 over IPv4 tunnel can be established between two hosts, a host and a device, or two devices.

The tunnel destination node can forward IPv6 packets if it is not the destination of the IPv6 packets.

NOTE:

The devices at both ends of an IPv6 over IPv4 tunnel must support the IPv4/IPv6 dual stack.