Software Guide

Advanced Configuration
Tsunami
®
800 & 8000 Series - Software Management Guide 75
The following figure shows an IP tunnel configuration using two end points.
Figure 5-19 An Example: Tunnel Configuration
Lets say that the Computer with an IP address: 10.0.0.1 wants to communicate with the Computer with an IPA address:
192.168.9.101. Since there is no native routing path between these two computers, the communication can happen via the
tunnel. The SU1device with wireless IP address: 20.0.0.132 and SU2 device with wireless IP address: 30.0.0.132 are the end
points of the tunnel, respectively.
With IP tunneling, the tunnel entry point (SU1) encapsulates the tunnel end points IP addresses (20.0.0.132 + 30.0.0.132)
with the sender IP addresses (10.0.0.1 + 192.168.9.101) before sending the data through the tunnel. When the tunnel exit
point (SU2) receives traffic, it removes the outer IP header before forwarding the packet to the recipient.
: IP tunnel establishment does not involve any protocol message exchange. To setup an IP tunnel, the device has to be
configured properly on both the ends.
IP Packet
Sender Source IP (10.0.0.1) Recipient IP (192.168.9.101)
Tunneled IP Packet
(Inner IP Header) (Outer IP Header)
Sender Source IP
(10.0.0.1)
Recipient IP
(192.168.9.101)
Tunnel Entry Point IP
(20.0.0.132)
Tunnel Exit Point IP
(30.0.0.132)