A communication protocol which allows for the movement of data from one network to another, by exploiting encapsulation
Involves repackaging the traffic data into a different form, perhaps with encryption
as standard, it can hide the nature of the traffic that is run through a tunnel
allow a foreign protocol to run over a network that does not support that particular protocol