VPNs

A VPN (Virtual Private Network) is a technology that creates a secure, encrypted connection over a less secure network, such as the internet. It enables users to send and receive data across shared or public networks as if their devices were directly connected to a private network. The VPN ensures confidentiality, integrity, and security of the data transmitted, which is especially useful when accessing sensitive information or connecting remote users to a company's internal network.

Types of VPN

  1. Remote Access VPN:

    • Allows users to securely connect to a private network remotely through the Internet.

    • Useful for both home and business users for accessing files and resources.

    • Home users may use it to bypass regional restrictions and enhance internet security.

  2. Site-to-Site VPN:

    • Used by large companies to connect networks across different locations.

    • Intranet-based VPN connects offices of the same company, while Extranet-based VPN connects offices of different companies.

      • Intranet : Company to Company

      • Extranet : Company to another company

  3. Cloud VPN:

    • A virtual private network connecting users securely to cloud-based resources.

    • Utilizes the internet for transport and employs encryption protocols like IPsec or SSL.

    • Offered as a service by cloud providers like AWS and Microsoft Azure.

  4. Mobile VPN:

    • Enables mobile users to securely connect to a private network via cellular networks.

    • Ensures encrypted connections, protecting data transmitted over mobile devices.

    • Used for accessing corporate resources and securing mobile workforce connections.

  5. SSL VPN:

    • Uses the SSL protocol to secure connections between users and VPN servers.

    • Accessible through a web browser, eliminating the need for additional client software.

    • Considered more secure than traditional IPsec VPNs, as it uses HTTPS encryption protocols.

  6. PPTP VPN (Point-to-Point Tunneling Protocol):

    • Simple and fast VPN implementation.

    • Creates a secure connection by encapsulating data packets.

    • Considered less secure due to weaker encryption compared to other protocols.

  7. L2TP VPN (Layer 2 Tunneling Protocol):

    • Builds on PPTP, adding more security with a stronger encryption algorithm.

    • Easy to set up and supported on various operating systems.

    • Less secure than protocols like OpenVPN, with some exploitable vulnerabilities.

  8. OpenVPN:

    • Open-source software using SSL/TLS encryption protocols.

    • Highly configurable and secure, offering features like two-factor authentication.

    • Creates a secure, encrypted connection between computers, compatible with various operating systems and devices.


Protocols of VPN

	 Website for Reference :  https://nordvpn.com/blog/protocols/
  1. OpenVPN:

    • Description: OpenVPN is an open-source and widely used VPN protocol.

    • Features: It's known for its security and flexibility. It supports both TCP and UDP, and it can use various encryption algorithms.

  2. IPsec (Internet Protocol Security):

    • Description: IPsec is a suite of protocols used for secure communication over IP networks.

    • Features: It can operate in two modes - Transport mode and Tunnel mode. IPsec is commonly used in combination with other protocols like L2TP (Layer 2 Tunneling Protocol).

  3. L2TP (Layer 2 Tunneling Protocol):

    • Description: L2TP is often used in combination with IPsec for secure VPN connections.

    • Features: While it doesn't provide encryption on its own, L2TP is commonly used with IPsec to enhance security.

  4. PPTP (Point-to-Point Tunneling Protocol):

    • Description: PPTP is one of the oldest VPN protocols and is less secure compared to others.

    • Features: It's simple to set up and widely supported, but due to security vulnerabilities, it's not recommended for secure communications.

  5. SSTP (Secure Socket Tunneling Protocol):

    • Description: SSTP is a proprietary VPN protocol developed by Microsoft.

    • Features: It uses SSL/TLS for encryption and is often considered more secure than PPTP. It is commonly used in Windows environments.

  6. IKEv2 (Internet Key Exchange version 2):

    • Description: IKEv2 is used for IPsec key exchange and is often used in combination with IPsec.

    • Features: It is known for its ability to quickly re-establish a VPN connection if the connection is temporarily lost, making it suitable for mobile devices.

Last updated