Knowledge

Virtual private network

Source 📝

212:
other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarter or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other on the medium network. if both are known to each other, and the chosen VPN protocol is not bound to client-server design, the communication can be initiated by either of the two as soon as they see the VPN is inactive or some local host is trying to reach another one known to be located on the other side.
870: 884: 169: 161: 3966: 3446: 199:, or to enable people accessing their private home or company resources without exposing them to the public Internet. Remote access tunnels can be either on-demand or always-on. Proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing, because the remote host location is usually unknown to the central network until the former tries to reach it 503: 3976: 3456: 124:, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in 683:) to secure remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication. SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection. 383:
Otherwise, commercial appliances with VPN features based on proprietary hardware/software platforms, usually support a consistent VPN protocol across their products but do not open up for customizations outside the use cases they intended to implement. This is often the case for appliances that rely
356:
Network appliances, such as firewalls, do often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces do often facilitate setting up virtual private networks with a selection of supported protocols which have been integrated for an
108:
The goal of a virtual private network is to allow network hosts (PCs, servers, etc.) to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network completely transparent from
788:
From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain
211:
configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between two devices (like routers, firewalls, VPN gateways, servers, etc.) located at both network locations. These devices then make the tunnel available to
379:
Similarly, it is possible to get additional VPN configurations working, even if the OS does not facilitate the setup of that particular configuration, by manually editing internal configurations of by modifying the open source code of the OS itself. For instance, pfSense does not support remote
151:
features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may partially match same or similar end-user goal of exchanging private contents towards a remote network (like intranet browsing via an authenticated proxy).
144:) on one side of the tunnel and replay them on the other side, as if they virtually substitute the lower network or link layers. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS. 482:
methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.
458:
Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a
438:
VPN are not intended to make connecting users neither anonymous nor unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide the above confidentiality features, their usage can increase user
247:
scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined to enable remote access to resources located at any given site, such as an ordering system that resides in a data center.
305:
vendors and developers do typically offer native support to a selection of VPN protocols which is subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and some others emerged.
116:
Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.
561:), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the 1299: 66:) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable). 380:
access VPN configurations through its user interface where the OS runs on the remote host, while provides comprehensive support for configuring it as the central VPN gateway of such remote-access configuration scenario.
69:
A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet. This is achieved by creating a link between
549:
an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by
510:
A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.
322:
tools. However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no more natively supported by the OS.
1338:
OpenConnect is a client for Cisco's AnyConnect SSL VPN OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
594:
project) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (
3492: 1948: 195:. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for 176:
Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:
1291: 294:
A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.
1500: 392:
Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:
576:
networks. IPsec is also often supported by network hardware accelerators, which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.
553:
protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the
1015: 3485: 1530: 1388: 689:
is a protocol. In 2020, WireGuard support was added to both the Linux and Android kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the
1626: 1215: 290:
the relationship between the actor implementing the VPN and the network infrastructure owner/provider, and whether the former trusts the medium of the former or not.
187:
configuration is analogous to joining one or more computers to a network which cannot be directly connected. This type of extension provides that computer access to
81:
It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements
3478: 565:
and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on
1924: 494:. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator. 1945: 2074: 2544: 1670: 2029: 1103: 329:
lacked native IPsec IKEv2 support until version 11, and people needed to install third-party apps in order to connect that kind of VPNs, while
85:. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for 1418: 776:
L2TP which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's
140:
is used to transfer the network messages from one side to the other. Their goal is to take network messages from applications (operating at
766:
Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.
1492: 982: 903: 701:
for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.
17: 3459: 1380: 1007: 558: 557:. Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g. 100:
which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.
1522: 348:
VPN solutions) which makes the use of third-party applications mandatory for people and companies relying on such VPN protocol.
3268: 3063: 2002: 1972: 1703: 1265: 1325: 2067: 1613: 1594: 384:
on hardware acceleration of VPNs to provide higher throughput or support a larger amount of simultaneously connected users.
239:
Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for
1358: 376:) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps. 314:
Desktop, smartphone and other end-user device operating systems do usually support configuring remote access VPN from their
232:
site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an
3980: 2688: 2537: 1736: 451:
In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable
2819: 1921: 631: 627: 3238: 1467: 562: 4010: 3501: 3293: 2134: 2099: 1798: 1664: 1216:"Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]" 1054: 808:
access points without dropping the secure VPN session or losing application sessions. Mobile VPNs are widely used in
781: 635: 605: 601: 1149: 2139: 2060: 646: 642: 1892: 1861: 1830: 3449: 2530: 1816:
s, because customers trust that the network facilities operated by the service providers will not be compromised.
522: 1763: 1585:
Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol".
1435: 340:
Conversely, Windows does not support plain IPsec IKEv1 remote access native VPN configuration (commonly used by
3770: 797: 4000: 804:, but instead roams across various networks such as data networks from cellular carriers or between multiple 770: 708: 621: 3970: 3841: 3521: 2784: 2759: 1240: 716: 455:
of connecting parties. This secures the joined remote network confidentiality, integrity and availability.
396: 3409: 3365: 2769: 2119: 853: 427: 1650: 828:
A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support
542: 360:
In some cases, like in the open source operating systems devoted to firewalls and network devices (like
2124: 813: 743: 554: 546: 518: 514: 326: 4005: 3645: 3163: 2799: 1647:"Chapter 17: Internet Protocol Security: IPsec, Crypto IP Encapsulation for Virtual Private Networks" 475: 431: 172:
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
2045: 1646: 3399: 3303: 3273: 2968: 2746: 2645: 2295: 2155: 2149: 1410: 928: 923: 817: 668:
Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered
654: 617: 583: 579: 341: 315: 136:
The ways a VPN actually works depends on which technologies and protocols the VPN is built upon. A
121: 773:(MPLS) often overlays VPNs, often with quality-of-service control over a trusted delivery network. 3576: 3470: 3394: 3263: 3133: 2388: 2300: 650: 624:(SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts). 573: 443:
by making the untrusted medium owner unable to access the private data exchanged across the VPN.
1174: 3561: 3421: 3414: 3253: 3180: 3028: 2305: 2091: 938: 739: 728: 537:
made it only a recommendation. This standards-based security protocol is also widely used with
404: 403:, such that even if the network traffic is sniffed at the packet level (see network sniffer or 319: 974: 3665: 3571: 3426: 550: 1070: 1046: 3792: 3566: 2634: 2362: 2269: 1086: 875: 491: 240: 51: 31: 1128: 734:
Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling
8: 3536: 3516: 3218: 2706: 2624: 2614: 2609: 2553: 2315: 2310: 2261: 1656: 801: 658: 3749: 3208: 3013: 3003: 849: 188: 137: 75: 3624: 3526: 2976: 2857: 2604: 2589: 2372: 2320: 2274: 2037: 1794: 1660: 1590: 1573: 1050: 1039: 845: 816:
and criminal databases, and in other organizations with similar requirements such as
698: 330: 1994: 1969: 1695: 883: 2948: 2325: 1900: 1869: 1838: 1565: 1523:"Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google" 1321: 1198: 1076: 913: 829: 720: 530: 302: 251:
Apart from the general topology configuration, a VPN may also be characterized by:
168: 71: 59: 3831: 3660: 3198: 3128: 3057: 3023: 3008: 2920: 2887: 2862: 2279: 2236: 2144: 1976: 1952: 1928: 1896: 1865: 1834: 1788: 1350: 1205:, "IPv6 Node Requirements", E. Jankiewicz, J. Loughney, T. Narten (December 2011) 1072:
RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks
933: 889: 856:(VPLS) and layer 2 tunneling protocols are designed to overcome this limitation. 754: 712: 680: 400: 55: 1904: 1873: 1842: 1202: 1089: 534: 434:
without being rejected due to the MAC not matching with the altered data packet.
164:
VPN classification tree based on the topology first, then on the technology used
3764: 3551: 2958: 2754: 1726: 837: 487: 460: 452: 423: 419: 415: 1553: 3994: 3933: 3905: 3851: 3826: 3728: 3686: 3404: 3203: 2877: 2221: 2052: 2041: 1577: 809: 662: 591: 529:, and was required in all standards-compliant implementations of IPv6 before 479: 334: 244: 148: 3188: 1459: 3949: 3650: 3614: 3604: 3596: 3541: 3143: 2935: 2764: 2698: 2561: 2330: 2109: 2104: 1569: 918: 908: 800:
are used in settings where an endpoint of the VPN is not fixed to a single
751: 694: 418:
to detect and reject any instances of tampering with transmitted messages,
3836: 3709: 3699: 3609: 3233: 3153: 3098: 3018: 2522: 2481: 2340: 2251: 2196: 1812:
VPNs using dedicated circuits, such as Frame Relay are sometimes called
1758: 1731: 1584: 948: 832:; therefore, communication, software, and networking, which are based on 735: 613: 263: 196: 97: 86: 35: 812:
where they give law-enforcement officers access to applications such as
160: 3900: 3870: 3704: 3546: 3339: 3283: 3213: 3088: 3083: 3033: 2998: 2991: 2953: 2943: 2882: 2668: 2579: 2569: 2511: 2496: 2491: 2471: 2445: 2409: 2383: 2226: 2216: 1889: 1858: 1827: 1793:. Networking Technology Series (4 ed.). Cisco Press. p. 233. 898: 690: 609: 471: 408: 82: 1753: 1652:
Red Hat - The Complete Reference Enterprise Linux & Fedora Edition
727:, etc. It is currently being developed and updated by OpenVPN Inc., a 3926: 3921: 3759: 3733: 3722: 3170: 3158: 3148: 3113: 3078: 3073: 2986: 2892: 2794: 2726: 2663: 2574: 2458: 2435: 2430: 2357: 2246: 2186: 2181: 1587:
International Conference on Applied Cryptography and Network Security
1443: 1081: 833: 747: 686: 669: 506:
The life cycle phases of an IPSec tunnel in a virtual private network
467: 345: 273: 256: 110: 757:
implemented by Damion K. Wilson. Development for CIPE ended in 2002.
3754: 3655: 3355: 3329: 3258: 3118: 3108: 3093: 3038: 2915: 2867: 2834: 2809: 2789: 2774: 2619: 2584: 2506: 2453: 2231: 2206: 2201: 2159: 1995:"Virtual Private Network (VPN) : What VPN Is And How It Works" 373: 224: 218: 192: 63: 3500: 236:
site-to-site VPN joins sites belonging to multiple organizations.
3880: 3875: 3860: 3776: 3715: 3694: 3378: 3373: 3324: 3138: 2872: 2839: 2829: 2804: 2736: 2716: 2658: 2599: 2593: 2501: 2486: 2425: 2211: 2176: 1622: 841: 724: 704: 676: 587: 440: 369: 361: 281: 277: 141: 1493:"WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" 466:
Remote-access VPNs, which are typically user-initiated, may use
3798: 3431: 3278: 2824: 2779: 2731: 2683: 2401: 2129: 943: 502: 365: 262:
the tunnel's termination point location, e.g., on the customer
191:
of a remote site, or any wider enterprise networks, such as an
3963:
indicates that maintenance of the tool has been discontinued.
3640: 3334: 3308: 3248: 3223: 2981: 2925: 2910: 2814: 2721: 2678: 2673: 2653: 2349: 2114: 805: 638:
and in several compatible implementations on other platforms.
595: 711:
VPN protocol based on the TLS protocol. It supports perfect
586:) can tunnel an entire network's traffic (as it does in the 309: 3123: 2902: 2476: 2241: 538: 526: 125: 1754:"CIPE-Win32 - Crypto IP Encapsulation for Windows NT/2000" 3865: 3193: 3103: 2711: 2191: 777: 216:
In the context of site-to-site configurations, the terms
430:(MAC), which prevents the message from being altered or 1129:"Connect to a virtual private network (VPN) on Android" 653:(PPP) or Layer 2 Tunneling Protocol traffic through an 570: 566: 1266:"About Always On VPN for Windows Server Remote Access" 1946:"Solving the Computing Challenges of Mobile Officers" 297: 865: 598:) is supported without special extra configurations, 1786: 1038: 27:Extension of a private network across a public one 1104:"Connect to a VPN in Windows - Microsoft Support" 351: 228:are used to describe two different use cases. An 3992: 1036: 399:to prevent disclosure of private information or 276:they present to the connecting network, such as 979:NIST Computer Security Resource Center Glossary 2082: 792: 155: 3486: 2538: 2068: 1615:Red Hat Linux 9: Red Hat Linux Security Guide 715:, and most modern secure cipher suites, like 497: 761: 543:availability, integrity, and confidentiality 147:Applications that do implement tunneling or 74:and computer networks by the use of network 1558:Computing & Control Engineering Journal 1381:"Trademark Status & Document Retrieval" 287:the number of simultaneous allowed tunnels. 3493: 3479: 2552: 2545: 2531: 2075: 2061: 2030:"Necessity is the mother of VPN invention" 1554:"Virtual private networks - how they work" 1241:"VPN overview for Apple device deployment" 1008:"What Is a VPN? - Virtual Private Network" 904:Dynamic Multipoint Virtual Private Network 30:"VPN" redirects here. For other uses, see 1551: 1150:"VPN settings overview for Apple devices" 1080: 823: 337:and others got it supported in the past. 310:VPN support in consumer operating systems 1890:Point-to-Point Tunneling Protocol (PPTP) 1644: 1611: 782:Point-to-Point Tunneling Protocol (PPTP) 563:Extensible Authentication Protocol (EAP) 541:. Its design meets most security goals: 501: 167: 159: 1992: 1292:"1. Ultimate Powerful VPN Connectivity" 750:operating systems by Olaf Titz, with a 486:Site-to-site VPNs often use passwords ( 14: 3993: 1914: 1751: 1727:"CIPE - encrypted IP in UDP tunneling" 1490: 1192: 780:(obsolete as of 2009) and Microsoft's 387: 131: 3533:Censorship and blocking technologies 3474: 2526: 2056: 2027: 1962: 1790:Internetworking Technologies Handbook 1766:from the original on 8 September 2022 1739:from the original on 8 September 2022 1018:from the original on 31 December 2021 848:, may not be fully supported as on a 3975: 3455: 1724: 1693: 1673:from the original on 17 January 2023 1632:from the original on 14 October 2022 1433: 1041:Cisco Secure Virtual Private Network 1002: 1000: 969: 967: 965: 679:offers VPN tunneling (distinct from 1828:Layer Two Tunneling Protocol "L2TP" 1302:from the original on 8 October 2022 985:from the original on 2 January 2023 628:Microsoft Point-to-Point Encryption 24: 2021: 1752:Wilson, Damion (19 October 2002). 1612:Fuller, Johnray; Ha, John (2002). 1503:from the original on 31 March 2020 1391:from the original on 21 March 2012 731:providing secure VPN technologies. 298:VPN native and third-party support 25: 4022: 3502:Internet censorship circumvention 2005:from the original on 17 June 2022 1859:IP Based Virtual Private Networks 1533:from the original on 29 June 2022 1361:from the original on 6 March 2015 1328:from the original on 29 June 2022 997: 962: 636:Point-to-Point Tunneling Protocol 602:Datagram Transport Layer Security 555:Layer 2 Tunneling Protocol (L2TP) 521:) was initially developed by the 446: 3974: 3965: 3964: 3454: 3445: 3444: 1993:Sowells, Julia (7 August 2017). 1706:from the original on 18 May 2022 1696:"CIPE - Crypto IP Encapsulation" 1470:from the original on 2 July 2022 1421:from the original on 5 July 2022 1351:"Why TCP Over TCP Is A Bad Idea" 882: 868: 657:channel (SSTP was introduced in 643:Secure Socket Tunneling Protocol 1986: 1938: 1883: 1852: 1821: 1780: 1718: 1694:Titz, Olaf (20 December 2011). 1687: 1605: 1552:Younglove, R. (December 2000). 1545: 1515: 1484: 1460:"SSH_VPN – Community Help Wiki" 1411:"ssh(1) – OpenBSD manual pages" 1403: 1373: 1343: 1314: 1284: 1258: 1233: 1208: 798:Mobile virtual private networks 523:Internet Engineering Task Force 269:the security features provided. 255:the tunneling protocol used to 34:. For commercial services, see 3894:Physical circumvention methods 1700:CIPE - Crypto IP Encapsulation 1167: 1142: 1121: 1096: 1063: 1030: 407:), an attacker would see only 352:VPN support in network devices 13: 1: 1922:"Mobile VPN: Closing the Gap" 1491:Salter, Jim (30 March 2020). 955: 771:Multiprotocol Label Switching 103: 3558:Blocks on specific websites 3522:Internet censorship in China 1787:Cisco Systems, Inc. (2004). 7: 3410:Cryptographic hash function 2028:Kelly, Sean (August 2001). 1725:Titz, Olaf (2 April 2013). 1179:Android Open Source Project 861: 854:Virtual Private LAN Service 793:VPNs in mobile environments 551:Internet Key Exchange (IKE) 428:message authentication code 156:VPN topology configurations 10: 4027: 2084:Virtual private networking 1645:Petersen, Richard (2004). 852:. Variants on VPN such as 814:computer-assisted dispatch 515:Internet Protocol Security 498:VPN protocols to highlight 54:for virtually extending a 29: 3958: 3942: 3914: 3893: 3850: 3819: 3812: 3785: 3742: 3685: 3678: 3646:IPv6 transition mechanism 3633: 3594: 3587: 3509: 3440: 3387: 3364: 3348: 3317: 3292: 3232: 3179: 3056: 2967: 2934: 2901: 2848: 2745: 2697: 2644: 2633: 2560: 2444: 2418: 2400: 2371: 2348: 2339: 2288: 2260: 2169: 2090: 1933:SearchMobileComputing.com 1298:. SoftEther VPN Project. 1037:Mason, Andrew G. (2002). 975:"virtual private network" 762:Trusted delivery networks 746:. CIPE was developed for 675:Secure Shell (SSH) VPN – 545:. IPsec uses encryption, 476:two-factor authentication 266:or network-provider edge. 96:is also used to refer to 4011:Virtual private networks 3679:Anti-censorship software 3400:Timeline of cryptography 2296:Content-control software 1527:android.googlesource.com 929:Provider-provisioned VPN 924:Opportunistic encryption 818:field service management 778:Layer 2 Forwarding (L2F) 620:has with tunneling over 616:VPN to solve the issues 580:Transport Layer Security 122:Provider-provisioned VPN 109:a certain communication 62:which is not the public 18:Virtual Private Networks 3552:Great Firewall of China 3395:Outline of cryptography 3366:Anti–computer forensics 2389:Private Internet Access 2301:Deep content inspection 2170:Connection applications 2092:Communication protocols 1981:The Wall Street Journal 1045:. Cisco Press. p.  651:Point-to-Point Protocol 357:easy out-of-box setup. 243:, cloud computing, and 44:Virtual private network 3915:Relevant organizations 3634:Without a proxy server 3422:Homomorphic encryption 3415:List of hash functions 2554:Cryptographic software 2306:Deep packet inspection 939:Virtual private server 824:Networking limitations 507: 405:deep packet inspection 173: 165: 3666:Refraction networking 3427:End-to-end encryption 1975:28 March 2018 at the 1951:12 April 2020 at the 1175:"IPsec/IKEv2 Library" 1108:support.microsoft.com 505: 284:network connectivity. 171: 163: 4001:Network architecture 3743:Proprietary software 2270:Avast SecureLine VPN 2048:on 17 December 2001. 1983:, 11 December 2007. 1833:30 June 2022 at the 1570:10.1049/cce:20000602 876:Free Software portal 709:free and open-source 492:digital certificates 241:business-to-business 52:network architecture 32:VPN (disambiguation) 3542:DNS cache poisoning 3537:IP address blocking 3517:Internet censorship 2316:Network enumeration 2311:IP address blocking 2262:Enterprise software 1927:6 July 2020 at the 1895:2 July 2022 at the 1864:9 July 2022 at the 1657:McGraw-Hill/Osborne 1270:learn.microsoft.com 789:access to the VPN. 659:Windows Server 2008 388:Security mechanisms 132:VPN general working 76:tunneling protocols 3820:Anonymous software 3786:Browser extensions 3014:Facebook Messenger 2034:Communication News 1970:"Lost Connections" 850:local area network 846:Windows networking 608:) – used in Cisco 508: 461:web captive portal 411:, not the raw data 189:local area network 174: 166: 138:tunneling protocol 3988: 3987: 3889: 3888: 3808: 3807: 3674: 3673: 3527:National intranet 3468: 3467: 3318:Service providers 3052: 3051: 2858:Check Point VPN-1 2520: 2519: 2467: 2466: 2373:Kape Technologies 2321:Stateful firewall 2275:Check Point VPN-1 1655:. United States: 1621:. United States: 1596:978-3-319-93386-3 1434:Barschel, Colin. 1296:www.softether.org 1075:. sec. 1.1. 830:broadcast domains 699:ChaCha20-Poly1305 634:) works with the 331:Microsoft Windows 303:Operating systems 120:In the case of a 72:computing devices 16:(Redirected from 4018: 4006:Internet privacy 3978: 3977: 3968: 3967: 3817: 3816: 3683: 3682: 3592: 3591: 3495: 3488: 3481: 3472: 3471: 3458: 3457: 3448: 3447: 3296:operating system 3294:Security-focused 3242: 3067: 2642: 2641: 2547: 2540: 2533: 2524: 2523: 2346: 2345: 2326:TCP reset attack 2077: 2070: 2063: 2054: 2053: 2049: 2044:. Archived from 2015: 2014: 2012: 2010: 1990: 1984: 1966: 1960: 1942: 1936: 1935:, 16 July 2006. 1918: 1912: 1887: 1881: 1856: 1850: 1825: 1819: 1818: 1809: 1807: 1784: 1778: 1775: 1773: 1771: 1748: 1746: 1744: 1722: 1716: 1715: 1713: 1711: 1691: 1685: 1682: 1680: 1678: 1641: 1639: 1637: 1631: 1625:pp. 48–53. 1620: 1609: 1603: 1600: 1581: 1549: 1543: 1542: 1540: 1538: 1519: 1513: 1512: 1510: 1508: 1488: 1482: 1479: 1477: 1475: 1455: 1453: 1451: 1442:. Archived from 1430: 1428: 1426: 1407: 1401: 1400: 1398: 1396: 1377: 1371: 1370: 1368: 1366: 1347: 1341: 1340: 1335: 1333: 1318: 1312: 1311: 1309: 1307: 1288: 1282: 1281: 1279: 1277: 1262: 1256: 1255: 1253: 1251: 1237: 1231: 1230: 1228: 1226: 1212: 1206: 1196: 1190: 1189: 1187: 1185: 1171: 1165: 1164: 1162: 1160: 1146: 1140: 1139: 1137: 1135: 1125: 1119: 1118: 1116: 1114: 1100: 1094: 1093: 1084: 1082:10.17487/RFC3809 1067: 1061: 1060: 1044: 1034: 1028: 1027: 1025: 1023: 1004: 995: 994: 992: 990: 971: 914:Internet privacy 892: 887: 886: 878: 873: 872: 871: 820:and healthcare. 665:Service Pack 1). 280:link/circuit or 60:computer network 21: 4026: 4025: 4021: 4020: 4019: 4017: 4016: 4015: 3991: 3990: 3989: 3984: 3954: 3938: 3910: 3885: 3846: 3804: 3781: 3738: 3670: 3661:Domain fronting 3629: 3583: 3505: 3499: 3469: 3464: 3436: 3383: 3360: 3344: 3313: 3295: 3288: 3236: 3228: 3199:Java Anon Proxy 3175: 3061: 3060: 3058:Disk encryption 3048: 3024:Google Messages 3009:Signal Protocol 2963: 2930: 2897: 2844: 2741: 2693: 2636: 2629: 2556: 2551: 2521: 2516: 2463: 2440: 2414: 2396: 2367: 2335: 2284: 2280:LogMeIn Hamachi 2256: 2165: 2145:Split tunneling 2086: 2081: 2024: 2022:Further reading 2019: 2018: 2008: 2006: 1991: 1987: 1977:Wayback Machine 1967: 1963: 1957:www.officer.com 1953:Wayback Machine 1944:Willett, Andy. 1943: 1939: 1929:Wayback Machine 1919: 1915: 1897:Wayback Machine 1888: 1884: 1866:Wayback Machine 1857: 1853: 1835:Wayback Machine 1826: 1822: 1805: 1803: 1801: 1785: 1781: 1769: 1767: 1742: 1740: 1723: 1719: 1709: 1707: 1692: 1688: 1676: 1674: 1667: 1635: 1633: 1629: 1618: 1610: 1606: 1597: 1550: 1546: 1536: 1534: 1521: 1520: 1516: 1506: 1504: 1489: 1485: 1473: 1471: 1464:help.ubuntu.com 1458: 1449: 1447: 1424: 1422: 1415:man.openbsd.org 1409: 1408: 1404: 1394: 1392: 1379: 1378: 1374: 1364: 1362: 1349: 1348: 1344: 1331: 1329: 1320: 1319: 1315: 1305: 1303: 1290: 1289: 1285: 1275: 1273: 1264: 1263: 1259: 1249: 1247: 1239: 1238: 1234: 1224: 1222: 1214: 1213: 1209: 1197: 1193: 1183: 1181: 1173: 1172: 1168: 1158: 1156: 1148: 1147: 1143: 1133: 1131: 1127: 1126: 1122: 1112: 1110: 1102: 1101: 1097: 1069: 1068: 1064: 1057: 1035: 1031: 1021: 1019: 1006: 1005: 998: 988: 986: 973: 972: 963: 958: 953: 934:Split tunneling 890:Internet portal 888: 881: 874: 869: 867: 864: 826: 795: 764: 713:forward-secrecy 681:port forwarding 500: 488:pre-shared keys 449: 424:tamper proofing 422:are secured by 397:confidentiality 390: 354: 312: 300: 185:host-to-network 158: 134: 106: 56:private network 39: 28: 23: 22: 15: 12: 11: 5: 4024: 4014: 4013: 4008: 4003: 3986: 3985: 3959: 3956: 3955: 3953: 3952: 3946: 3944: 3940: 3939: 3937: 3936: 3931: 3930: 3929: 3918: 3916: 3912: 3911: 3909: 3908: 3903: 3897: 3895: 3891: 3890: 3887: 3886: 3884: 3883: 3878: 3873: 3868: 3863: 3857: 3855: 3848: 3847: 3845: 3844: 3839: 3834: 3832:JAP (JonDonym) 3829: 3823: 3821: 3814: 3810: 3809: 3806: 3805: 3803: 3802: 3795: 3789: 3787: 3783: 3782: 3780: 3779: 3774: 3767: 3765:Hotspot Shield 3762: 3757: 3752: 3746: 3744: 3740: 3739: 3737: 3736: 3731: 3726: 3719: 3712: 3707: 3702: 3697: 3691: 3689: 3680: 3676: 3675: 3672: 3671: 3669: 3668: 3663: 3658: 3653: 3648: 3643: 3637: 3635: 3631: 3630: 3628: 3627: 3622: 3617: 3612: 3607: 3601: 3599: 3589: 3585: 3584: 3582: 3581: 3580: 3579: 3574: 3569: 3564: 3556: 3555: 3554: 3549: 3544: 3539: 3531: 3530: 3529: 3524: 3513: 3511: 3507: 3506: 3498: 3497: 3490: 3483: 3475: 3466: 3465: 3463: 3462: 3452: 3441: 3438: 3437: 3435: 3434: 3429: 3424: 3419: 3418: 3417: 3412: 3405:Hash functions 3402: 3397: 3391: 3389: 3388:Related topics 3385: 3384: 3382: 3381: 3376: 3370: 3368: 3362: 3361: 3359: 3358: 3352: 3350: 3346: 3345: 3343: 3342: 3337: 3332: 3327: 3321: 3319: 3315: 3314: 3312: 3311: 3306: 3300: 3298: 3290: 3289: 3287: 3286: 3281: 3276: 3271: 3266: 3261: 3256: 3251: 3245: 3243: 3230: 3229: 3227: 3226: 3221: 3216: 3211: 3206: 3201: 3196: 3191: 3185: 3183: 3177: 3176: 3174: 3173: 3168: 3167: 3166: 3156: 3151: 3146: 3141: 3136: 3131: 3126: 3121: 3116: 3111: 3106: 3101: 3096: 3091: 3086: 3081: 3076: 3070: 3068: 3054: 3053: 3050: 3049: 3047: 3046: 3043: 3042: 3041: 3036: 3031: 3026: 3021: 3016: 3006: 3001: 2996: 2995: 2994: 2989: 2979: 2973: 2971: 2965: 2964: 2962: 2961: 2956: 2951: 2946: 2940: 2938: 2932: 2931: 2929: 2928: 2923: 2918: 2913: 2907: 2905: 2899: 2898: 2896: 2895: 2890: 2885: 2880: 2875: 2870: 2865: 2860: 2854: 2852: 2846: 2845: 2843: 2842: 2837: 2832: 2827: 2822: 2817: 2812: 2807: 2802: 2797: 2792: 2787: 2782: 2777: 2772: 2767: 2762: 2757: 2755:BBM Enterprise 2751: 2749: 2743: 2742: 2740: 2739: 2734: 2729: 2724: 2719: 2714: 2709: 2703: 2701: 2695: 2694: 2692: 2691: 2686: 2681: 2676: 2671: 2666: 2661: 2656: 2650: 2648: 2639: 2631: 2630: 2628: 2627: 2622: 2617: 2612: 2607: 2602: 2597: 2587: 2582: 2577: 2572: 2566: 2564: 2558: 2557: 2550: 2549: 2542: 2535: 2527: 2518: 2517: 2515: 2514: 2509: 2504: 2499: 2494: 2489: 2484: 2479: 2474: 2468: 2465: 2464: 2462: 2461: 2456: 2450: 2448: 2442: 2441: 2439: 2438: 2433: 2428: 2422: 2420: 2416: 2415: 2413: 2412: 2406: 2404: 2398: 2397: 2395: 2394: 2391: 2386: 2381: 2377: 2375: 2369: 2368: 2366: 2365: 2360: 2354: 2352: 2343: 2337: 2336: 2334: 2333: 2328: 2323: 2318: 2313: 2308: 2303: 2298: 2292: 2290: 2286: 2285: 2283: 2282: 2277: 2272: 2266: 2264: 2258: 2257: 2255: 2254: 2249: 2244: 2239: 2234: 2229: 2224: 2219: 2214: 2209: 2204: 2199: 2194: 2189: 2184: 2179: 2173: 2171: 2167: 2166: 2164: 2163: 2152: 2147: 2142: 2137: 2132: 2127: 2122: 2117: 2112: 2107: 2102: 2096: 2094: 2088: 2087: 2080: 2079: 2072: 2065: 2057: 2051: 2050: 2023: 2020: 2017: 2016: 1985: 1968:Cheng, Roger. 1961: 1937: 1920:Phifer, Lisa. 1913: 1882: 1876:, A. Valencia 1851: 1845:, W. Townsley 1820: 1799: 1779: 1777: 1776: 1717: 1686: 1684: 1683: 1665: 1604: 1602: 1601: 1595: 1564:(6): 260–262. 1544: 1514: 1483: 1481: 1480: 1456: 1446:on 28 May 2019 1436:"Unix Toolbox" 1402: 1385:tarr.uspto.gov 1372: 1342: 1313: 1283: 1257: 1232: 1207: 1191: 1166: 1141: 1120: 1095: 1062: 1055: 1029: 996: 960: 959: 957: 954: 952: 951: 946: 941: 936: 931: 926: 921: 916: 911: 906: 901: 895: 894: 893: 879: 863: 860: 836:and broadcast 825: 822: 794: 791: 786: 785: 774: 763: 760: 759: 758: 732: 702: 684: 673: 666: 639: 625: 599: 577: 499: 496: 453:authentication 448: 447:Authentication 445: 436: 435: 412: 409:encrypted data 389: 386: 353: 350: 325:For instance, 311: 308: 299: 296: 292: 291: 288: 285: 270: 267: 260: 214: 213: 205: 201: 200: 197:remote workers 181: 157: 154: 133: 130: 105: 102: 87:remote workers 26: 9: 6: 4: 3: 2: 4023: 4012: 4009: 4007: 4004: 4002: 3999: 3998: 3996: 3983: 3982: 3973: 3972: 3962: 3957: 3951: 3948: 3947: 3945: 3941: 3935: 3934:Turkey Blocks 3932: 3928: 3925: 3924: 3923: 3920: 3919: 3917: 3913: 3907: 3906:USB dead drop 3904: 3902: 3899: 3898: 3896: 3892: 3882: 3879: 3877: 3874: 3872: 3869: 3867: 3864: 3862: 3859: 3858: 3856: 3853: 3852:Anonymous P2P 3849: 3843: 3840: 3838: 3835: 3833: 3830: 3828: 3825: 3824: 3822: 3818: 3815: 3811: 3801: 3800: 3796: 3794: 3791: 3790: 3788: 3784: 3778: 3775: 3773: 3772: 3768: 3766: 3763: 3761: 3758: 3756: 3753: 3751: 3748: 3747: 3745: 3741: 3735: 3732: 3730: 3727: 3725: 3724: 3720: 3718: 3717: 3713: 3711: 3708: 3706: 3703: 3701: 3698: 3696: 3693: 3692: 3690: 3688: 3687:Free software 3684: 3681: 3677: 3667: 3664: 3662: 3659: 3657: 3654: 3652: 3649: 3647: 3644: 3642: 3639: 3638: 3636: 3632: 3626: 3623: 3621: 3618: 3616: 3613: 3611: 3608: 3606: 3603: 3602: 3600: 3598: 3593: 3590: 3586: 3578: 3575: 3573: 3570: 3568: 3565: 3563: 3560: 3559: 3557: 3553: 3550: 3548: 3545: 3543: 3540: 3538: 3535: 3534: 3532: 3528: 3525: 3523: 3520: 3519: 3518: 3515: 3514: 3512: 3508: 3503: 3496: 3491: 3489: 3484: 3482: 3477: 3476: 3473: 3461: 3453: 3451: 3443: 3442: 3439: 3433: 3430: 3428: 3425: 3423: 3420: 3416: 3413: 3411: 3408: 3407: 3406: 3403: 3401: 3398: 3396: 3393: 3392: 3390: 3386: 3380: 3377: 3375: 3372: 3371: 3369: 3367: 3363: 3357: 3354: 3353: 3351: 3347: 3341: 3338: 3336: 3333: 3331: 3328: 3326: 3323: 3322: 3320: 3316: 3310: 3307: 3305: 3302: 3301: 3299: 3297: 3291: 3285: 3282: 3280: 3277: 3275: 3272: 3270: 3267: 3265: 3262: 3260: 3257: 3255: 3252: 3250: 3247: 3246: 3244: 3240: 3235: 3231: 3225: 3222: 3220: 3217: 3215: 3212: 3210: 3207: 3205: 3202: 3200: 3197: 3195: 3192: 3190: 3187: 3186: 3184: 3182: 3178: 3172: 3169: 3165: 3162: 3161: 3160: 3157: 3155: 3152: 3150: 3147: 3145: 3142: 3140: 3137: 3135: 3132: 3130: 3127: 3125: 3122: 3120: 3117: 3115: 3112: 3110: 3107: 3105: 3102: 3100: 3097: 3095: 3092: 3090: 3087: 3085: 3082: 3080: 3077: 3075: 3072: 3071: 3069: 3065: 3059: 3055: 3044: 3040: 3037: 3035: 3032: 3030: 3027: 3025: 3022: 3020: 3017: 3015: 3012: 3011: 3010: 3007: 3005: 3002: 3000: 2997: 2993: 2990: 2988: 2985: 2984: 2983: 2980: 2978: 2975: 2974: 2972: 2970: 2966: 2960: 2957: 2955: 2952: 2950: 2947: 2945: 2942: 2941: 2939: 2937: 2933: 2927: 2924: 2922: 2919: 2917: 2914: 2912: 2909: 2908: 2906: 2904: 2900: 2894: 2891: 2889: 2886: 2884: 2881: 2879: 2878:SoftEther VPN 2876: 2874: 2871: 2869: 2866: 2864: 2861: 2859: 2856: 2855: 2853: 2851: 2847: 2841: 2838: 2836: 2833: 2831: 2828: 2826: 2823: 2821: 2818: 2816: 2813: 2811: 2808: 2806: 2803: 2801: 2798: 2796: 2793: 2791: 2788: 2786: 2783: 2781: 2778: 2776: 2773: 2771: 2768: 2766: 2763: 2761: 2760:Bouncy Castle 2758: 2756: 2753: 2752: 2750: 2748: 2747:TLS & SSL 2744: 2738: 2735: 2733: 2730: 2728: 2725: 2723: 2720: 2718: 2715: 2713: 2710: 2708: 2705: 2704: 2702: 2700: 2696: 2690: 2687: 2685: 2682: 2680: 2677: 2675: 2672: 2670: 2667: 2665: 2662: 2660: 2657: 2655: 2652: 2651: 2649: 2647: 2643: 2640: 2638: 2637:communication 2632: 2626: 2623: 2621: 2618: 2616: 2613: 2611: 2608: 2606: 2603: 2601: 2598: 2595: 2591: 2588: 2586: 2583: 2581: 2578: 2576: 2573: 2571: 2568: 2567: 2565: 2563: 2562:Email clients 2559: 2555: 2548: 2543: 2541: 2536: 2534: 2529: 2528: 2525: 2513: 2510: 2508: 2505: 2503: 2500: 2498: 2495: 2493: 2490: 2488: 2485: 2483: 2480: 2478: 2475: 2473: 2470: 2469: 2460: 2457: 2455: 2452: 2451: 2449: 2447: 2443: 2437: 2434: 2432: 2429: 2427: 2424: 2423: 2421: 2417: 2411: 2408: 2407: 2405: 2403: 2399: 2392: 2390: 2387: 2385: 2382: 2379: 2378: 2376: 2374: 2370: 2364: 2361: 2359: 2356: 2355: 2353: 2351: 2347: 2344: 2342: 2338: 2332: 2329: 2327: 2324: 2322: 2319: 2317: 2314: 2312: 2309: 2307: 2304: 2302: 2299: 2297: 2294: 2293: 2291: 2287: 2281: 2278: 2276: 2273: 2271: 2268: 2267: 2265: 2263: 2259: 2253: 2250: 2248: 2245: 2243: 2240: 2238: 2235: 2233: 2230: 2228: 2225: 2223: 2222:SoftEther VPN 2220: 2218: 2215: 2213: 2210: 2208: 2205: 2203: 2200: 2198: 2195: 2193: 2190: 2188: 2185: 2183: 2180: 2178: 2175: 2174: 2172: 2168: 2161: 2157: 2156:Opportunistic 2153: 2151: 2148: 2146: 2143: 2141: 2138: 2136: 2133: 2131: 2128: 2126: 2123: 2121: 2118: 2116: 2113: 2111: 2108: 2106: 2103: 2101: 2098: 2097: 2095: 2093: 2089: 2085: 2078: 2073: 2071: 2066: 2064: 2059: 2058: 2055: 2047: 2043: 2039: 2035: 2031: 2026: 2025: 2004: 2000: 1996: 1989: 1982: 1978: 1974: 1971: 1965: 1959:, May, 2006. 1958: 1954: 1950: 1947: 1941: 1934: 1930: 1926: 1923: 1917: 1910: 1906: 1902: 1898: 1894: 1891: 1886: 1879: 1875: 1871: 1867: 1863: 1860: 1855: 1849:, August 1999 1848: 1844: 1840: 1836: 1832: 1829: 1824: 1817: 1815: 1802: 1800:9781587051197 1796: 1792: 1791: 1783: 1765: 1761: 1760: 1755: 1750: 1749: 1738: 1734: 1733: 1728: 1721: 1705: 1701: 1697: 1690: 1672: 1668: 1666:0-07-223075-4 1662: 1658: 1654: 1653: 1648: 1643: 1642: 1628: 1624: 1623:Red Hat, Inc. 1617: 1616: 1608: 1598: 1592: 1588: 1583: 1582: 1579: 1575: 1571: 1567: 1563: 1559: 1555: 1548: 1532: 1528: 1524: 1518: 1502: 1498: 1494: 1487: 1469: 1465: 1461: 1457: 1445: 1441: 1437: 1432: 1431: 1420: 1416: 1412: 1406: 1390: 1386: 1382: 1376: 1360: 1356: 1355:sites.inka.de 1352: 1346: 1339: 1327: 1323: 1322:"OpenConnect" 1317: 1301: 1297: 1293: 1287: 1272:. 22 May 2023 1271: 1267: 1261: 1246: 1245:Apple Support 1242: 1236: 1221: 1217: 1211: 1204: 1200: 1195: 1180: 1176: 1170: 1155: 1154:Apple Support 1151: 1145: 1130: 1124: 1109: 1105: 1099: 1091: 1088: 1083: 1078: 1074: 1073: 1066: 1058: 1056:9781587050336 1052: 1048: 1043: 1042: 1033: 1017: 1013: 1009: 1003: 1001: 984: 980: 976: 970: 968: 966: 961: 950: 947: 945: 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 896: 891: 885: 880: 877: 866: 859: 857: 855: 851: 847: 843: 839: 835: 831: 821: 819: 815: 811: 810:public safety 807: 803: 799: 790: 783: 779: 775: 772: 769: 768: 767: 756: 753: 749: 745: 744:encapsulation 741: 737: 733: 730: 726: 722: 718: 714: 710: 706: 703: 700: 696: 693:protocol for 692: 688: 685: 682: 678: 674: 671: 667: 664: 663:Windows Vista 660: 656: 652: 648: 644: 640: 637: 633: 629: 626: 623: 619: 615: 611: 607: 603: 600: 597: 593: 592:SoftEther VPN 589: 585: 581: 578: 575: 572: 568: 564: 560: 556: 552: 548: 547:encapsulating 544: 540: 536: 532: 528: 524: 520: 516: 513: 512: 511: 504: 495: 493: 489: 484: 481: 480:cryptographic 477: 473: 469: 464: 462: 456: 454: 444: 442: 433: 429: 425: 421: 417: 413: 410: 406: 402: 401:data sniffing 398: 395: 394: 393: 385: 381: 377: 375: 371: 367: 363: 358: 349: 347: 343: 338: 336: 335:BlackBerry OS 332: 328: 323: 321: 317: 307: 304: 295: 289: 286: 283: 279: 275: 271: 268: 265: 261: 258: 254: 253: 252: 249: 246: 245:branch office 242: 237: 235: 231: 227: 226: 221: 220: 210: 206: 203: 202: 198: 194: 190: 186: 182: 180:Remote access 179: 178: 177: 170: 162: 153: 150: 145: 143: 139: 129: 127: 123: 118: 114: 112: 101: 99: 95: 90: 88: 84: 79: 77: 73: 67: 65: 61: 57: 53: 49: 45: 41: 37: 33: 19: 3979: 3969: 3960: 3950:Great Cannon 3797: 3769: 3721: 3714: 3619: 3597:proxy server 3504:technologies 3234:File systems 3144:Private Disk 2849: 2341:VPN Services 2331:VPN blocking 2289:Risk vectors 2105:DirectAccess 2083: 2046:the original 2033: 2007:. Retrieved 1999:Hackercombat 1998: 1988: 1980: 1964: 1956: 1940: 1932: 1916: 1908: 1907:, K. Hamzeh 1885: 1877: 1854: 1846: 1823: 1813: 1811: 1804:. Retrieved 1789: 1782: 1768:. Retrieved 1757: 1741:. Retrieved 1730: 1720: 1708:. Retrieved 1699: 1689: 1675:. Retrieved 1651: 1634:. Retrieved 1614: 1607: 1586: 1561: 1557: 1547: 1535:. Retrieved 1526: 1517: 1505:. Retrieved 1497:Ars Technica 1496: 1486: 1472:. Retrieved 1463: 1448:. Retrieved 1444:the original 1439: 1423:. Retrieved 1414: 1405: 1393:. Retrieved 1384: 1375: 1363:. Retrieved 1354: 1345: 1337: 1330:. Retrieved 1316: 1304:. Retrieved 1295: 1286: 1274:. Retrieved 1269: 1260: 1248:. Retrieved 1244: 1235: 1223:. Retrieved 1219: 1210: 1194: 1182:. Retrieved 1178: 1169: 1157:. Retrieved 1153: 1144: 1132:. Retrieved 1123: 1111:. Retrieved 1107: 1098: 1071: 1065: 1040: 1032: 1020:. Retrieved 1011: 987:. Retrieved 978: 919:Mediated VPN 909:Ethernet VPN 858: 827: 796: 787: 765: 736:IPv4 packets 695:key exchange 590:project and 509: 485: 465: 457: 450: 437: 420:data packets 391: 382: 378: 359: 355: 339: 324: 320:command-line 313: 301: 293: 259:the traffic. 250: 238: 233: 229: 223: 217: 215: 209:site-to-site 208: 204:Site-to-site 184: 175: 146: 135: 119: 115: 107: 98:VPN services 93: 91: 80: 68: 47: 43: 42: 40: 3837:Flash proxy 3710:Outline VPN 3700:Shadowsocks 3610:Web proxies 3349:Educational 3154:Sentry 2020 3099:DriveSentry 3019:Google Allo 2625:Thunderbird 2482:Mozilla VPN 2252:Shadowsocks 2197:OpenConnect 1911:, July 1999 1814:trusted VPN 1806:15 February 1770:8 September 1759:SourceForge 1743:8 September 1732:SourceForge 1710:8 September 1636:8 September 1022:5 September 949:VPN service 614:OpenConnect 612:VPN and in 525:(IETF) for 478:, or other 142:OSI layer 7 36:VPN service 3995:Categories 3901:Sneakernet 3871:StealthNet 3705:OnionShare 3588:Principles 3547:Wordfilter 3510:Background 3340:NordLocker 3284:Tahoe-LAFS 3274:Rubberhose 3214:RetroShare 3089:Cryptoloop 3084:CrossCrypt 3064:Comparison 3034:TextSecure 2992:ChatSecure 2954:RetroShare 2944:Bitmessage 2883:strongSwan 2669:ChatSecure 2580:Claws Mail 2570:Apple Mail 2512:Windscribe 2497:Proton VPN 2492:PrivadoVPN 2446:Ziff Davis 2410:TunnelBear 2384:ExpressVPN 2380:CyberGhost 2363:SecureLine 2227:strongSwan 2217:Social VPN 2009:7 November 1880:, May 1998 1677:17 January 1425:4 February 1365:24 October 956:References 899:Anonymizer 840:, such as 802:IP address 729:non-profit 691:Curve25519 649:) tunnels 641:Microsoft 610:AnyConnect 472:biometrics 104:Motivation 83:encryption 58:(i.e. any 3943:Reference 3927:FreeWeibo 3922:GreatFire 3842:Mixmaster 3813:Anonymity 3793:Snowflake 3760:Ultrasurf 3734:WireGuard 3723:PirateBox 3577:Knowledge 3181:Anonymity 3171:VeraCrypt 3159:TrueCrypt 3149:Scramdisk 3114:FileVault 3079:BitLocker 3074:BestCrypt 2987:Cryptocat 2893:WireGuard 2795:MatrixSSL 2765:BoringSSL 2727:SecureCRT 2689:Profanity 2664:Centericq 2575:Autocrypt 2459:StrongVPN 2436:Surfshark 2431:NordLayer 2247:WireGuard 2187:Libreswan 2182:FreeS/WAN 2042:0010-3632 2036:: 26–28. 1578:0956-3385 1395:8 October 1306:8 October 989:2 January 687:WireGuard 670:trademark 468:passwords 416:integrity 346:Fritz!Box 316:graphical 274:OSI layer 113:upwards. 92:The term 3971:Category 3755:Freegate 3729:VPN Gate 3656:DNSCrypt 3562:Facebook 3450:Category 3356:CrypTool 3330:Tresorit 3259:eCryptfs 3219:Ricochet 3119:FreeOTFE 3109:eCryptfs 3094:dm-crypt 3039:WhatsApp 2916:Linphone 2868:Openswan 2835:TeamNote 2820:SChannel 2810:mbed TLS 2790:LibreSSL 2775:cryptlib 2707:Dropbear 2620:Sylpheed 2585:Enigmail 2507:SaferVPN 2454:IPVanish 2232:tcpcrypt 2207:Openswan 2202:OpenIKED 2160:tcpcrypt 2003:Archived 1973:Archived 1949:Archived 1925:Archived 1893:Archived 1862:Archived 1831:Archived 1764:Archived 1737:Archived 1704:Archived 1671:Archived 1627:Archived 1531:Archived 1501:Archived 1468:Archived 1450:2 August 1419:Archived 1389:Archived 1359:Archived 1326:Archived 1300:Archived 1016:Archived 983:Archived 862:See also 844:used in 672:"MPVPN". 432:tampered 414:message 374:OPNsense 234:extranet 230:intranet 225:extranet 219:intranet 193:intranet 149:proxying 64:Internet 3981:Commons 3961:Italics 3881:ZeroNet 3876:Tribler 3861:Freenet 3854:network 3777:Proxify 3750:Lantern 3716:GoAgent 3695:Psiphon 3595:With a 3572:Twitter 3460:Commons 3379:BusKill 3374:USBKill 3325:Freenet 3209:Vidalia 3164:History 3139:PGPDisk 3045:SimpleX 3004:Session 2999:Proteus 2873:OpenVPN 2863:Hamachi 2840:wolfSSL 2830:stunnel 2805:OpenSSL 2737:wolfSSH 2717:OpenSSH 2659:BitlBee 2605:Outlook 2600:Kontact 2594:Gpg4win 2502:PureVPN 2487:Mullvad 2426:NordVPN 2419:Tesonet 2393:Zenmate 2212:OpenVPN 2177:FreeLAN 2150:SSL/TLS 1537:30 June 1507:30 June 1474:28 July 1332:8 April 1184:11 July 1159:11 July 1134:11 July 1113:11 July 842:NetBIOS 838:packets 834:layer 2 752:Windows 725:TwoFish 721:Serpent 705:OpenVPN 677:OpenSSH 661:and in 655:SSL/TLS 588:OpenVPN 584:SSL/TLS 441:privacy 370:PfSense 362:OpenWrt 327:Android 282:Layer 3 278:Layer 2 50:) is a 3799:uProxy 3567:GitHub 3432:S/MIME 3279:StegFS 3189:GNUnet 3029:Signal 2977:Matrix 2825:SSLeay 2780:GnuTLS 2732:WinSCP 2684:Kopete 2635:Secure 2402:McAfee 2130:L2TPv3 2040:  1909:et al. 1903:  1878:et al. 1872:  1847:et al. 1841:  1797:  1663:  1593:  1576:  1276:9 July 1250:9 July 1225:9 July 1201:  1053:  944:VPNLab 533:  426:via a 366:IPFire 257:tunnel 3771:Telex 3651:hosts 3641:HTTPS 3335:Wuala 3309:Qubes 3304:Tails 3249:EncFS 3224:Wickr 2982:OMEMO 2949:Briar 2926:Zfone 2911:Jitsi 2815:BSAFE 2770:Botan 2722:PuTTY 2679:Jitsi 2674:climm 2654:Adium 2350:Avast 2115:IPsec 1630:(PDF) 1619:(PDF) 1440:cb.vu 1220:Cisco 1012:Cisco 806:Wi-Fi 748:Linux 738:over 707:is a 596:HTTPS 559:Xauth 519:IPsec 490:) or 342:Cisco 111:layer 3269:PEFS 3264:LUKS 3239:List 3134:LUKS 3129:geli 3124:GBDE 2921:Jami 2903:ZRTP 2888:Tinc 2785:JSSE 2477:IVPN 2472:Hola 2242:VTun 2237:tinc 2140:SSTP 2135:PPTP 2125:L2TP 2110:EVPN 2100:DTLS 2038:ISSN 2011:2021 1905:2637 1874:2341 1843:2661 1808:2013 1795:ISBN 1772:2022 1745:2022 1712:2022 1679:2023 1661:ISBN 1638:2022 1591:ISBN 1574:ISSN 1539:2020 1509:2020 1476:2009 1452:2009 1427:2018 1397:2022 1367:2018 1334:2013 1308:2022 1278:2024 1252:2024 1227:2024 1203:6434 1186:2024 1161:2024 1136:2024 1115:2024 1090:3809 1051:ISBN 1024:2021 991:2023 755:port 742:via 697:and 647:SSTP 632:MPPE 606:DTLS 539:IPv4 535:6434 527:IPv6 344:and 272:the 264:edge 222:and 126:VLAN 3866:I2P 3827:Tor 3625:PAC 3620:VPN 3615:SSH 3605:P2P 3254:EFS 3204:Tor 3194:I2P 3104:E4M 2969:DRA 2959:Tox 2936:P2P 2850:VPN 2800:NSS 2712:lsh 2699:SSH 2646:OTR 2615:PGP 2610:p≡p 2590:GPG 2358:HMA 2192:n2n 2120:L2F 1901:RFC 1870:RFC 1839:RFC 1566:doi 1199:RFC 1087:RFC 1077:doi 740:UDP 717:AES 622:TCP 618:TLS 574:LTE 569:or 531:RFC 463:). 372:or 318:or 128:). 94:VPN 48:VPN 3997:: 2158:: 2032:. 2001:. 1997:. 1979:, 1955:, 1931:, 1899:, 1868:, 1837:, 1810:. 1762:. 1756:. 1735:. 1729:. 1702:. 1698:. 1669:. 1659:. 1649:. 1589:. 1572:. 1562:11 1560:. 1556:. 1529:. 1525:. 1499:. 1495:. 1466:. 1462:. 1438:. 1417:. 1413:. 1387:. 1383:. 1357:. 1353:. 1336:. 1324:. 1294:. 1268:. 1243:. 1218:. 1177:. 1152:. 1106:. 1085:. 1049:. 1014:. 1010:. 999:^ 981:. 977:. 964:^ 723:, 719:, 571:4G 567:3G 474:, 470:, 368:, 364:, 333:, 207:A 183:A 89:. 78:. 3494:e 3487:t 3480:v 3241:) 3237:( 3066:) 3062:( 2596:) 2592:( 2546:e 2539:t 2532:v 2162:) 2154:( 2076:e 2069:t 2062:v 2013:. 1774:. 1747:. 1714:. 1681:. 1640:. 1599:. 1580:. 1568:: 1541:. 1511:. 1478:. 1454:. 1429:. 1399:. 1369:. 1310:. 1280:. 1254:. 1229:. 1188:. 1163:. 1138:. 1117:. 1092:. 1079:: 1059:. 1047:7 1026:. 993:. 784:. 645:( 630:( 604:( 582:( 517:( 46:( 38:. 20:)

Index

Virtual Private Networks
VPN (disambiguation)
VPN service
network architecture
private network
computer network
Internet
computing devices
tunneling protocols
encryption
remote workers
VPN services
layer
Provider-provisioned VPN
VLAN
tunneling protocol
OSI layer 7
proxying


local area network
intranet
remote workers
intranet
extranet
business-to-business
branch office
tunnel
edge
OSI layer

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.