212:
other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarter or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other on the medium network. if both are known to each other, and the chosen VPN protocol is not bound to client-server design, the communication can be initiated by either of the two as soon as they see the VPN is inactive or some local host is trying to reach another one known to be located on the other side.
870:
884:
169:
161:
3966:
3446:
199:, or to enable people accessing their private home or company resources without exposing them to the public Internet. Remote access tunnels can be either on-demand or always-on. Proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing, because the remote host location is usually unknown to the central network until the former tries to reach it
503:
3976:
3456:
124:, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in
683:) to secure remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication. SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.
383:
Otherwise, commercial appliances with VPN features based on proprietary hardware/software platforms, usually support a consistent VPN protocol across their products but do not open up for customizations outside the use cases they intended to implement. This is often the case for appliances that rely
356:
Network appliances, such as firewalls, do often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces do often facilitate setting up virtual private networks with a selection of supported protocols which have been integrated for an
108:
The goal of a virtual private network is to allow network hosts (PCs, servers, etc.) to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network completely transparent from
788:
From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain
211:
configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between two devices (like routers, firewalls, VPN gateways, servers, etc.) located at both network locations. These devices then make the tunnel available to
379:
Similarly, it is possible to get additional VPN configurations working, even if the OS does not facilitate the setup of that particular configuration, by manually editing internal configurations of by modifying the open source code of the OS itself. For instance, pfSense does not support remote
151:
features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may partially match same or similar end-user goal of exchanging private contents towards a remote network (like intranet browsing via an authenticated proxy).
144:) on one side of the tunnel and replay them on the other side, as if they virtually substitute the lower network or link layers. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS.
482:
methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.
458:
Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a
438:
VPN are not intended to make connecting users neither anonymous nor unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide the above confidentiality features, their usage can increase user
247:
scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined to enable remote access to resources located at any given site, such as an ordering system that resides in a data center.
305:
vendors and developers do typically offer native support to a selection of VPN protocols which is subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and some others emerged.
116:
Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.
561:), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the
1299:
66:) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).
380:
access VPN configurations through its user interface where the OS runs on the remote host, while provides comprehensive support for configuring it as the central VPN gateway of such remote-access configuration scenario.
69:
A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the
Internet. This is achieved by creating a link between
549:
an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by
510:
A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.
322:
tools. However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no more natively supported by the OS.
1338:
OpenConnect is a client for Cisco's AnyConnect SSL VPN OpenConnect is not officially supported by, or associated in any way with, Cisco
Systems. It just happens to interoperate with their equipment.
594:
project) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (
3492:
1948:
195:. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for
176:
Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:
1291:
294:
A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.
1500:
392:
Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:
576:
networks. IPsec is also often supported by network hardware accelerators, which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.
553:
protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the
1015:
3485:
1530:
1388:
689:
is a protocol. In 2020, WireGuard support was added to both the Linux and
Android kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the
1626:
1215:
290:
the relationship between the actor implementing the VPN and the network infrastructure owner/provider, and whether the former trusts the medium of the former or not.
187:
configuration is analogous to joining one or more computers to a network which cannot be directly connected. This type of extension provides that computer access to
81:
It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements
3478:
565:
and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on
1924:
494:. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator.
1945:
2074:
2544:
1670:
2029:
1103:
329:
lacked native IPsec IKEv2 support until version 11, and people needed to install third-party apps in order to connect that kind of VPNs, while
85:. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for
1418:
776:
L2TP which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's
140:
is used to transfer the network messages from one side to the other. Their goal is to take network messages from applications (operating at
766:
Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.
1492:
982:
903:
701:
for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.
17:
3459:
1380:
1007:
558:
557:. Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g.
100:
which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.
1522:
348:
VPN solutions) which makes the use of third-party applications mandatory for people and companies relying on such VPN protocol.
3268:
3063:
2002:
1972:
1703:
1265:
1325:
2067:
1613:
1594:
384:
on hardware acceleration of VPNs to provide higher throughput or support a larger amount of simultaneously connected users.
239:
Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for
1358:
376:) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.
314:
Desktop, smartphone and other end-user device operating systems do usually support configuring remote access VPN from their
232:
site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an
3980:
2688:
2537:
1736:
451:
In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable
2819:
1921:
631:
627:
3238:
1467:
562:
4010:
3501:
3293:
2134:
2099:
1798:
1664:
1216:"Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]"
1054:
808:
access points without dropping the secure VPN session or losing application sessions. Mobile VPNs are widely used in
781:
635:
605:
601:
1149:
2139:
2060:
646:
642:
1892:
1861:
1830:
3449:
2530:
1816:
s, because customers trust that the network facilities operated by the service providers will not be compromised.
522:
1763:
1585:
Benjamin
Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol".
1435:
340:
Conversely, Windows does not support plain IPsec IKEv1 remote access native VPN configuration (commonly used by
3770:
797:
4000:
804:, but instead roams across various networks such as data networks from cellular carriers or between multiple
770:
708:
621:
3970:
3841:
3521:
2784:
2759:
1240:
716:
455:
of connecting parties. This secures the joined remote network confidentiality, integrity and availability.
396:
3409:
3365:
2769:
2119:
853:
427:
1650:
828:
A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support
542:
360:
In some cases, like in the open source operating systems devoted to firewalls and network devices (like
2124:
813:
743:
554:
546:
518:
514:
326:
4005:
3645:
3163:
2799:
1647:"Chapter 17: Internet Protocol Security: IPsec, Crypto IP Encapsulation for Virtual Private Networks"
475:
431:
172:
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
2045:
1646:
3399:
3303:
3273:
2968:
2746:
2645:
2295:
2155:
2149:
1410:
928:
923:
817:
668:
Multi Path
Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered
654:
617:
583:
579:
341:
315:
136:
The ways a VPN actually works depends on which technologies and protocols the VPN is built upon. A
121:
773:(MPLS) often overlays VPNs, often with quality-of-service control over a trusted delivery network.
3576:
3470:
3394:
3263:
3133:
2388:
2300:
650:
624:(SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts).
573:
443:
by making the untrusted medium owner unable to access the private data exchanged across the VPN.
1174:
3561:
3421:
3414:
3253:
3180:
3028:
2305:
2091:
938:
739:
728:
537:
made it only a recommendation. This standards-based security protocol is also widely used with
404:
403:, such that even if the network traffic is sniffed at the packet level (see network sniffer or
319:
974:
3665:
3571:
3426:
550:
1070:
1046:
3792:
3566:
2634:
2362:
2269:
1086:
875:
491:
240:
51:
31:
1128:
734:
Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling
8:
3536:
3516:
3218:
2706:
2624:
2614:
2609:
2553:
2315:
2310:
2261:
1656:
801:
658:
3749:
3208:
3013:
3003:
849:
188:
137:
75:
3624:
3526:
2976:
2857:
2604:
2589:
2372:
2320:
2274:
2037:
1794:
1660:
1590:
1573:
1050:
1039:
845:
816:
and criminal databases, and in other organizations with similar requirements such as
698:
330:
1994:
1969:
1695:
883:
2948:
2325:
1900:
1869:
1838:
1565:
1523:"Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google"
1321:
1198:
1076:
913:
829:
720:
530:
302:
251:
Apart from the general topology configuration, a VPN may also be characterized by:
168:
71:
59:
3831:
3660:
3198:
3128:
3057:
3023:
3008:
2920:
2887:
2862:
2279:
2236:
2144:
1976:
1952:
1928:
1896:
1865:
1834:
1788:
1350:
1205:, "IPv6 Node Requirements", E. Jankiewicz, J. Loughney, T. Narten (December 2011)
1072:
RFC 3809 - Generic
Requirements for Provider Provisioned Virtual Private Networks
933:
889:
856:(VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.
754:
712:
680:
400:
55:
1904:
1873:
1842:
1202:
1089:
534:
434:
without being rejected due to the MAC not matching with the altered data packet.
164:
VPN classification tree based on the topology first, then on the technology used
3764:
3551:
2958:
2754:
1726:
837:
487:
460:
452:
423:
419:
415:
1553:
3994:
3933:
3905:
3851:
3826:
3728:
3686:
3404:
3203:
2877:
2221:
2052:
2041:
1577:
809:
662:
591:
529:, and was required in all standards-compliant implementations of IPv6 before
479:
334:
244:
148:
3188:
1459:
3949:
3650:
3614:
3604:
3596:
3541:
3143:
2935:
2764:
2698:
2561:
2330:
2109:
2104:
1569:
918:
908:
800:
are used in settings where an endpoint of the VPN is not fixed to a single
751:
694:
418:
to detect and reject any instances of tampering with transmitted messages,
3836:
3709:
3699:
3609:
3233:
3153:
3098:
3018:
2522:
2481:
2340:
2251:
2196:
1812:
VPNs using dedicated circuits, such as Frame Relay are sometimes called
1758:
1731:
1584:
948:
832:; therefore, communication, software, and networking, which are based on
735:
613:
263:
196:
97:
86:
35:
812:
where they give law-enforcement officers access to applications such as
160:
3900:
3870:
3704:
3546:
3339:
3283:
3213:
3088:
3083:
3033:
2998:
2991:
2953:
2943:
2882:
2668:
2579:
2569:
2511:
2496:
2491:
2471:
2445:
2409:
2383:
2226:
2216:
1889:
1858:
1827:
1793:. Networking Technology Series (4 ed.). Cisco Press. p. 233.
898:
690:
609:
471:
408:
82:
1753:
1652:
Red Hat - The
Complete Reference Enterprise Linux & Fedora Edition
727:, etc. It is currently being developed and updated by OpenVPN Inc., a
3926:
3921:
3759:
3733:
3722:
3170:
3158:
3148:
3113:
3078:
3073:
2986:
2892:
2794:
2726:
2663:
2574:
2458:
2435:
2430:
2357:
2246:
2186:
2181:
1587:
International
Conference on Applied Cryptography and Network Security
1443:
1081:
833:
747:
686:
669:
506:
The life cycle phases of an IPSec tunnel in a virtual private network
467:
345:
273:
256:
110:
757:
implemented by Damion K. Wilson. Development for CIPE ended in 2002.
3754:
3655:
3355:
3329:
3258:
3118:
3108:
3093:
3038:
2915:
2867:
2834:
2809:
2789:
2774:
2619:
2584:
2506:
2453:
2231:
2206:
2201:
2159:
1995:"Virtual Private Network (VPN) : What VPN Is And How It Works"
373:
224:
218:
192:
63:
3500:
236:
site-to-site VPN joins sites belonging to multiple organizations.
3880:
3875:
3860:
3776:
3715:
3694:
3378:
3373:
3324:
3138:
2872:
2839:
2829:
2804:
2736:
2716:
2658:
2599:
2593:
2501:
2486:
2425:
2211:
2176:
1622:
841:
724:
704:
676:
587:
440:
369:
361:
281:
277:
141:
1493:"WireGuard VPN makes it to 1.0.0—and into the next Linux kernel"
466:
Remote-access VPNs, which are typically user-initiated, may use
3798:
3431:
3278:
2824:
2779:
2731:
2683:
2401:
2129:
943:
502:
365:
262:
the tunnel's termination point location, e.g., on the customer
191:
of a remote site, or any wider enterprise networks, such as an
3963:
indicates that maintenance of the tool has been discontinued.
3640:
3334:
3308:
3248:
3223:
2981:
2925:
2910:
2814:
2721:
2678:
2673:
2653:
2349:
2114:
805:
638:
and in several compatible implementations on other platforms.
595:
711:
VPN protocol based on the TLS protocol. It supports perfect
586:) can tunnel an entire network's traffic (as it does in the
309:
3123:
2902:
2476:
2241:
538:
526:
125:
1754:"CIPE-Win32 - Crypto IP Encapsulation for Windows NT/2000"
3865:
3193:
3103:
2711:
2191:
777:
216:
In the context of site-to-site configurations, the terms
430:(MAC), which prevents the message from being altered or
1129:"Connect to a virtual private network (VPN) on Android"
653:(PPP) or Layer 2 Tunneling Protocol traffic through an
570:
566:
1266:"About Always On VPN for Windows Server Remote Access"
1946:"Solving the Computing Challenges of Mobile Officers"
297:
865:
598:) is supported without special extra configurations,
1786:
1038:
27:Extension of a private network across a public one
1104:"Connect to a VPN in Windows - Microsoft Support"
351:
228:are used to describe two different use cases. An
3992:
1036:
399:to prevent disclosure of private information or
276:they present to the connecting network, such as
979:NIST Computer Security Resource Center Glossary
2082:
792:
155:
3486:
2538:
2068:
1615:Red Hat Linux 9: Red Hat Linux Security Guide
715:, and most modern secure cipher suites, like
497:
761:
543:availability, integrity, and confidentiality
147:Applications that do implement tunneling or
74:and computer networks by the use of network
1558:Computing & Control Engineering Journal
1381:"Trademark Status & Document Retrieval"
287:the number of simultaneous allowed tunnels.
3493:
3479:
2552:
2545:
2531:
2075:
2061:
2030:"Necessity is the mother of VPN invention"
1554:"Virtual private networks - how they work"
1241:"VPN overview for Apple device deployment"
1008:"What Is a VPN? - Virtual Private Network"
904:Dynamic Multipoint Virtual Private Network
30:"VPN" redirects here. For other uses, see
1551:
1150:"VPN settings overview for Apple devices"
1080:
823:
337:and others got it supported in the past.
310:VPN support in consumer operating systems
1890:Point-to-Point Tunneling Protocol (PPTP)
1644:
1611:
782:Point-to-Point Tunneling Protocol (PPTP)
563:Extensible Authentication Protocol (EAP)
541:. Its design meets most security goals:
501:
167:
159:
1992:
1292:"1. Ultimate Powerful VPN Connectivity"
750:operating systems by Olaf Titz, with a
486:Site-to-site VPNs often use passwords (
14:
3993:
1914:
1751:
1727:"CIPE - encrypted IP in UDP tunneling"
1490:
1192:
780:(obsolete as of 2009) and Microsoft's
387:
131:
3533:Censorship and blocking technologies
3474:
2526:
2056:
2027:
1962:
1790:Internetworking Technologies Handbook
1766:from the original on 8 September 2022
1739:from the original on 8 September 2022
1018:from the original on 31 December 2021
848:, may not be fully supported as on a
3975:
3455:
1724:
1693:
1673:from the original on 17 January 2023
1632:from the original on 14 October 2022
1433:
1041:Cisco Secure Virtual Private Network
1002:
1000:
969:
967:
965:
679:offers VPN tunneling (distinct from
1828:Layer Two Tunneling Protocol "L2TP"
1302:from the original on 8 October 2022
985:from the original on 2 January 2023
628:Microsoft Point-to-Point Encryption
24:
2021:
1752:Wilson, Damion (19 October 2002).
1612:Fuller, Johnray; Ha, John (2002).
1503:from the original on 31 March 2020
1391:from the original on 21 March 2012
731:providing secure VPN technologies.
298:VPN native and third-party support
25:
4022:
3502:Internet censorship circumvention
2005:from the original on 17 June 2022
1859:IP Based Virtual Private Networks
1533:from the original on 29 June 2022
1361:from the original on 6 March 2015
1328:from the original on 29 June 2022
997:
962:
636:Point-to-Point Tunneling Protocol
602:Datagram Transport Layer Security
555:Layer 2 Tunneling Protocol (L2TP)
521:) was initially developed by the
446:
3974:
3965:
3964:
3454:
3445:
3444:
1993:Sowells, Julia (7 August 2017).
1706:from the original on 18 May 2022
1696:"CIPE - Crypto IP Encapsulation"
1470:from the original on 2 July 2022
1421:from the original on 5 July 2022
1351:"Why TCP Over TCP Is A Bad Idea"
882:
868:
657:channel (SSTP was introduced in
643:Secure Socket Tunneling Protocol
1986:
1938:
1883:
1852:
1821:
1780:
1718:
1694:Titz, Olaf (20 December 2011).
1687:
1605:
1552:Younglove, R. (December 2000).
1545:
1515:
1484:
1460:"SSH_VPN – Community Help Wiki"
1411:"ssh(1) – OpenBSD manual pages"
1403:
1373:
1343:
1314:
1284:
1258:
1233:
1208:
798:Mobile virtual private networks
523:Internet Engineering Task Force
269:the security features provided.
255:the tunneling protocol used to
34:. For commercial services, see
3894:Physical circumvention methods
1700:CIPE - Crypto IP Encapsulation
1167:
1142:
1121:
1096:
1063:
1030:
407:), an attacker would see only
352:VPN support in network devices
13:
1:
1922:"Mobile VPN: Closing the Gap"
1491:Salter, Jim (30 March 2020).
955:
771:Multiprotocol Label Switching
103:
3558:Blocks on specific websites
3522:Internet censorship in China
1787:Cisco Systems, Inc. (2004).
7:
3410:Cryptographic hash function
2028:Kelly, Sean (August 2001).
1725:Titz, Olaf (2 April 2013).
1179:Android Open Source Project
861:
854:Virtual Private LAN Service
793:VPNs in mobile environments
551:Internet Key Exchange (IKE)
428:message authentication code
156:VPN topology configurations
10:
4027:
2084:Virtual private networking
1645:Petersen, Richard (2004).
852:. Variants on VPN such as
814:computer-assisted dispatch
515:Internet Protocol Security
498:VPN protocols to highlight
54:for virtually extending a
29:
3958:
3942:
3914:
3893:
3850:
3819:
3812:
3785:
3742:
3685:
3678:
3646:IPv6 transition mechanism
3633:
3594:
3587:
3509:
3440:
3387:
3364:
3348:
3317:
3292:
3232:
3179:
3056:
2967:
2934:
2901:
2848:
2745:
2697:
2644:
2633:
2560:
2444:
2418:
2400:
2371:
2348:
2339:
2288:
2260:
2169:
2090:
1933:SearchMobileComputing.com
1298:. SoftEther VPN Project.
1037:Mason, Andrew G. (2002).
975:"virtual private network"
762:Trusted delivery networks
746:. CIPE was developed for
675:Secure Shell (SSH) VPN –
545:. IPsec uses encryption,
476:two-factor authentication
266:or network-provider edge.
96:is also used to refer to
4011:Virtual private networks
3679:Anti-censorship software
3400:Timeline of cryptography
2296:Content-control software
1527:android.googlesource.com
929:Provider-provisioned VPN
924:Opportunistic encryption
818:field service management
778:Layer 2 Forwarding (L2F)
620:has with tunneling over
616:VPN to solve the issues
580:Transport Layer Security
122:Provider-provisioned VPN
109:a certain communication
62:which is not the public
18:Virtual Private Networks
3552:Great Firewall of China
3395:Outline of cryptography
3366:Anti–computer forensics
2389:Private Internet Access
2301:Deep content inspection
2170:Connection applications
2092:Communication protocols
1981:The Wall Street Journal
1045:. Cisco Press. p.
651:Point-to-Point Protocol
357:easy out-of-box setup.
243:, cloud computing, and
44:Virtual private network
3915:Relevant organizations
3634:Without a proxy server
3422:Homomorphic encryption
3415:List of hash functions
2554:Cryptographic software
2306:Deep packet inspection
939:Virtual private server
824:Networking limitations
507:
405:deep packet inspection
173:
165:
3666:Refraction networking
3427:End-to-end encryption
1975:28 March 2018 at the
1951:12 April 2020 at the
1175:"IPsec/IKEv2 Library"
1108:support.microsoft.com
505:
284:network connectivity.
171:
163:
4001:Network architecture
3743:Proprietary software
2270:Avast SecureLine VPN
2048:on 17 December 2001.
1983:, 11 December 2007.
1833:30 June 2022 at the
1570:10.1049/cce:20000602
876:Free Software portal
709:free and open-source
492:digital certificates
241:business-to-business
52:network architecture
32:VPN (disambiguation)
3542:DNS cache poisoning
3537:IP address blocking
3517:Internet censorship
2316:Network enumeration
2311:IP address blocking
2262:Enterprise software
1927:6 July 2020 at the
1895:2 July 2022 at the
1864:9 July 2022 at the
1657:McGraw-Hill/Osborne
1270:learn.microsoft.com
789:access to the VPN.
659:Windows Server 2008
388:Security mechanisms
132:VPN general working
76:tunneling protocols
3820:Anonymous software
3786:Browser extensions
3014:Facebook Messenger
2034:Communication News
1970:"Lost Connections"
850:local area network
846:Windows networking
608:) – used in Cisco
508:
461:web captive portal
411:, not the raw data
189:local area network
174:
166:
138:tunneling protocol
3988:
3987:
3889:
3888:
3808:
3807:
3674:
3673:
3527:National intranet
3468:
3467:
3318:Service providers
3052:
3051:
2858:Check Point VPN-1
2520:
2519:
2467:
2466:
2373:Kape Technologies
2321:Stateful firewall
2275:Check Point VPN-1
1655:. United States:
1621:. United States:
1596:978-3-319-93386-3
1434:Barschel, Colin.
1296:www.softether.org
1075:. sec. 1.1.
830:broadcast domains
699:ChaCha20-Poly1305
634:) works with the
331:Microsoft Windows
303:Operating systems
120:In the case of a
72:computing devices
16:(Redirected from
4018:
4006:Internet privacy
3978:
3977:
3968:
3967:
3817:
3816:
3683:
3682:
3592:
3591:
3495:
3488:
3481:
3472:
3471:
3458:
3457:
3448:
3447:
3296:operating system
3294:Security-focused
3242:
3067:
2642:
2641:
2547:
2540:
2533:
2524:
2523:
2346:
2345:
2326:TCP reset attack
2077:
2070:
2063:
2054:
2053:
2049:
2044:. Archived from
2015:
2014:
2012:
2010:
1990:
1984:
1966:
1960:
1942:
1936:
1935:, 16 July 2006.
1918:
1912:
1887:
1881:
1856:
1850:
1825:
1819:
1818:
1809:
1807:
1784:
1778:
1775:
1773:
1771:
1748:
1746:
1744:
1722:
1716:
1715:
1713:
1711:
1691:
1685:
1682:
1680:
1678:
1641:
1639:
1637:
1631:
1625:pp. 48–53.
1620:
1609:
1603:
1600:
1581:
1549:
1543:
1542:
1540:
1538:
1519:
1513:
1512:
1510:
1508:
1488:
1482:
1479:
1477:
1475:
1455:
1453:
1451:
1442:. Archived from
1430:
1428:
1426:
1407:
1401:
1400:
1398:
1396:
1377:
1371:
1370:
1368:
1366:
1347:
1341:
1340:
1335:
1333:
1318:
1312:
1311:
1309:
1307:
1288:
1282:
1281:
1279:
1277:
1262:
1256:
1255:
1253:
1251:
1237:
1231:
1230:
1228:
1226:
1212:
1206:
1196:
1190:
1189:
1187:
1185:
1171:
1165:
1164:
1162:
1160:
1146:
1140:
1139:
1137:
1135:
1125:
1119:
1118:
1116:
1114:
1100:
1094:
1093:
1084:
1082:10.17487/RFC3809
1067:
1061:
1060:
1044:
1034:
1028:
1027:
1025:
1023:
1004:
995:
994:
992:
990:
971:
914:Internet privacy
892:
887:
886:
878:
873:
872:
871:
820:and healthcare.
665:Service Pack 1).
280:link/circuit or
60:computer network
21:
4026:
4025:
4021:
4020:
4019:
4017:
4016:
4015:
3991:
3990:
3989:
3984:
3954:
3938:
3910:
3885:
3846:
3804:
3781:
3738:
3670:
3661:Domain fronting
3629:
3583:
3505:
3499:
3469:
3464:
3436:
3383:
3360:
3344:
3313:
3295:
3288:
3236:
3228:
3199:Java Anon Proxy
3175:
3061:
3060:
3058:Disk encryption
3048:
3024:Google Messages
3009:Signal Protocol
2963:
2930:
2897:
2844:
2741:
2693:
2636:
2629:
2556:
2551:
2521:
2516:
2463:
2440:
2414:
2396:
2367:
2335:
2284:
2280:LogMeIn Hamachi
2256:
2165:
2145:Split tunneling
2086:
2081:
2024:
2022:Further reading
2019:
2018:
2008:
2006:
1991:
1987:
1977:Wayback Machine
1967:
1963:
1957:www.officer.com
1953:Wayback Machine
1944:Willett, Andy.
1943:
1939:
1929:Wayback Machine
1919:
1915:
1897:Wayback Machine
1888:
1884:
1866:Wayback Machine
1857:
1853:
1835:Wayback Machine
1826:
1822:
1805:
1803:
1801:
1785:
1781:
1769:
1767:
1742:
1740:
1723:
1719:
1709:
1707:
1692:
1688:
1676:
1674:
1667:
1635:
1633:
1629:
1618:
1610:
1606:
1597:
1550:
1546:
1536:
1534:
1521:
1520:
1516:
1506:
1504:
1489:
1485:
1473:
1471:
1464:help.ubuntu.com
1458:
1449:
1447:
1424:
1422:
1415:man.openbsd.org
1409:
1408:
1404:
1394:
1392:
1379:
1378:
1374:
1364:
1362:
1349:
1348:
1344:
1331:
1329:
1320:
1319:
1315:
1305:
1303:
1290:
1289:
1285:
1275:
1273:
1264:
1263:
1259:
1249:
1247:
1239:
1238:
1234:
1224:
1222:
1214:
1213:
1209:
1197:
1193:
1183:
1181:
1173:
1172:
1168:
1158:
1156:
1148:
1147:
1143:
1133:
1131:
1127:
1126:
1122:
1112:
1110:
1102:
1101:
1097:
1069:
1068:
1064:
1057:
1035:
1031:
1021:
1019:
1006:
1005:
998:
988:
986:
973:
972:
963:
958:
953:
934:Split tunneling
890:Internet portal
888:
881:
874:
869:
867:
864:
826:
795:
764:
713:forward-secrecy
681:port forwarding
500:
488:pre-shared keys
449:
424:tamper proofing
422:are secured by
397:confidentiality
390:
354:
312:
300:
185:host-to-network
158:
134:
106:
56:private network
39:
28:
23:
22:
15:
12:
11:
5:
4024:
4014:
4013:
4008:
4003:
3986:
3985:
3959:
3956:
3955:
3953:
3952:
3946:
3944:
3940:
3939:
3937:
3936:
3931:
3930:
3929:
3918:
3916:
3912:
3911:
3909:
3908:
3903:
3897:
3895:
3891:
3890:
3887:
3886:
3884:
3883:
3878:
3873:
3868:
3863:
3857:
3855:
3848:
3847:
3845:
3844:
3839:
3834:
3832:JAP (JonDonym)
3829:
3823:
3821:
3814:
3810:
3809:
3806:
3805:
3803:
3802:
3795:
3789:
3787:
3783:
3782:
3780:
3779:
3774:
3767:
3765:Hotspot Shield
3762:
3757:
3752:
3746:
3744:
3740:
3739:
3737:
3736:
3731:
3726:
3719:
3712:
3707:
3702:
3697:
3691:
3689:
3680:
3676:
3675:
3672:
3671:
3669:
3668:
3663:
3658:
3653:
3648:
3643:
3637:
3635:
3631:
3630:
3628:
3627:
3622:
3617:
3612:
3607:
3601:
3599:
3589:
3585:
3584:
3582:
3581:
3580:
3579:
3574:
3569:
3564:
3556:
3555:
3554:
3549:
3544:
3539:
3531:
3530:
3529:
3524:
3513:
3511:
3507:
3506:
3498:
3497:
3490:
3483:
3475:
3466:
3465:
3463:
3462:
3452:
3441:
3438:
3437:
3435:
3434:
3429:
3424:
3419:
3418:
3417:
3412:
3405:Hash functions
3402:
3397:
3391:
3389:
3388:Related topics
3385:
3384:
3382:
3381:
3376:
3370:
3368:
3362:
3361:
3359:
3358:
3352:
3350:
3346:
3345:
3343:
3342:
3337:
3332:
3327:
3321:
3319:
3315:
3314:
3312:
3311:
3306:
3300:
3298:
3290:
3289:
3287:
3286:
3281:
3276:
3271:
3266:
3261:
3256:
3251:
3245:
3243:
3230:
3229:
3227:
3226:
3221:
3216:
3211:
3206:
3201:
3196:
3191:
3185:
3183:
3177:
3176:
3174:
3173:
3168:
3167:
3166:
3156:
3151:
3146:
3141:
3136:
3131:
3126:
3121:
3116:
3111:
3106:
3101:
3096:
3091:
3086:
3081:
3076:
3070:
3068:
3054:
3053:
3050:
3049:
3047:
3046:
3043:
3042:
3041:
3036:
3031:
3026:
3021:
3016:
3006:
3001:
2996:
2995:
2994:
2989:
2979:
2973:
2971:
2965:
2964:
2962:
2961:
2956:
2951:
2946:
2940:
2938:
2932:
2931:
2929:
2928:
2923:
2918:
2913:
2907:
2905:
2899:
2898:
2896:
2895:
2890:
2885:
2880:
2875:
2870:
2865:
2860:
2854:
2852:
2846:
2845:
2843:
2842:
2837:
2832:
2827:
2822:
2817:
2812:
2807:
2802:
2797:
2792:
2787:
2782:
2777:
2772:
2767:
2762:
2757:
2755:BBM Enterprise
2751:
2749:
2743:
2742:
2740:
2739:
2734:
2729:
2724:
2719:
2714:
2709:
2703:
2701:
2695:
2694:
2692:
2691:
2686:
2681:
2676:
2671:
2666:
2661:
2656:
2650:
2648:
2639:
2631:
2630:
2628:
2627:
2622:
2617:
2612:
2607:
2602:
2597:
2587:
2582:
2577:
2572:
2566:
2564:
2558:
2557:
2550:
2549:
2542:
2535:
2527:
2518:
2517:
2515:
2514:
2509:
2504:
2499:
2494:
2489:
2484:
2479:
2474:
2468:
2465:
2464:
2462:
2461:
2456:
2450:
2448:
2442:
2441:
2439:
2438:
2433:
2428:
2422:
2420:
2416:
2415:
2413:
2412:
2406:
2404:
2398:
2397:
2395:
2394:
2391:
2386:
2381:
2377:
2375:
2369:
2368:
2366:
2365:
2360:
2354:
2352:
2343:
2337:
2336:
2334:
2333:
2328:
2323:
2318:
2313:
2308:
2303:
2298:
2292:
2290:
2286:
2285:
2283:
2282:
2277:
2272:
2266:
2264:
2258:
2257:
2255:
2254:
2249:
2244:
2239:
2234:
2229:
2224:
2219:
2214:
2209:
2204:
2199:
2194:
2189:
2184:
2179:
2173:
2171:
2167:
2166:
2164:
2163:
2152:
2147:
2142:
2137:
2132:
2127:
2122:
2117:
2112:
2107:
2102:
2096:
2094:
2088:
2087:
2080:
2079:
2072:
2065:
2057:
2051:
2050:
2023:
2020:
2017:
2016:
1985:
1968:Cheng, Roger.
1961:
1937:
1920:Phifer, Lisa.
1913:
1882:
1876:, A. Valencia
1851:
1845:, W. Townsley
1820:
1799:
1779:
1777:
1776:
1717:
1686:
1684:
1683:
1665:
1604:
1602:
1601:
1595:
1564:(6): 260–262.
1544:
1514:
1483:
1481:
1480:
1456:
1446:on 28 May 2019
1436:"Unix Toolbox"
1402:
1385:tarr.uspto.gov
1372:
1342:
1313:
1283:
1257:
1232:
1207:
1191:
1166:
1141:
1120:
1095:
1062:
1055:
1029:
996:
960:
959:
957:
954:
952:
951:
946:
941:
936:
931:
926:
921:
916:
911:
906:
901:
895:
894:
893:
879:
863:
860:
836:and broadcast
825:
822:
794:
791:
786:
785:
774:
763:
760:
759:
758:
732:
702:
684:
673:
666:
639:
625:
599:
577:
499:
496:
453:authentication
448:
447:Authentication
445:
436:
435:
412:
409:encrypted data
389:
386:
353:
350:
325:For instance,
311:
308:
299:
296:
292:
291:
288:
285:
270:
267:
260:
214:
213:
205:
201:
200:
197:remote workers
181:
157:
154:
133:
130:
105:
102:
87:remote workers
26:
9:
6:
4:
3:
2:
4023:
4012:
4009:
4007:
4004:
4002:
3999:
3998:
3996:
3983:
3982:
3973:
3972:
3962:
3957:
3951:
3948:
3947:
3945:
3941:
3935:
3934:Turkey Blocks
3932:
3928:
3925:
3924:
3923:
3920:
3919:
3917:
3913:
3907:
3906:USB dead drop
3904:
3902:
3899:
3898:
3896:
3892:
3882:
3879:
3877:
3874:
3872:
3869:
3867:
3864:
3862:
3859:
3858:
3856:
3853:
3852:Anonymous P2P
3849:
3843:
3840:
3838:
3835:
3833:
3830:
3828:
3825:
3824:
3822:
3818:
3815:
3811:
3801:
3800:
3796:
3794:
3791:
3790:
3788:
3784:
3778:
3775:
3773:
3772:
3768:
3766:
3763:
3761:
3758:
3756:
3753:
3751:
3748:
3747:
3745:
3741:
3735:
3732:
3730:
3727:
3725:
3724:
3720:
3718:
3717:
3713:
3711:
3708:
3706:
3703:
3701:
3698:
3696:
3693:
3692:
3690:
3688:
3687:Free software
3684:
3681:
3677:
3667:
3664:
3662:
3659:
3657:
3654:
3652:
3649:
3647:
3644:
3642:
3639:
3638:
3636:
3632:
3626:
3623:
3621:
3618:
3616:
3613:
3611:
3608:
3606:
3603:
3602:
3600:
3598:
3593:
3590:
3586:
3578:
3575:
3573:
3570:
3568:
3565:
3563:
3560:
3559:
3557:
3553:
3550:
3548:
3545:
3543:
3540:
3538:
3535:
3534:
3532:
3528:
3525:
3523:
3520:
3519:
3518:
3515:
3514:
3512:
3508:
3503:
3496:
3491:
3489:
3484:
3482:
3477:
3476:
3473:
3461:
3453:
3451:
3443:
3442:
3439:
3433:
3430:
3428:
3425:
3423:
3420:
3416:
3413:
3411:
3408:
3407:
3406:
3403:
3401:
3398:
3396:
3393:
3392:
3390:
3386:
3380:
3377:
3375:
3372:
3371:
3369:
3367:
3363:
3357:
3354:
3353:
3351:
3347:
3341:
3338:
3336:
3333:
3331:
3328:
3326:
3323:
3322:
3320:
3316:
3310:
3307:
3305:
3302:
3301:
3299:
3297:
3291:
3285:
3282:
3280:
3277:
3275:
3272:
3270:
3267:
3265:
3262:
3260:
3257:
3255:
3252:
3250:
3247:
3246:
3244:
3240:
3235:
3231:
3225:
3222:
3220:
3217:
3215:
3212:
3210:
3207:
3205:
3202:
3200:
3197:
3195:
3192:
3190:
3187:
3186:
3184:
3182:
3178:
3172:
3169:
3165:
3162:
3161:
3160:
3157:
3155:
3152:
3150:
3147:
3145:
3142:
3140:
3137:
3135:
3132:
3130:
3127:
3125:
3122:
3120:
3117:
3115:
3112:
3110:
3107:
3105:
3102:
3100:
3097:
3095:
3092:
3090:
3087:
3085:
3082:
3080:
3077:
3075:
3072:
3071:
3069:
3065:
3059:
3055:
3044:
3040:
3037:
3035:
3032:
3030:
3027:
3025:
3022:
3020:
3017:
3015:
3012:
3011:
3010:
3007:
3005:
3002:
3000:
2997:
2993:
2990:
2988:
2985:
2984:
2983:
2980:
2978:
2975:
2974:
2972:
2970:
2966:
2960:
2957:
2955:
2952:
2950:
2947:
2945:
2942:
2941:
2939:
2937:
2933:
2927:
2924:
2922:
2919:
2917:
2914:
2912:
2909:
2908:
2906:
2904:
2900:
2894:
2891:
2889:
2886:
2884:
2881:
2879:
2878:SoftEther VPN
2876:
2874:
2871:
2869:
2866:
2864:
2861:
2859:
2856:
2855:
2853:
2851:
2847:
2841:
2838:
2836:
2833:
2831:
2828:
2826:
2823:
2821:
2818:
2816:
2813:
2811:
2808:
2806:
2803:
2801:
2798:
2796:
2793:
2791:
2788:
2786:
2783:
2781:
2778:
2776:
2773:
2771:
2768:
2766:
2763:
2761:
2760:Bouncy Castle
2758:
2756:
2753:
2752:
2750:
2748:
2747:TLS & SSL
2744:
2738:
2735:
2733:
2730:
2728:
2725:
2723:
2720:
2718:
2715:
2713:
2710:
2708:
2705:
2704:
2702:
2700:
2696:
2690:
2687:
2685:
2682:
2680:
2677:
2675:
2672:
2670:
2667:
2665:
2662:
2660:
2657:
2655:
2652:
2651:
2649:
2647:
2643:
2640:
2638:
2637:communication
2632:
2626:
2623:
2621:
2618:
2616:
2613:
2611:
2608:
2606:
2603:
2601:
2598:
2595:
2591:
2588:
2586:
2583:
2581:
2578:
2576:
2573:
2571:
2568:
2567:
2565:
2563:
2562:Email clients
2559:
2555:
2548:
2543:
2541:
2536:
2534:
2529:
2528:
2525:
2513:
2510:
2508:
2505:
2503:
2500:
2498:
2495:
2493:
2490:
2488:
2485:
2483:
2480:
2478:
2475:
2473:
2470:
2469:
2460:
2457:
2455:
2452:
2451:
2449:
2447:
2443:
2437:
2434:
2432:
2429:
2427:
2424:
2423:
2421:
2417:
2411:
2408:
2407:
2405:
2403:
2399:
2392:
2390:
2387:
2385:
2382:
2379:
2378:
2376:
2374:
2370:
2364:
2361:
2359:
2356:
2355:
2353:
2351:
2347:
2344:
2342:
2338:
2332:
2329:
2327:
2324:
2322:
2319:
2317:
2314:
2312:
2309:
2307:
2304:
2302:
2299:
2297:
2294:
2293:
2291:
2287:
2281:
2278:
2276:
2273:
2271:
2268:
2267:
2265:
2263:
2259:
2253:
2250:
2248:
2245:
2243:
2240:
2238:
2235:
2233:
2230:
2228:
2225:
2223:
2222:SoftEther VPN
2220:
2218:
2215:
2213:
2210:
2208:
2205:
2203:
2200:
2198:
2195:
2193:
2190:
2188:
2185:
2183:
2180:
2178:
2175:
2174:
2172:
2168:
2161:
2157:
2156:Opportunistic
2153:
2151:
2148:
2146:
2143:
2141:
2138:
2136:
2133:
2131:
2128:
2126:
2123:
2121:
2118:
2116:
2113:
2111:
2108:
2106:
2103:
2101:
2098:
2097:
2095:
2093:
2089:
2085:
2078:
2073:
2071:
2066:
2064:
2059:
2058:
2055:
2047:
2043:
2039:
2035:
2031:
2026:
2025:
2004:
2000:
1996:
1989:
1982:
1978:
1974:
1971:
1965:
1959:, May, 2006.
1958:
1954:
1950:
1947:
1941:
1934:
1930:
1926:
1923:
1917:
1910:
1906:
1902:
1898:
1894:
1891:
1886:
1879:
1875:
1871:
1867:
1863:
1860:
1855:
1849:, August 1999
1848:
1844:
1840:
1836:
1832:
1829:
1824:
1817:
1815:
1802:
1800:9781587051197
1796:
1792:
1791:
1783:
1765:
1761:
1760:
1755:
1750:
1749:
1738:
1734:
1733:
1728:
1721:
1705:
1701:
1697:
1690:
1672:
1668:
1666:0-07-223075-4
1662:
1658:
1654:
1653:
1648:
1643:
1642:
1628:
1624:
1623:Red Hat, Inc.
1617:
1616:
1608:
1598:
1592:
1588:
1583:
1582:
1579:
1575:
1571:
1567:
1563:
1559:
1555:
1548:
1532:
1528:
1524:
1518:
1502:
1498:
1494:
1487:
1469:
1465:
1461:
1457:
1445:
1441:
1437:
1432:
1431:
1420:
1416:
1412:
1406:
1390:
1386:
1382:
1376:
1360:
1356:
1355:sites.inka.de
1352:
1346:
1339:
1327:
1323:
1322:"OpenConnect"
1317:
1301:
1297:
1293:
1287:
1272:. 22 May 2023
1271:
1267:
1261:
1246:
1245:Apple Support
1242:
1236:
1221:
1217:
1211:
1204:
1200:
1195:
1180:
1176:
1170:
1155:
1154:Apple Support
1151:
1145:
1130:
1124:
1109:
1105:
1099:
1091:
1088:
1083:
1078:
1074:
1073:
1066:
1058:
1056:9781587050336
1052:
1048:
1043:
1042:
1033:
1017:
1013:
1009:
1003:
1001:
984:
980:
976:
970:
968:
966:
961:
950:
947:
945:
942:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
896:
891:
885:
880:
877:
866:
859:
857:
855:
851:
847:
843:
839:
835:
831:
821:
819:
815:
811:
810:public safety
807:
803:
799:
790:
783:
779:
775:
772:
769:
768:
767:
756:
753:
749:
745:
744:encapsulation
741:
737:
733:
730:
726:
722:
718:
714:
710:
706:
703:
700:
696:
693:protocol for
692:
688:
685:
682:
678:
674:
671:
667:
664:
663:Windows Vista
660:
656:
652:
648:
644:
640:
637:
633:
629:
626:
623:
619:
615:
611:
607:
603:
600:
597:
593:
592:SoftEther VPN
589:
585:
581:
578:
575:
572:
568:
564:
560:
556:
552:
548:
547:encapsulating
544:
540:
536:
532:
528:
524:
520:
516:
513:
512:
511:
504:
495:
493:
489:
484:
481:
480:cryptographic
477:
473:
469:
464:
462:
456:
454:
444:
442:
433:
429:
425:
421:
417:
413:
410:
406:
402:
401:data sniffing
398:
395:
394:
393:
385:
381:
377:
375:
371:
367:
363:
358:
349:
347:
343:
338:
336:
335:BlackBerry OS
332:
328:
323:
321:
317:
307:
304:
295:
289:
286:
283:
279:
275:
271:
268:
265:
261:
258:
254:
253:
252:
249:
246:
245:branch office
242:
237:
235:
231:
227:
226:
221:
220:
210:
206:
203:
202:
198:
194:
190:
186:
182:
180:Remote access
179:
178:
177:
170:
162:
153:
150:
145:
143:
139:
129:
127:
123:
118:
114:
112:
101:
99:
95:
90:
88:
84:
79:
77:
73:
67:
65:
61:
57:
53:
49:
45:
41:
37:
33:
19:
3979:
3969:
3960:
3950:Great Cannon
3797:
3769:
3721:
3714:
3619:
3597:proxy server
3504:technologies
3234:File systems
3144:Private Disk
2849:
2341:VPN Services
2331:VPN blocking
2289:Risk vectors
2105:DirectAccess
2083:
2046:the original
2033:
2007:. Retrieved
1999:Hackercombat
1998:
1988:
1980:
1964:
1956:
1940:
1932:
1916:
1908:
1907:, K. Hamzeh
1885:
1877:
1854:
1846:
1823:
1813:
1811:
1804:. Retrieved
1789:
1782:
1768:. Retrieved
1757:
1741:. Retrieved
1730:
1720:
1708:. Retrieved
1699:
1689:
1675:. Retrieved
1651:
1634:. Retrieved
1614:
1607:
1586:
1561:
1557:
1547:
1535:. Retrieved
1526:
1517:
1505:. Retrieved
1497:Ars Technica
1496:
1486:
1472:. Retrieved
1463:
1448:. Retrieved
1444:the original
1439:
1423:. Retrieved
1414:
1405:
1393:. Retrieved
1384:
1375:
1363:. Retrieved
1354:
1345:
1337:
1330:. Retrieved
1316:
1304:. Retrieved
1295:
1286:
1274:. Retrieved
1269:
1260:
1248:. Retrieved
1244:
1235:
1223:. Retrieved
1219:
1210:
1194:
1182:. Retrieved
1178:
1169:
1157:. Retrieved
1153:
1144:
1132:. Retrieved
1123:
1111:. Retrieved
1107:
1098:
1071:
1065:
1040:
1032:
1020:. Retrieved
1011:
987:. Retrieved
978:
919:Mediated VPN
909:Ethernet VPN
858:
827:
796:
787:
765:
736:IPv4 packets
695:key exchange
590:project and
509:
485:
465:
457:
450:
437:
420:data packets
391:
382:
378:
359:
355:
339:
324:
320:command-line
313:
301:
293:
259:the traffic.
250:
238:
233:
229:
223:
217:
215:
209:site-to-site
208:
204:Site-to-site
184:
175:
146:
135:
119:
115:
107:
98:VPN services
93:
91:
80:
68:
47:
43:
42:
40:
3837:Flash proxy
3710:Outline VPN
3700:Shadowsocks
3610:Web proxies
3349:Educational
3154:Sentry 2020
3099:DriveSentry
3019:Google Allo
2625:Thunderbird
2482:Mozilla VPN
2252:Shadowsocks
2197:OpenConnect
1911:, July 1999
1814:trusted VPN
1806:15 February
1770:8 September
1759:SourceForge
1743:8 September
1732:SourceForge
1710:8 September
1636:8 September
1022:5 September
949:VPN service
614:OpenConnect
612:VPN and in
525:(IETF) for
478:, or other
142:OSI layer 7
36:VPN service
3995:Categories
3901:Sneakernet
3871:StealthNet
3705:OnionShare
3588:Principles
3547:Wordfilter
3510:Background
3340:NordLocker
3284:Tahoe-LAFS
3274:Rubberhose
3214:RetroShare
3089:Cryptoloop
3084:CrossCrypt
3064:Comparison
3034:TextSecure
2992:ChatSecure
2954:RetroShare
2944:Bitmessage
2883:strongSwan
2669:ChatSecure
2580:Claws Mail
2570:Apple Mail
2512:Windscribe
2497:Proton VPN
2492:PrivadoVPN
2446:Ziff Davis
2410:TunnelBear
2384:ExpressVPN
2380:CyberGhost
2363:SecureLine
2227:strongSwan
2217:Social VPN
2009:7 November
1880:, May 1998
1677:17 January
1425:4 February
1365:24 October
956:References
899:Anonymizer
840:, such as
802:IP address
729:non-profit
691:Curve25519
649:) tunnels
641:Microsoft
610:AnyConnect
472:biometrics
104:Motivation
83:encryption
58:(i.e. any
3943:Reference
3927:FreeWeibo
3922:GreatFire
3842:Mixmaster
3813:Anonymity
3793:Snowflake
3760:Ultrasurf
3734:WireGuard
3723:PirateBox
3577:Knowledge
3181:Anonymity
3171:VeraCrypt
3159:TrueCrypt
3149:Scramdisk
3114:FileVault
3079:BitLocker
3074:BestCrypt
2987:Cryptocat
2893:WireGuard
2795:MatrixSSL
2765:BoringSSL
2727:SecureCRT
2689:Profanity
2664:Centericq
2575:Autocrypt
2459:StrongVPN
2436:Surfshark
2431:NordLayer
2247:WireGuard
2187:Libreswan
2182:FreeS/WAN
2042:0010-3632
2036:: 26–28.
1578:0956-3385
1395:8 October
1306:8 October
989:2 January
687:WireGuard
670:trademark
468:passwords
416:integrity
346:Fritz!Box
316:graphical
274:OSI layer
113:upwards.
92:The term
3971:Category
3755:Freegate
3729:VPN Gate
3656:DNSCrypt
3562:Facebook
3450:Category
3356:CrypTool
3330:Tresorit
3259:eCryptfs
3219:Ricochet
3119:FreeOTFE
3109:eCryptfs
3094:dm-crypt
3039:WhatsApp
2916:Linphone
2868:Openswan
2835:TeamNote
2820:SChannel
2810:mbed TLS
2790:LibreSSL
2775:cryptlib
2707:Dropbear
2620:Sylpheed
2585:Enigmail
2507:SaferVPN
2454:IPVanish
2232:tcpcrypt
2207:Openswan
2202:OpenIKED
2160:tcpcrypt
2003:Archived
1973:Archived
1949:Archived
1925:Archived
1893:Archived
1862:Archived
1831:Archived
1764:Archived
1737:Archived
1704:Archived
1671:Archived
1627:Archived
1531:Archived
1501:Archived
1468:Archived
1450:2 August
1419:Archived
1389:Archived
1359:Archived
1326:Archived
1300:Archived
1016:Archived
983:Archived
862:See also
844:used in
672:"MPVPN".
432:tampered
414:message
374:OPNsense
234:extranet
230:intranet
225:extranet
219:intranet
193:intranet
149:proxying
64:Internet
3981:Commons
3961:Italics
3881:ZeroNet
3876:Tribler
3861:Freenet
3854:network
3777:Proxify
3750:Lantern
3716:GoAgent
3695:Psiphon
3595:With a
3572:Twitter
3460:Commons
3379:BusKill
3374:USBKill
3325:Freenet
3209:Vidalia
3164:History
3139:PGPDisk
3045:SimpleX
3004:Session
2999:Proteus
2873:OpenVPN
2863:Hamachi
2840:wolfSSL
2830:stunnel
2805:OpenSSL
2737:wolfSSH
2717:OpenSSH
2659:BitlBee
2605:Outlook
2600:Kontact
2594:Gpg4win
2502:PureVPN
2487:Mullvad
2426:NordVPN
2419:Tesonet
2393:Zenmate
2212:OpenVPN
2177:FreeLAN
2150:SSL/TLS
1537:30 June
1507:30 June
1474:28 July
1332:8 April
1184:11 July
1159:11 July
1134:11 July
1113:11 July
842:NetBIOS
838:packets
834:layer 2
752:Windows
725:TwoFish
721:Serpent
705:OpenVPN
677:OpenSSH
661:and in
655:SSL/TLS
588:OpenVPN
584:SSL/TLS
441:privacy
370:PfSense
362:OpenWrt
327:Android
282:Layer 3
278:Layer 2
50:) is a
3799:uProxy
3567:GitHub
3432:S/MIME
3279:StegFS
3189:GNUnet
3029:Signal
2977:Matrix
2825:SSLeay
2780:GnuTLS
2732:WinSCP
2684:Kopete
2635:Secure
2402:McAfee
2130:L2TPv3
2040:
1909:et al.
1903:
1878:et al.
1872:
1847:et al.
1841:
1797:
1663:
1593:
1576:
1276:9 July
1250:9 July
1225:9 July
1201:
1053:
944:VPNLab
533:
426:via a
366:IPFire
257:tunnel
3771:Telex
3651:hosts
3641:HTTPS
3335:Wuala
3309:Qubes
3304:Tails
3249:EncFS
3224:Wickr
2982:OMEMO
2949:Briar
2926:Zfone
2911:Jitsi
2815:BSAFE
2770:Botan
2722:PuTTY
2679:Jitsi
2674:climm
2654:Adium
2350:Avast
2115:IPsec
1630:(PDF)
1619:(PDF)
1440:cb.vu
1220:Cisco
1012:Cisco
806:Wi-Fi
748:Linux
738:over
707:is a
596:HTTPS
559:Xauth
519:IPsec
490:) or
342:Cisco
111:layer
3269:PEFS
3264:LUKS
3239:List
3134:LUKS
3129:geli
3124:GBDE
2921:Jami
2903:ZRTP
2888:Tinc
2785:JSSE
2477:IVPN
2472:Hola
2242:VTun
2237:tinc
2140:SSTP
2135:PPTP
2125:L2TP
2110:EVPN
2100:DTLS
2038:ISSN
2011:2021
1905:2637
1874:2341
1843:2661
1808:2013
1795:ISBN
1772:2022
1745:2022
1712:2022
1679:2023
1661:ISBN
1638:2022
1591:ISBN
1574:ISSN
1539:2020
1509:2020
1476:2009
1452:2009
1427:2018
1397:2022
1367:2018
1334:2013
1308:2022
1278:2024
1252:2024
1227:2024
1203:6434
1186:2024
1161:2024
1136:2024
1115:2024
1090:3809
1051:ISBN
1024:2021
991:2023
755:port
742:via
697:and
647:SSTP
632:MPPE
606:DTLS
539:IPv4
535:6434
527:IPv6
344:and
272:the
264:edge
222:and
126:VLAN
3866:I2P
3827:Tor
3625:PAC
3620:VPN
3615:SSH
3605:P2P
3254:EFS
3204:Tor
3194:I2P
3104:E4M
2969:DRA
2959:Tox
2936:P2P
2850:VPN
2800:NSS
2712:lsh
2699:SSH
2646:OTR
2615:PGP
2610:p≡p
2590:GPG
2358:HMA
2192:n2n
2120:L2F
1901:RFC
1870:RFC
1839:RFC
1566:doi
1199:RFC
1087:RFC
1077:doi
740:UDP
717:AES
622:TCP
618:TLS
574:LTE
569:or
531:RFC
463:).
372:or
318:or
128:).
94:VPN
48:VPN
3997::
2158::
2032:.
2001:.
1997:.
1979:,
1955:,
1931:,
1899:,
1868:,
1837:,
1810:.
1762:.
1756:.
1735:.
1729:.
1702:.
1698:.
1669:.
1659:.
1649:.
1589:.
1572:.
1562:11
1560:.
1556:.
1529:.
1525:.
1499:.
1495:.
1466:.
1462:.
1438:.
1417:.
1413:.
1387:.
1383:.
1357:.
1353:.
1336:.
1324:.
1294:.
1268:.
1243:.
1218:.
1177:.
1152:.
1106:.
1085:.
1049:.
1014:.
1010:.
999:^
981:.
977:.
964:^
723:,
719:,
571:4G
567:3G
474:,
470:,
368:,
364:,
333:,
207:A
183:A
89:.
78:.
3494:e
3487:t
3480:v
3241:)
3237:(
3066:)
3062:(
2596:)
2592:(
2546:e
2539:t
2532:v
2162:)
2154:(
2076:e
2069:t
2062:v
2013:.
1774:.
1747:.
1714:.
1681:.
1640:.
1599:.
1580:.
1568::
1541:.
1511:.
1478:.
1454:.
1429:.
1399:.
1369:.
1310:.
1280:.
1254:.
1229:.
1188:.
1163:.
1138:.
1117:.
1092:.
1079::
1059:.
1047:7
1026:.
993:.
784:.
645:(
630:(
604:(
582:(
517:(
46:(
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.