Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Virtual private network

From Wikipedia, the free encyclopedia
(Redirected fromVPNs)
icon
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Virtual private network" – news ·newspapers ·books ·scholar ·JSTOR
(September 2025) (Learn how and when to remove this message)
Extension of a private network across a public one
"VPN" redirects here. For other uses, seeVPN (disambiguation). For commercial services, seeVPN service.

VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together

Avirtual private network (VPN) is anoverlay network that usesnetwork virtualization to extend aprivate network across a public network, such as theInternet, via the use ofencryption andtunneling protocols.[1] In a VPN, a tunneling protocol is used to transfer network messages from onenetwork host to another.

Host-to-network VPNs are commonly used by organisations to allow off-site users secure access to an office network over the internet.[2][3] Site-to-site VPNs connect two networks, such as an office network and a datacenter.Provider-provisioned VPNs isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. Individuals also use VPNs to encrypt andanonymize theirnetwork traffic, withVPN services selling access to their own private networks.

VPNs can enhance usage privacy by making an ISP unable to access the private data exchanged across the VPN. Throughencryption, VPNs enhanceconfidentiality and reduce the risk of successfuldata sniffing attacks.

Background

[edit]
Main article:Computer network

Anetwork is a group of communicatingcomputers known ashosts, whichcommunicate data to other hosts viacommunication protocols, as facilitated bynetworking hardware. Within a computer network, computers are identified bynetwork addresses, which allow rule-based systems such asInternet Protocol to locate and identify hosts. Hosts may also havehostnames, memorable labels for the hostnodes, which are rarely changed after initial assignment. Thetransmission medium that supportsinformation exchange includeswired media like copper cables,optical fibers, and wirelessradio-frequency media. The arrangement of hosts and hardware within anetwork architecture is known as thenetwork topology.[4][5]

Apart from physical transmission media, networks comprisenetwork nodes such asnetwork interface controllers,repeaters,hubs,bridges,switches,routers, andmodems:

  • Thenetwork interface controller (NIC) iscomputer hardware that connects the computer to thenetwork media. In Ethernet networks, each NIC has a uniqueMedia Access Control (MAC) address, usually stored in the controller's permanent memory.
  • Arepeater is an electronic device that receives a networksignal, cleans it of unnecessary noise and regenerates it. The signal isretransmitted at a higher power level, or to the other side of obstruction so that the signal can cover longer distances without degradation.
  • An Ethernet repeater with multiple ports is known as anEthernet hub. In addition to reconditioning and distributing network signals, a hub assists with collision detection and fault isolation for the network. Hubs and repeaters in LANs have been largely obsoleted by modern network switches.
  • Unlike hubs, which forward communication to all ports,network switches forward frames only to the ports involved in the communication. Switches normally have numerous ports, facilitating a star topology for devices, and for cascading additional switches.Network bridges are analogous to a two-port switch.
    • Bridges and switches operate at thedata link layer of theOSI model and bridge traffic between two or morenetwork segments to form a single local network. Both are devices that forwardframes of data betweenports based on the destination MAC address in each frame.Network segmentation through bridging and switching helps break down a large, congested network into an aggregation of smaller, more efficient networks.
  • Arouter is an internetworking device that forwards packets between networks by processing the addressing or routing information included in the packet.
  • Modems (modulator-demodulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless.

Network communication

[edit]

Acommunication protocol is a set of rules for exchanging information over a network. Communication protocols have various characteristics, such as beingconnection-oriented orconnectionless, or usingcircuit switching orpacket switching.

In aprotocol stack, often constructed per theOSI model, communications functions are divided into protocol layers, where each layer leverages the services of the layer below it until the lowest layer controls the hardware that sends information across the media. The use of protocol layering is ubiquitous across the field of computer networking. An important example of a protocol stack isHTTP, theWorld Wide Web protocol. HTTP runs overTCP overIP, the Internet protocols, which in turn run overIEEE 802.11, the Wi-Fi protocol. This stack is used between awireless router and a personal computer when accessing the web.

Most modern computer networks use protocols based onpacket-mode transmission. Anetwork packet is a formatted unit ofdata carried by apacket-switched network. Packets consist of two types of data: control information and user data (payload). The control information provides data the network needs to deliver the user data, for example, source and destinationnetwork addresses,error detection codes, and sequencing information. Typically, control information is found inpacket headers andtrailers, withpayload data in between.

TheInternet protocol suite, also called TCP/IP, is the foundation of all modern networking and the defining set of protocols for the Internet. It offers connection-less and connection-oriented services over an inherently unreliable network traversed by datagram transmission using Internet protocol (IP). At its core, the protocol suite defines the addressing, identification, and routing specifications forInternet Protocol Version 4 (IPv4) and forIPv6, the next generation of the protocol with a much enlarged addressing capability.[6]

Security

[edit]

VPNs do not make connected users anonymous or unidentifiable to the untrusted medium network provider, such as aninternet service provider (ISP). However, VPNs can enhance usage privacy by making an ISP unable to access the private data exchanged across the VPN. Throughencryption, VPNs enhanceconfidentiality and reduce the risk of successfuldata sniffing attacks.Data packets travelling across a VPN may also be secured bytamper proofing via amessage authentication code, prevents the message from being altered ortampered without being rejected, enhancingdata integrity.[citation needed]

A number of other implementations exist to ensureauthentication of connecting parties.Tunnel endpoints can be authenticated in various ways during the VPN access initiation, such as by the whitelisting of endpointIP address. Authentication may also occur after actual tunnels are already active, for example, with aweb captive portal. Remote-access VPNs may also usepasswords,biometrics,two-factor authentication, or othercryptographic methods. Site-to-site VPNs often use passwords (pre-shared keys) ordigital certificates.[citation needed]

Split tunneling

[edit]

Split tunneling allows a user to access distinctsecurity domains at the same time, using the same or different network connections.[7] This connection state is usually facilitated through the simultaneous use of a LANnetwork interface controller (NIC), radio NIC,Wireless LAN NIC, and virtual private network client software application. Split tunneling is most commonly configured via the use of a remote-access VPN client, which allows the user to simultaneously connect to a nearbywireless network, resources on an off-sitecorporate network, as well as websites over the internet.

Not every VPN allows split tunneling.[8][9][10] Advantages of split tunneling include alleviatingbottlenecks, conservingbandwidth (as internet traffic does not have to pass through the VPN server), and enabling a user to not have to continually connect and disconnect when remotely accessing resources..[citation needed] Disadvantages includeDNS leaks and potentially bypassing gateway-level security that might be in place within the company infrastructure.[11] Internet service providers often use split tunneling to that implement forDNS hijacking purposes.

Classification

[edit]
VPN classification tree based on the topology first, then on the technology used

Topology

[edit]

Ahost-to-network configuration is analogous to joining one or more computers to a network to which they cannot be directly connected. This type of extension provides computer access to alocal area network of a remote site, or any wider enterprise networks, such as anintranet. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed forremote workers, or to enable people accessing their private home or company resources without exposing them on the public Internet.[citation needed]

Asite-to-site configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between gateway devices located at each network location. These devices then make the tunnel available to other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarters or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other. In the context of site-to-site configurations, the termsintranet andextranet are used to describe two different use cases.[12] Anintranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas anextranet site-to-site VPN joins sites belonging to multiple organizations.[citation needed]

A limitation of traditional VPNs is that they arepoint-to-point connections and do not tend to supportbroadcast domains. Therefore, communication, software, and networking that are based onlayer 2 and broadcastpackets (such asNetBIOS used inWindows networking) may not be fully supported as on alocal area network. Variants on VPN such asVirtual Private LAN Service (VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.[13]

Trusted and secure delivery networks

[edit]

Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.[14]Multiprotocol Label Switching (MPLS) often overlays trusted VPNs, often with quality-of-service control over a trusted delivery network. A secure VPN either trusts the underlying delivery network or enforces security with an internal mechanism. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.[citation needed]

Types

[edit]

Mobile VPN

[edit]

Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a singleIP address, but instead roams across various networks such as data networks from cellular carriers or between multipleWi-Fi access points without dropping the secure VPN session or losing application sessions.[15] Mobile VPNs are widely used inpublic safety where they give law-enforcement officers access to applications such ascomputer-assisted dispatch and criminal databases,[16] and in other organizations with similar requirements such asfield service management and healthcare.[17][need quotation to verify]

DMVPN

[edit]

Dynamic Multipoint Virtual Private Network (DMVPN)[18] is a dynamictunneling form of a virtual private network supported onCisco IOS-basedrouters, Huawei AR G3 routers,[19] andUnix-like operating systems.

DMVPN provides the capability for creating adynamic-mesh VPN network without having to statically pre-configure all possible tunnel end-point peers, such asIPsec andISAKMP peers.[20] DMVPN is initially configured to build ahub-and-spoke network by statically configuring the hubs (VPN headends) on the spokes; no change in the configuration on the hub is required to accept new spokes. Using this initial hub-and-spoke network, tunnels between spokes are dynamically built on demand without additional configuration on the hubs or spokes. This dynamic-mesh capability alleviates the need for any load on the hub to route data between the spoke networks.[citation needed]

EVPN

[edit]

Ethernet VPN (EVPN) is a technology for carryingOSI layer 2Ethernet traffic as a virtual private network usingwide area network protocols. EVPN technologies includeEthernet over Multiprotocol Label Switching (MPLS) andEthernet overVirtual Extensible LAN.[21][22]

MPLS VPN

[edit]

Multiprotocol Label Switching (MPLS) is a routing technique intelecommunications networks that directs data from onenode to the next based on labels rather than network addresses.[23] Whereas network addresses identifyendpoints, MPLS labels identify established paths between endpoints. MPLS can encapsulate packets of variousnetwork protocols.

In practice, MPLS is mainly used to forwardIPprotocol data units andVirtual Private LAN Service Ethernet traffic. Major applications of MPLS are telecommunications traffic engineering andMPLS VPN. MPLS works in conjunction with theInternet Protocol (IP) and its routing protocols, usuallyinterior gateway protocols (IGPs) and supports the creation of dynamic, transparent virtual networks with support for traffic engineering, the ability to transport layer VPNs with overlapping address spaces, and for layer-2pseudowires that are capable of transporting a variety of transport payloads (IPv4,IPv6, ATM, Frame Relay, etc.).[24][25]

VPLS

[edit]

Virtual Private LAN Service (VPLS) is a virtual private network technology that provides Ethernet-based multipoint-to-multipoint communication overIP orMPLS networks. It allows geographically dispersed sites to share an Ethernetbroadcast domain by connecting sites (including both servers and clients) throughpseudowires.[26] The technologies that can be used as pseudo-wire can beEthernet over MPLS,L2TPv3 or evenGRE. There are twoIETF standards-trackRFCs (RFC 4761 and RFC 4762) describing VPLS establishment. In contrast to L2TPv3, which allows onlypoint-to-pointOSI layer 2 tunnels, VPLS allows any-to-any (multipoint) connectivity.[27][28]

PPVPN

[edit]

Aprovider-provisioned VPN (PPVPN) is a virtual private network (VPN) implemented by a connectivity service provider or large enterprise on a network they operate on their own, as opposed to a "customer-provisioned VPN" where the VPN is implemented by the customer who acquires the connectivity service on top of the technical specificities of the provider.

Protocols

[edit]
The life cycle phases of an IPSec tunnel in a virtual private network

A virtual private network is based on atunneling protocol, and may be combined with othernetwork orapplication protocols to provide additional security and capabilities.

IPSec (1996)

[edit]

Internet Protocol Security (IPsec) is a standards-based security protocol, initially developed by theInternet Engineering Task Force (IETF) forIPv6, and was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[29] It is also widely used withIPv4.

The design of IPSec meets most security goals:availability, integrity, and confidentiality. IPsec uses encryption,encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec is also often supported by network hardware accelerators,[30] which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.[31][32]

IPsec tunnels are set up by theInternet Key Exchange (IKE) protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN but are often combined with theLayer 2 Tunneling Protocol (L2TP) to reuse existing L2TP-related implementations for more flexible authentication features (e.g.Xauth).

IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via theExtensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on3G or4GLTE networks.

TLS/SSL (1999)

[edit]

Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in theOpenVPN project andSoftEther VPN project[33]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (HTTPS) is supported without requiring additional configuration.

OpenSSH (1999)

[edit]

OpenSSH offers VPN tunneling (distinct fromport forwarding) to secure[ambiguous] remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[34] SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.

OpenVPN (2001)

[edit]

OpenVPN is afree and open-source VPN protocol based on the TLS protocol. It supports perfectforward-secrecy, and most modern secure cipher suites, likeAES,Serpent,TwoFish, etc. It is currently[may be outdated as of March 2023] being developed and updated by OpenVPN Inc., anon-profit providing secure VPN technologies.

SSTP (2007)

[edit]

Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transportPoint-to-Point Protocol (PPP) traffic through anSSL/TLS channel.

Wireguard (2015)

[edit]

WireGuard is a protocol. In 2020, WireGuard support was added to both the Linux[35] and Android[36] kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes theCurve25519 protocol forkey exchange andChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share asymmetric key between the client and server.[37]

Other

[edit]

Native and third-party support

[edit]

Desktop, smartphone and other end-user device operating systems usually support configuring remote access VPN from theirgraphical orcommand-line tools.[47][48][49] However, due to the variety of, often non standard, VPN protocols, there exist many third-party applications that implement additional protocols not yet or no longer natively supported by the OS. For instance,Android lacked nativeIPsec IKEv2 support until version 11,[50] and users needed to install third-party apps in order to connect that kind of VPN. Conversely, Windows does not natively support plain IPsec IKEv1 remote access native VPN configuration (commonly used byCisco andFritz!Box VPN solutions).

Network appliances, such as firewalls, often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces often facilitate setting up virtual private networks with a selection of supported protocols. In some cases, like in the open source operating systems devoted to firewalls and network devices (likeOpenWrt,IPFire,PfSense orOPNsense), it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.[citation needed]

Commercial appliances with VPN features based on proprietary hardware or software platforms usually support a consistent VPN protocol across their products, but do not allow customizations outside the use cases they implement. This is often the case for appliances that rely on hardware acceleration of VPNs to provide higher throughput or support a larger number of simultaneously connected users.[citation needed]

Society and culture

[edit]

Individual users

[edit]

In 2025, 1.75 billion people use VPNs. By 2027, this market is projected to grow to $76 billion.[51]

See also

[edit]

References

[edit]
  1. ^"virtual private network".NIST Computer Security Resource Center Glossary.Archived from the original on 2 January 2023. Retrieved2 January 2023.
  2. ^"What Is a VPN? - Virtual Private Network".Cisco.Archived from the original on 31 December 2021. Retrieved5 September 2021.
  3. ^Mason, Andrew G. (2002).Cisco Secure Virtual Private Network. Cisco Press. p. 7.ISBN 978-1-58705-033-6.
  4. ^Peterson, Larry; Davie, Bruce (2000).Computer Networks: A Systems Approach. Singapore: Harcourt Asia.ISBN 978-981-4066-43-3. Retrieved24 May 2025.
  5. ^Anniss, Matthew (2015).Understanding Computer Networks. United States: Capstone.ISBN 978-1-4846-0907-1.
  6. ^Tanenbaum, Andrew S. (2003).Computer Networks (4th ed.).Prentice Hall.
  7. ^"What is VPN Split Tunneling?".Fortinet. Retrieved11 June 2025.
  8. ^"VPN split tunneling".NordVPN.
  9. ^Long, Moe (22 July 2021)."Best VPN for Split Tunneling".Tech Up Your Life. Retrieved21 October 2021.
  10. ^"What is VPN split tunneling? All you need to know".Surfshark. Retrieved11 June 2025.
  11. ^Remote Access VPN and a Twist on the Dangers of Split Tunneling, 10 May 2005, retrieved5 December 2017
  12. ^RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks. sec. 1.1.doi:10.17487/RFC3809.RFC3809.
  13. ^Sowells, Julia (7 August 2017)."Virtual Private Network (VPN): What VPN Is And How It Works".Hackercombat.Archived from the original on 17 June 2022. Retrieved7 November 2021.
  14. ^Cisco Systems, Inc. (2004).Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233.ISBN 978-1-58705-119-7. Retrieved15 February 2013.[...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes calledtrusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised.
  15. ^Phifer, Lisa."Mobile VPN: Closing the Gap"Archived 6 July 2020 at theWayback Machine,SearchMobileComputing.com, 16 July 2006.
  16. ^Willett, Andy."Solving the Computing Challenges of Mobile Officers"Archived 12 April 2020 at theWayback Machine,www.officer.com, May, 2006.
  17. ^Cheng, Roger."Lost Connections"Archived 28 March 2018 at theWayback Machine,The Wall Street Journal, 11 December 2007.
  18. ^Cisco engineers."Dynamic Multipoint IPsec VPNs (Using Multipoint GRE/NHRP to Scale IPsec VPNs)".Cisco. Cisco. Retrieved24 September 2017.
  19. ^Huawei DSVPN Configuration
  20. ^Kurniadi, S. H.; Utami, E.; Wibowo, F. W. (December 2018)."Building Dynamic Mesh VPN Network using MikroTik Router".Journal of Physics: Conference Series.1140 012039.doi:10.1088/1742-6596/1140/1/012039.ISSN 1742-6596.
  21. ^"EVPN Overview - TechLibrary - Juniper Networks".www.juniper.net. Archived fromthe original on 11 May 2017. Retrieved19 December 2019.
  22. ^"Understanding EVPN with VXLAN Data Plane Encapsulation - TechLibrary - Juniper Networks".www.juniper.net. Archived fromthe original on 13 May 2017. Retrieved19 December 2019.
  23. ^Sturt, Robert; Rosencrance, Linda; Scarpati, Jessica (28 March 2023)."What is Multiprotocol Label Switching (MPLS)?".techtarget.com. Retrieved21 July 2025.
  24. ^RFC 3031
  25. ^S. Bryant; P. Pate, eds. (March 2005).Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture. Network Working Group.doi:10.17487/RFC3985.RFC3985.Informational. Updated byRFC 5462.
  26. ^H. Shah (Cisco Systems) (January 2015)."RFC 7436: IP‑Only LAN Service (IPLS)". IETF. Retrieved7 August 2025.
  27. ^Rekhter, Yakov; Kompella, Kireeti (January 2007).Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling (Report). Internet Engineering Task Force.
  28. ^Lasserre, Marc; Kompella, Vach (January 2007).Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling (Report). Internet Engineering Task Force.
  29. ^E. Jankiewicz; J. Loughney; T. Narten (December 2011).IPv6 Node Requirements.Internet Engineering Task Force.doi:10.17487/RFC6434.ISSN 2070-1721.RFC6434.Obsolete. p. 17. Obsoleted byRFC 8504. ObsoletesRFC 4294.Previously, IPv6 mandated implementation of IPsec and recommended the key management approach of IKE. This document updates that recommendation by making support of the IPsec Architecture RFC4301 a SHOULD for all IPv6 nodes.
  30. ^"Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]".Cisco. Retrieved9 July 2024.
  31. ^"VPN overview for Apple device deployment".Apple Support. Retrieved9 July 2024.
  32. ^"About Always On VPN for Windows Server Remote Access".learn.microsoft.com. 22 May 2023. Retrieved9 July 2024.
  33. ^"1. Ultimate Powerful VPN Connectivity".www.softether.org. SoftEther VPN Project.Archived from the original on 8 October 2022. Retrieved8 October 2022.
  34. ^"ssh(1) – OpenBSD manual pages".man.openbsd.org.Archived from the original on 5 July 2022. Retrieved4 February 2018.
  35. ^Salter, Jim (30 March 2020)."WireGuard VPN makes it to 1.0.0—and into the next Linux kernel".Ars Technica.Archived from the original on 31 March 2020. Retrieved30 June 2020.
  36. ^"Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google".android.googlesource.com.Archived from the original on 29 June 2022. Retrieved30 June 2020.
  37. ^Younglove, R. (December 2000)."Virtual private networks - how they work".Computing & Control Engineering Journal.11 (6):260–262.doi:10.1049/cce:20000602 (inactive 12 July 2025).ISSN 0956-3385.{{cite journal}}: CS1 maint: DOI inactive as of July 2025 (link)[dead link]
    • Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol".International Conference on Applied Cryptography and Network Security.ISBN 978-3-319-93386-3.
  38. ^"OpenConnect".Archived from the original on 29 June 2022. Retrieved8 April 2013.OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
  39. ^"Why TCP Over TCP Is A Bad Idea".sites.inka.de.Archived from the original on 6 March 2015. Retrieved24 October 2018.
  40. ^"Trademark Status & Document Retrieval".tarr.uspto.gov.Archived from the original on 21 March 2012. Retrieved8 October 2022.
  41. ^Fuller, Johnray; Ha, John (2002).Red Hat Linux 9: Red Hat Linux Security Guide(PDF). United States:Red Hat, Inc. pp. 48–53.Archived(PDF) from the original on 14 October 2022. Retrieved8 September 2022.
  42. ^Titz, Olaf (20 December 2011)."CIPE - Crypto IP Encapsulation".CIPE - Crypto IP Encapsulation.Archived from the original on 18 May 2022. Retrieved8 September 2022.
  43. ^Titz, Olaf (2 April 2013)."CIPE - encrypted IP in UDP tunneling".SourceForge.Archived from the original on 8 September 2022. Retrieved8 September 2022.
  44. ^Layer Two Tunneling Protocol "L2TP"Archived 30 June 2022 at theWayback Machine,RFC 2661, W. Townsleyet al., August 1999
  45. ^IP Based Virtual Private NetworksArchived 9 July 2022 at theWayback Machine,RFC 2341, A. Valenciaet al., May 1998
  46. ^Point-to-Point Tunneling Protocol (PPTP)Archived 2 July 2022 at theWayback Machine,RFC 2637, K. Hamzehet al., July 1999
  47. ^"Connect to a VPN in Windows - Microsoft Support".support.microsoft.com. Retrieved11 July 2024.
  48. ^"Connect to a virtual private network (VPN) on Android". Retrieved11 July 2024.
  49. ^"VPN settings overview for Apple devices".Apple Support. Retrieved11 July 2024.
  50. ^"IPsec/IKEv2 Library".Android Open Source Project. Retrieved11 July 2024.
  51. ^Hooson, Mark (3 March 2025)."VPN Statistics".Forbes UK. Retrieved19 March 2025.

Further reading

[edit]
Communication protocols
Connection applications
Enterprise software
Risk vectors
VPN Services
Avast
Kape Technologies
McAfee
Tesonet
Ziff Davis
Email clients
Secure
communication
OTR
SSH
TLS & SSL
VPN
ZRTP
P2P
DRA
Disk encryption
(Comparison)
Anonymity
File systems(List)
Security-focused
operating system
Service providers
Educational
Anti–computer forensics
Related topics
Background
Principles
With aproxy server
Without a proxy server
Anti-censorship software
Free software
Proprietary software
Browser extensions
Anonymity
Anonymous software
Anonymous P2P network
Physical circumvention methods
Relevant organizations
Reference
Italics indicates that maintenance of the tool has been discontinued.CategoryCommons
Retrieved from "https://en.wikipedia.org/w/index.php?title=Virtual_private_network&oldid=1323075928"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp