VPN or Virtual Private Network allows user to connect to a private network over the Internet
securely and privately. VPN creates an encrypted connection, and all Internet traffic and
communication is passed through a secure tunnel , keeping the user data secure and private.
Types of VPN protocols
1. Internet Protocol Security or IPSec:
Internet Protocol Security or IPSec is used to secure Internet communication across an
IP network. IPSec secures Internet Protocol communication by authenticating the
session and encrypts each data packet during the connection.
2. Layer 2 Tunneling Protocol (L2TP):
L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined
with another VPN security protocol like IPSec to create a highly secure VPN
connection.
3. Point - to - Point Tunneling Protocol (PPTP) :
PPTP or Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the data
packet. It uses a Point-to-Point Protocol (PPP) to encrypt the data between the
connection.
4. SSL and TLS :
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN
connection where the web browser acts as the client and user access is restricted to
specific applications instead of entire network.Web browsers switch to SSL with ease
and with almost no action required from the user, since web browsers come integrated
with SSL and TLS. SSL connections have https in the beginning of the URL instead of
http.
5. OpenVPN:
OpenVPN is an open source VPN that is useful for creating Point-to-Point and Site-
to-Site connections. It uses a custom security protocol based on SSL and TLS protocol.
6. Secure Shell (SSH):
Secure Shell or SSH creates the VPN tunnel through which the data transfer happens
and also ensures that the tunnel is encrypted.
ConversionConversion EmoticonEmoticon