Topc 6 Virtual Private Networks
Topc 6 Virtual Private Networks
A virtual private network (VPN) is a technology that creates a safe and encrypted connection
over a less secure network, such as the internet. A Virtual Private Network is a way to extend a
private network using a public network such as the internet. The name only suggests that it is a
Virtual “private network” i.e. user can be part of a local network sitting at a remote location. It
makes use of tunneling protocols to establish a secure connection.
It allows a user to connect to a private network over the Internet securely and privately. VPN
creates an encrypted connection that is called VPN tunnel, and all Internet traffic and
communication is passed through this secure tunnel.
Features of VPN :
VPN provides plentiful Server location.
It also provides anonymous DNS servers.
VPNs are generally cost-effective.
VPN supports Router.
The VPN is highly encrypted and secure.
Along with VPN, we get secure VPN protocols.
It provides safety against DNS Leak.
The VPN providers also offer Cross-Platform Compatible Apps.
Applications of VPN:
VPN can easily bypass geographic restrictions on websites or streaming audio and video.
Using a VPN, we can protect ourselves from snooping from untrustworthy Wi-Fi
hotspots.
One can gain privacy online by hiding one’s true location.
One can protect themselves from being logged while torrenting.
WHATS HIDDEN BY VPN
User’s Browsing History
User’s IP address and location
User’s location for streaming
User’s device
User’s web activity
Disadvantages of VPN :
It can Slow down the Internet Speed.
It has Privacy Issues.
It might be Connection droppings while you will be connected over VPN.
It might have Configuration difficulties.
It has Legality Issues.
TYPES OF VPN
1. Remote Access VPN
Remote Access VPN permits a user to connect to a private network and access all its services
and resources remotely. The connection between the user and the private network occurs through
the Internet and the connection is secure and private. Remote Access VPN is useful for home
users and business users both. It embraces the use of NORDVPN.
An employee of a company, while he/she is out of station, uses a VPN to connect to his/her
company’s private network and remotely access files and resources on the private network.
Benefits
Protect against unauthorized users. With a premium remote access VPN, you can
ensure that internal networks and resources can only be reached by users who have
signed into the appropriate VPN client using multi-factor authentication.
Streamline remote access. Teams and workforces are becoming increasingly
decentralized, but with a good remote access VPN, you give all users access to the
resources they need.
Limit the threat of cyberattacks. When employees are working out of office, they are at
greater risk of cyberattacks. If one remote user device is compromised, it could put the
whole network at risk from spear phishing and ransomware attacks. But with NordLayer,
their data will be sent through a secure tunnel, so even if they connect to unsecured Wi-
Fi, they won’t expose their online activity.
Facilitate zero-trust network access. Remote access VPN software can be used as part
of zero-trust network infrastructure, in which employees repeatedly authenticate
themselves in order to access different areas of an organization’s network.
Best remote access for business involves the following
Perimeter 81
Nord layer
Express VPN
Surfshark etc.
2. Site to Site VPN
A Site-to-Site VPN is also called as Router-to-Router VPN and is commonly used in the large
companies. Companies or organizations, with branch offices in different locations, use Site-to-site
VPN to connect the network of one office location to the network at another office location.
Intranet based VPN: When several offices of the same company are connected using Site-
to-Site VPN type, it is called as Intranet based VPN.
Extranet based VPN: When companies use Site-to-site VPN type to connect to the office
of another company, it is called as Extranet based VPN.
3. Cloud VPN
A Cloud VPN is a virtual private network that allows users to securely connect to a cloud-based
infrastructure or service. It uses the internet as the primary transport medium to connect the remote
users to the cloud-based resources. These includes AMAZON, MICROSOFT AZURE
4. Mobile VPN
Mobile VPN is a virtual private network that allows mobile users to securely connect to a private
network, typically through a cellular network. It creates a secure and encrypted connection
between the mobile device and the VPN server, protecting the data transmitted over the connection.
Mobile VPNs can be used to access corporate resources, such as email or internal websites, while
the user is away from the office.
5. SSL VPN
SSL VPN (Secure Sockets Layer Virtual Private Network) is a type of VPN that uses the SSL
protocol to secure the connection between the user and the VPN server. It allows remote users to
securely access a private network by establishing an encrypted tunnel between the user’s device
and the VPN server. SSL VPNs are typically accessed through a web browser, rather than through
a standalone client.
6. PPTP (Point-to-Point Tunneling Protocol) VPN
PPTP (Point-to-Point Tunneling Protocol) is a type of VPN that uses a simple and fast method for
implementing VPNs. It creates a secure connection between two computers by encapsulating the
data packets being sent between them.
7. OpenVPN
OpenVPN is an open-source software application that uses SSL and is highly configurable and
secure. It creates a secure and encrypted connection between two computers by encapsulating the
data packets being sent between them. OpenVPN can be used to access internal resources such as
email, file servers, or databases.
Types of Virtual Private Network (VPN) Protocols:
1. Internet Protocol Security (IPSec): Internet Protocol Security, known as IPSec, is used
to secure Internet communication across an IP network. IPSec secures Internet Protocol
communication by verifying the session and encrypts each data packet during the
connection. IPSec runs in 2 modes:
Transport mode
Tunneling mode
2. Layer 2 Tunneling Protocol (L2TP): L2TP or Layer 2 Tunneling Protocol is a tunneling
protocol that is often combined with another VPN security protocol like IPSec to establish
a highly secure VPN connection. L2TP generates a tunnel between two L2TP connection
points and IPSec protocol encrypts the data and maintains secure communication between
the tunnel.
3. Point–to–Point Tunneling Protocol (PPTP): PPTP or Point-to-Point Tunneling Protocol
generates a tunnel and confines the data packet. Point-to-Point Protocol (PPP) is used to
encrypt the data between the connection. PPTP is one of the most widely used VPN
protocol and has been in use since the early release of Windows. PPTP is also used on Mac
and Linux apart from Windows.
4. SSL and TLS: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) generate
a VPN connection where the web browser acts as the client and user access is prohibited
to specific applications instead of entire network. Online shopping websites commonly
uses SSL and TLS protocol. It is easy to switch to SSL by web browsers and with almost
no action required from the user as web browsers come integrated with SSL and TLS. SSL
connections have “https” in the initial of the URL instead of “http”.
5. Secure Shell (SSH): Secure Shell or SSH generates the VPN tunnel through which the
data transfer occurs and also ensures that the tunnel is encrypted. SSH connections are
generated by a SSH client and data is transferred from a local port on to the remote server
through the encrypted tunnel.
6. SSTP (Secure Socket Tunneling Protocol): A VPN protocol developed by Microsoft
that uses SSL to secure the connection, but only available for Windows.
7. IKEv2 (Internet Key Exchange version 2): A VPN protocol that provides fast and
secure connections, but not widely supported by VPN providers.
8. OpenVPN: An open-source VPN protocol that is highly configurable and secure, widely
supported by VPN providers and considered one of the most secure VPN protocols.
9. WireGuard: A relatively new and lightweight VPN protocol that aims to be faster,
simpler and more secure than existing VPN protocols.
VPN TOOLS
Algo
Algo was designed from the bottom up to create VPNs for corporate travelers who need a secure
proxy to the internet. It “includes only the minimal software you need,” meaning you sacrifice
extensibility for simplicity. Algo is based on StrongSwan but cuts out all the things that you
don’t need, which has the added benefit of removing security holes that a novice might otherwise
not notice.
Algo is probably the easiest and fastest VPN to set up and deploy on this list. It’s extremely tidy
and well thought out. If you don’t need any of the more advanced features offered by other tools
and just need a secure proxy, it’s a great option. Note that Algo explicitly states it’s not meant for
geo-unblocking or evading censorship, and was primarily designed for confidentiality.
OpenVPN
OpenVPN requires both client and server applications to set up VPN connections using the
protocol of the same name. OpenVPN can be tweaked and customized to fit your needs, but it
also requires the most technical expertise of the tools covered here. Both remote access and site-
to-site configurations are supported; the former is what you’ll need if you plan on using your
VPN as a proxy to the internet. Because client apps are required to use OpenVPN on most
devices, the end user must keep them updated.
Softether tool
SoftEther supports the OpenVPN, L2TP, SSTP, and EtherIP protocols, but its own SoftEther
protocol claims to be able to be immunized against deep packet inspection thanks to “Ethernet
over HTTPS” camouflage. SoftEther also makes a few tweaks to reduce latency and increase
throughput. Additionally, SoftEther includes a clone function that allows you to easily transition
from OpenVPN to SoftEther.