Types of Virtual Private Network (VPN) Protocols:
1. Internet Protocol Security (IPSec) :
IPSec runs in 2 modes:
1. Internet Protocol Security (IPSec) :
Internet Protocol Security, known as IPSec, is used to secure Internet
communication across an IP network. IPSec secures Internet Protocol
communication by verifying the session and encrypts each data packet
during the connection.
- Turnaling mode ( Tunneling mode encrypts the whole data packet)
- Transport mode (Transport mode is to encrypt the message in the data packet)
2. Layer 2 Tunneling Protocol (L2TP) :
L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is often
combined with another VPN security protocol like IPSec to establish a
highly secure VPN connection.
L2TP generates a tunnel between two L2TP connection points and IPSec
protocol encrypts the data and maintains secure communication between
the tunnel.
3. Point–to–Point Tunneling Protocol (PPTP):
PPTP Protocol generates a tunnel and confines the data packet.
Point-to-Point Protocol (PPP) is used to encrypt the data between the connection.
PPTP is one of the most widely used VPN protocol and has been in use since the early release of Windows.
PPTP is also used on Mac and Linux apart from Windows.
This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm.
TL;DR: open source, strongest encryption, slower speeds
4. OpenVPN :
OpenVPN is an open source protocol that allows developers access to its underlying code.This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm.
TL;DR: open source, strongest encryption, slower speeds
5. SSTP
Secure Socket Tunneling Protocol is popular due to its full integration
with every Microsoft operating system since Windows Vista SP 1.
SSTP utilizes 2048-bit SSL/TLS certificates for authentication and
256-bit SSL keys for encryption. The biggest drawback to SSTP is that is
basically a Microsoft-developed proprietary protocol and developers do
not have access to the underlying code.
TL;DR: good security, difficult to block and detect, great support for native and third party clients
TL;DR: good security, difficult to block and detect, great support for native and third party clients
6.IKEV2
Internet Key Exchange version 2 is a common VPN tunneling protocol
that provides a secure key exchange session. Similar to L2TP (and
IKEv1), IKEv2 is normally paired with IPsec for encryption and
authentication. This protocol is very good at re-establishing the link
after temporary connection loss and excels at switching connections
across network types (from WiFi to cellular, for example).
TL;DR: fast, mobile friendly, network switching capabilities, open
source options, great support for native and third party clients
No comments:
Post a Comment