Tuesday 21 April 2020

VPN USE PROTOCOL (Protocol for virtual privet network)

Types of Virtual Private Network (VPN) Protocols:
1. Internet Protocol Security (IPSec) :                         
 Internet Protocol Security, known as IPSec, is used to secure Internet communication across an IP network. IPSec secures Internet Protocol communication by verifying the session and encrypts each data packet during the connection.

IPSec runs in 2 modes:
  1.  Turnaling mode ( Tunneling mode encrypts the whole data packet)
  2.  Transport mode (Transport mode is to encrypt the message in the data packet)
 IPSec can also be used with other security protocols to improve the security system.

2. Layer 2 Tunneling Protocol (L2TP) :

L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is often combined with another VPN security protocol like IPSec to establish a highly secure VPN connection. 
L2TP generates a tunnel between two L2TP connection points and IPSec protocol encrypts the data and maintains secure communication between the tunnel.

3. Point–to–Point Tunneling Protocol (PPTP): 


PPTP Protocol generates a tunnel and confines the data packet. 
Point-to-Point Protocol (PPP) is used to encrypt the data between the connection.  
PPTP is one of the most widely used VPN protocol and has been in use since the early release of Windows. 
PPTP is also used on Mac and Linux apart from Windows.

 4. OpenVPN :

OpenVPN is an open source protocol that allows developers access to its underlying code.
This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm.
TL;DR: open source, strongest encryption, slower speeds

5. SSTP

Secure Socket Tunneling Protocol is popular due to its full integration with every Microsoft operating system since Windows Vista SP 1.
SSTP utilizes 2048-bit SSL/TLS certificates for authentication and 256-bit SSL keys for encryption. The biggest drawback to SSTP is that is basically a Microsoft-developed proprietary protocol and developers do not have access to the underlying code.
TL;DR: good security, difficult to block and detect, great support for native and third party clients

6.IKEV2

Internet Key Exchange version 2 is a common VPN tunneling protocol that provides a secure key exchange session. Similar to L2TP (and IKEv1), IKEv2 is normally paired with IPsec for encryption and authentication. This protocol is very good at re-establishing the link after temporary connection loss and excels at switching connections across network types (from WiFi to cellular, for example).
TL;DR: fast, mobile friendly, network switching capabilities, open source options, great support for native and third party clients



No comments:

Post a Comment

Ftx Crash

 RUMEAR SAAY THIS HACKE IS  CREATE BY FTX                                                                                                   ...