0% found this document useful (0 votes)
0 views

Individual Assignment 6

The document discusses various VPN protocols, including IPsec, SSTP, WireGuard, SoftEther, PPTP, and L2TP, highlighting their functions, security features, and operational modes. It also explains the role of proxy servers in managing internet communications for local clients, emphasizing their purpose in limiting access and acting as intermediaries between internal networks and the internet. Proxy servers are described as dual-home systems with two network interfaces, facilitating secure and controlled access to web resources.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Individual Assignment 6

The document discusses various VPN protocols, including IPsec, SSTP, WireGuard, SoftEther, PPTP, and L2TP, highlighting their functions, security features, and operational modes. It also explains the role of proxy servers in managing internet communications for local clients, emphasizing their purpose in limiting access and acting as intermediaries between internal networks and the internet. Proxy servers are described as dual-home systems with two network interfaces, facilitating secure and controlled access to web resources.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Ind. Assign.

a) Other VPN Protocols

The different types of VPN protocols include IPsec, SSTP, WireGuard, OpenVPN, SoftEther, PPTP and

L2TP.

 Internet Protocol Security (IPsec): It is a set of protocols like any other Internet protocol where its

primary function is to ensure data security, confidentiality, and authentication of origin when

transmitting data between two parties. IPsec operates by encrypting and authenticating all IP packet

transfers. It functions through two main modes: Transport and Tunnel.

 Secure Socket Tunneling Protocol (SSTP): This VPN communication protocol was created to

provide safe, encrypted network connections. Secure internet connections are supported by SSL/TLS

encryption, which is also used by SSTP. Data security and privacy during internet transmission are

guaranteed by SSL/TLS encryption. VPN communication is routed across the SSL 3.0 channel by

SSTP.

 WireGuard: It is a state-of-the-art VPN protocol notable for its speed and ease of use. With the use

of cutting-edge cryptographic algorithms, WireGuard is intended to be significantly faster and simpler

than conventional protocols. Although WireGuard is an open-source project, its simplified

methodology improves usability and efficiency.

 SoftEther: It is a multifaceted VPN protocol recognized for its performance and interoperability. The

protocol operates by establishing secure client-server communication through SSL-VPN Tunneling on

HTTPS. It supports many VPN software within a single VPN server.

 Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols available. It facilitates

secure data transmission by establishing a tunnel for point-to-point communication. Developed by

Microsoft, this protocol encapsulates data packets within an IP envelope, enabling secure

transmission across a network.

 Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that, on its own, does not provide

encryption or confidentiality. Instead, L2TP relies on an encryption protocol that is transmitted within
the tunnel to ensure privacy. Typically, L2TP is used in combination with IPsec, which offers

encryption and secure data transport between endpoints.


b) Proxy Servers

Proxy servers, also known as proxies, are software servers that manage all communications coming

from or going to the Internet by local clients. The main purpose of proxies is to limit access rather than

provide controlled access from a local computer to a remote computer, thus serving as the

organization's spokespersons or bodyguards. Proxy servers are sometimes referred to as dual-home

systems as they have two network interfaces. In Internal computers a proxy server is referred to as the

gateway and as a mail server or numeric address by external computers. The proxy server receives

requests for web pages from users on internal networks first. After verifying the user and the type of

request, the proxy server sends the request to the Internet. The proxy server receives a web page sent

by an external Internet server first. The web page is sent to the client's desktop via the internal network

web server if it is acceptable.

You might also like