Individual Assignment 6
Individual Assignment 6
The different types of VPN protocols include IPsec, SSTP, WireGuard, OpenVPN, SoftEther, PPTP and
L2TP.
Internet Protocol Security (IPsec): It is a set of protocols like any other Internet protocol where its
primary function is to ensure data security, confidentiality, and authentication of origin when
transmitting data between two parties. IPsec operates by encrypting and authenticating all IP packet
Secure Socket Tunneling Protocol (SSTP): This VPN communication protocol was created to
provide safe, encrypted network connections. Secure internet connections are supported by SSL/TLS
encryption, which is also used by SSTP. Data security and privacy during internet transmission are
guaranteed by SSL/TLS encryption. VPN communication is routed across the SSL 3.0 channel by
SSTP.
WireGuard: It is a state-of-the-art VPN protocol notable for its speed and ease of use. With the use
SoftEther: It is a multifaceted VPN protocol recognized for its performance and interoperability. The
Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols available. It facilitates
Microsoft, this protocol encapsulates data packets within an IP envelope, enabling secure
Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that, on its own, does not provide
encryption or confidentiality. Instead, L2TP relies on an encryption protocol that is transmitted within
the tunnel to ensure privacy. Typically, L2TP is used in combination with IPsec, which offers
Proxy servers, also known as proxies, are software servers that manage all communications coming
from or going to the Internet by local clients. The main purpose of proxies is to limit access rather than
provide controlled access from a local computer to a remote computer, thus serving as the
systems as they have two network interfaces. In Internal computers a proxy server is referred to as the
gateway and as a mail server or numeric address by external computers. The proxy server receives
requests for web pages from users on internal networks first. After verifying the user and the type of
request, the proxy server sends the request to the Internet. The proxy server receives a web page sent
by an external Internet server first. The web page is sent to the client's desktop via the internal network