Ind. Assign.
a) Other VPN Protocols
The different types of VPN protocols include IPsec, SSTP, WireGuard, OpenVPN, SoftEther, PPTP and
L2TP.
Internet Protocol Security (IPsec): It is a set of protocols like any other Internet protocol where its
primary function is to ensure data security, confidentiality, and authentication of origin when
transmitting data between two parties. IPsec operates by encrypting and authenticating all IP packet
transfers. It functions through two main modes: Transport and Tunnel.
Secure Socket Tunneling Protocol (SSTP): This VPN communication protocol was created to
provide safe, encrypted network connections. Secure internet connections are supported by SSL/TLS
encryption, which is also used by SSTP. Data security and privacy during internet transmission are
guaranteed by SSL/TLS encryption. VPN communication is routed across the SSL 3.0 channel by
SSTP.
WireGuard: It is a state-of-the-art VPN protocol notable for its speed and ease of use. With the use
of cutting-edge cryptographic algorithms, WireGuard is intended to be significantly faster and simpler
than conventional protocols. Although WireGuard is an open-source project, its simplified
methodology improves usability and efficiency.
SoftEther: It is a multifaceted VPN protocol recognized for its performance and interoperability. The
protocol operates by establishing secure client-server communication through SSL-VPN Tunneling on
HTTPS. It supports many VPN software within a single VPN server.
Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols available. It facilitates
secure data transmission by establishing a tunnel for point-to-point communication. Developed by
Microsoft, this protocol encapsulates data packets within an IP envelope, enabling secure
transmission across a network.
Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that, on its own, does not provide
encryption or confidentiality. Instead, L2TP relies on an encryption protocol that is transmitted within
the tunnel to ensure privacy. Typically, L2TP is used in combination with IPsec, which offers
encryption and secure data transport between endpoints.
b) Proxy Servers
Proxy servers, also known as proxies, are software servers that manage all communications coming
from or going to the Internet by local clients. The main purpose of proxies is to limit access rather than
provide controlled access from a local computer to a remote computer, thus serving as the
organization's spokespersons or bodyguards. Proxy servers are sometimes referred to as dual-home
systems as they have two network interfaces. In Internal computers a proxy server is referred to as the
gateway and as a mail server or numeric address by external computers. The proxy server receives
requests for web pages from users on internal networks first. After verifying the user and the type of
request, the proxy server sends the request to the Internet. The proxy server receives a web page sent
by an external Internet server first. The web page is sent to the client's desktop via the internal network
web server if it is acceptable.