心虚吃什么补最快| 角膜炎吃什么消炎药| 透析是什么原理| o型血和o型血生的孩子是什么血型| 孕妇吃什么鱼对胎儿好| 绛紫色是什么颜色| S是什么牌子鞋| 三观是什么| 拉屎有血是什么原因| 什么星球最大| 梦见吃蜂蜜是什么预兆| 大陆对什么| 伶人是什么意思| 自嘲是什么意思| 君无戏言什么意思| 女人血稠吃什么食物好| 为什么会长痘痘| 梦见水果是什么意思| 有气质是什么意思| 晚上剪指甲有什么禁忌| 今日农历是什么日子| 缺铁吃什么药| 献血前吃什么东西最好| 小孩吃牛肉有什么好处| 金玉其外败絮其中是什么意思| 三伏天喝什么汤最好| 睚眦必报是什么意思| 肾结晶是什么意思| 电解质饮料有什么作用| 指甲盖有竖纹是什么原因| 什么鞋不能穿| 妈妈的奶奶叫什么| 查肾功能挂什么科| 山根有痣代表什么| 耳鸣是什么病引起的| 择日不如撞日什么意思| 红枣桂圆泡水喝有什么好处和坏处| 体癣是什么原因引起的| 预调酒是什么意思| 奥美拉唑治什么胃病| 阴道镜活检是什么意思| 流金铄石是什么意思| 大人退烧吃什么药| pcr是什么意思| 尿液突然变深褐色是什么原因| 被电击后身体会有什么后遗症| 乙肝全是阴性是什么意思| 一什么铃铛| 经常反义词是什么| 什么叫穿刺| lh是什么意思| 蛋白质是由什么组成的| 吃什么可以回奶| 5.2号是什么星座| 男人精液少是什么原因| 啤酒为什么是苦的| 太岁是什么东西| 夏天脸上皮肤痒是什么原因| 5D电影是什么效果| 为什么膝盖弯曲就疼痛| 50岁女人出轨为了什么| 睡觉总是做梦是什么原因| 眩晕是什么原因引起的| 女人右下巴有痣代表什么| 农历十二月是什么月| 9月10日是什么日子| 喝酒后吃什么解酒最快| 梦见别人怀孕是什么意思| 水分是什么意思| 什么气组词| 头皮发麻是什么原因| 核磁是检查什么的| 女人吃什么补气血| trp是什么氨基酸| 股癣用什么药最好| 负距离接触是什么意思| 班禅是什么级别| 玻璃是什么做的| 左手发麻什么原因| 擦边球是什么意思| 一什么草坪| 螺内酯片是什么药| 香仪是什么意思| 偶数和奇数是什么意思| 脸上起红疙瘩是什么原因| 物竞天择什么意思| 脚没有力气是什么原因| 孕晚期吃什么好| 雪花飘飘北风萧萧是什么歌| 五月二十六是什么星座| 刮痧用什么油刮最好| 口是心非是什么动物| tony是什么意思| 非钙化斑块是什么意思| 眼底出血是什么原因| 小粉是什么粉| 舌头灼热感是什么原因| 吃什么油最健康排行榜| cct是什么意思| 什么是扁平疣图片| 空腹血糖高吃什么药| 硅胶是什么材质| 表示什么意思| 月相是什么意思| 什么动物没有眼睛| 埃及的母亲河是什么| 血糖高吃什么水果最好| 反射弧是什么意思| 孕妇梦见摘桃子是什么意思| 自学成才是什么意思| 鸣字五行属什么| 21速和24速有什么区别| 颈动脉彩超查什么| petct是什么检查| 漏尿是什么原因造成的| 什么水果养胃又治胃病| 什么东西止血最快最好| 打豆浆用什么豆子| 西地那非有什么副作用| 七月十四日是什么节日| 投资什么好| 乳果糖是什么| 出淤泥而不染是什么花| 血常规五项能检查出什么病| 眩晕挂什么科室| 眼角有眼屎是什么原因| 生肖本命带红花是什么生肖| 吃什么清理血管| 为什么会堵奶| 分娩是什么意思| 做梦梦到蟒蛇是什么征兆| 吃什么东西容易消化| 哮天犬是什么狗| 丁克什么意思| 开塞露用多了有什么副作用| 甘油三酯高应该注意什么| 狗狗感冒了是什么症状| 皮牙子是什么意思| 飞行模式有什么用| 家父是什么意思| 鱼肉百姓什么意思| 区长什么级别| 前列腺炎吃什么中成药| 王字旁的字与什么有关| 境遇是什么意思| 赖氨酸是什么| 孩子a型血父母什么血型| 女人人中深代表什么| 什么是熊猫血型| 身体发麻是什么原因| 精子是什么味道的| 什么是六道轮回| 心口疼是什么原因引起的| cop是什么意思| aml是什么意思| 过堂是什么意思| 路人甲什么意思| 高血压中医叫什么病| 咳嗽吃什么好| 内风湿是什么原因引起的| 圆脸适合什么发型男| 人生格言是什么| 胰腺炎吃什么中成药| 倾诉是什么意思| 3月10日是什么星座| 一面之词是什么意思| 胃息肉是什么症状| 三油甘脂是什么| 流鼻血是什么病的前兆| 天癸是什么意思| 为什么医院不推荐钡餐检查| 大长今是什么意思| 皮可以加什么偏旁| 子宫前位是什么意思| 月经是黑色的是什么原因| 支原体感染咳嗽吃什么药| 优生优育是什么意思| 吃香菜有什么好处| 为什么胸会痒| 指甲发白是什么原因| 绝经三年了突然又出血了什么原因| 性质是什么意思| 什么是直径| 田园生活是什么意思| 有什么别有病| 钡餐是什么| 喝什么饮料解酒| 地钱是什么植物| 反流性食管炎吃什么药好| 看脑部挂什么科| 什么水果可以减肥刮油脂| 五月是什么季节| 吃什么减肥快| 测血型挂什么科| 华盖是什么意思| 大腿内侧发黑是什么原因| 打摆子是什么病| 孕囊长什么样| 牛肉补什么| 胸口有痣代表什么意思| 舌苔厚白湿气重吃什么药| 龋牙是什么意思| 什么的事物| 玉和玉髓有什么区别| 孕中期宫缩是什么感觉| 民政局是干什么的| 胸闷气短是什么原因造成的| 耳垂长痘痘是什么原因| 人工虎骨粉是什么做的| 什么叫肾阴虚| 96年属什么的生肖| 6.22什么星座| 脚后跟疼痛什么原因| 口蘑不能和什么一起吃| 乳酸杆菌大量是什么意思| 为什么老是掉头发特别厉害| 住院需要带什么东西| 知我者莫若你什么意思| 晚上尿多是什么病| 瞳距是什么| 面部发红是什么原因| 10月11日是什么星座| 健康证需要什么材料| 自然卷的头发适合什么发型| 咳嗽可以吃什么| 血虚肝旺有什么症状有哪些| 验精挂什么科室| 尿素是什么| 指甲扁平是什么原因| 粉皮是什么做的| 感觉心慌是什么原因| 什么是肠漏| 检查骨头做什么检查| 中药什么时候喝效果最好| 螳螂捕蝉什么意思| 公立医院是什么意思| 甘心的近义词是什么| 痴男怨女是什么意思| 举牌是什么意思| 胸闷挂什么科室| 周围型肺ca是什么意思| 腰疼吃什么药效果好| 什么是短语| 北京西单附近有什么好玩的| 170是什么尺码| 眼肿是什么原因引起的| 三伏天什么意思| 入伏吃羊肉有什么好处| 甜瓜什么时候成熟| 什么叫双开| sanag是什么牌子| 剪短发什么发型好看| 午时右眼跳是什么预兆| 禅悟是什么意思| 为什么吃西瓜会拉肚子| 戾气什么意思| 83年属猪是什么命| 十月二十三号是什么星座| 雨中漫步是什么意思| 什么驴技穷成语| 4月19号是什么星座| 脾虚吃什么药效果最好| 白细胞高是什么意思| 高血压是什么意思| 百度Jump to content

白宫发第一夫人肖像定妆照 过度粉饰引发争议

From Wikipedia, the free encyclopedia
(Redirected from VPN)
百度 目前,国内舆论有关对美国大豆、汽车、飞机和芯片等重要出口产品采取措施的呼声已经很多,但是政府尚未正式出手,显然给贸易战的降温留下了充足的谈判空间和筹码。

Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]

A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.

It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.[3]

The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.

Motivation

[edit]

The goal of a virtual private network is to allow network hosts to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network transparent to network applications. Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.

In the case of a provider-provisioned VPN, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in VLAN).

Operation

[edit]

How a VPN works depends on which technologies and protocols the VPN is built upon. A tunneling protocol is used to transfer the network messages from one side to the other. The goal is to take network messages from applications on one side of the tunnel and replay them on the other side. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS.

Applications that do implement tunneling or proxying features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may achieve the same or similar end-user goal of exchanging private contents with a remote network.

Topology

[edit]
VPN classification tree based on the topology first, then on the technology used
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together

Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:

Remote access
A host-to-network configuration is analogous to joining one or more computers to a network to which they cannot be directly connected. This type of extension provides that computer access to local area network of a remote site, or any wider enterprise networks, such as an intranet. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for remote workers, or to enable people accessing their private home or company resources without exposing them on the public Internet. Remote access tunnels can be either on-demand or always-on. Because the remote host location is usually unknown to the central network until the former tries to reach it, proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing.
Site-to-site
A site-to-site configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between gateway devices located at each network location. These devices then make the tunnel available to other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarters or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other.

In the context of site-to-site configurations, the terms intranet and extranet are used to describe two different use cases.[4] An intranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an extranet site-to-site VPN joins sites belonging to multiple organizations.

Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for business-to-business, cloud computing, and branch office scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined.

Apart from the general topology configuration, a VPN may also be characterized by:

  • the tunneling protocol used to tunnel the traffic,
  • the tunnel's termination point location, e.g., on the customer edge or network-provider edge,
  • the security features provided,
  • the OSI layer they present to the connecting network, such as Layer 2 link/circuit or Layer 3 network connectivity,
  • the number of simultaneous allowed tunnels,
  • the relationship between the actor implementing the VPN and the network infrastructure provider, and whether the former trusts the medium of the former or not

A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.

Native and third-party support

[edit]

Operating systems vendors and developers do typically offer native support to a selection of VPN protocols. These are subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and others have emerged.

Support in consumer operating systems

[edit]

Desktop, smartphone and other end-user device operating systems usually support configuring remote access VPN from their graphical or command-line tools.[5][6][7] However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no longer natively supported by the OS.

For instance, Android lacked native IPsec IKEv2 support until version 11,[8] and users needed to install third-party apps in order to connect that kind of VPN. Conversely, Windows does not natively support plain IPsec IKEv1 remote access native VPN configuration (commonly used by Cisco and Fritz!Box VPN solutions).

Support in network devices

[edit]

Network appliances, such as firewalls, often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces often facilitate setting up virtual private networks with a selection of supported protocols. In some cases, like in the open source operating systems devoted to firewalls and network devices (like OpenWrt, IPFire, PfSense or OPNsense) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.

Commercial appliances with VPN features based on proprietary hardware or software platforms usually support a consistent VPN protocol across their products, but do not allow customizations outside the use cases they implement. This is often the case for appliances that rely on hardware acceleration of VPNs to provide higher throughput or support a larger number of simultaneously connected users.

Security mechanisms

[edit]

Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:

VPN are not intended to make connecting users anonymous or unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide those confidentiality features, their usage can increase user privacy by making the untrusted medium owner unable to access the private data exchanged across the VPN.

Authentication

[edit]

In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable authentication of connecting parties. This secures the joined remote network confidentiality, integrity and availability.

Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a web captive portal).

Remote-access VPNs, which are typically user-initiated, may use passwords, biometrics, two-factor authentication, or other cryptographic methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.

Site-to-site VPNs often use passwords (pre-shared keys) or digital certificates. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator.

Protocols

[edit]
The life cycle phases of an IPSec tunnel in a virtual private network

A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.

  • Internet Protocol Security (IPsec) was initially developed by the Internet Engineering Task Force (IETF) for IPv6, and was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[9] This standards-based security protocol is also widely used with IPv4. Its design meets most security goals: availability, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by Internet Key Exchange (IKE) protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the Layer 2 Tunneling Protocol (L2TP). Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g. Xauth), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on 3G or 4G LTE networks. IPsec is also often supported by network hardware accelerators,[10] which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.[11][12]
  • Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project and SoftEther VPN project[13]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (HTTPS) is supported without special extra configurations,
  • Datagram Transport Layer Security (DTLS) – used in Cisco AnyConnect VPN and in OpenConnect VPN[14] to solve the issues TLS has with tunneling over TCP (SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts[15]).
  • Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms.
  • Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL/TLS channel (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1).
  • Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".[relevant?][16]
  • Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port forwarding) to secure[ambiguous] remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[17] SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.
  • WireGuard is a protocol. In 2020, WireGuard support was added to both the Linux[18] and Android[19] kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.[20]
  • OpenVPN is a free and open-source VPN protocol based on the TLS protocol. It supports perfect forward-secrecy, and most modern secure cipher suites, like AES, Serpent, TwoFish, etc. It is currently[may be outdated as of March 2023] being developed and updated by OpenVPN Inc., a non-profit providing secure VPN technologies.
  • Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling IPv4 packets over UDP via encapsulation.[21] CIPE was developed for Linux operating systems by Olaf Titz, with a Windows port implemented by Damion K. Wilson.[22] Development for CIPE ended in 2002.[23]

Trusted delivery networks

[edit]

Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.[24]

From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.[citation needed]

Mobile environments

[edit]

Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points without dropping the secure VPN session or losing application sessions.[28] Mobile VPNs are widely used in public safety where they give law-enforcement officers access to applications such as computer-assisted dispatch and criminal databases,[29] and in other organizations with similar requirements such as field service management and healthcare.[30][need quotation to verify]

Networking limitations

[edit]

A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support broadcast domains; therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported as on a local area network. Variants on VPN such as Virtual Private LAN Service (VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.[31]

See also

[edit]

References

[edit]
  1. ^ "virtual private network". NIST Computer Security Resource Center Glossary. Archived from the original on 2 January 2023. Retrieved 2 January 2023.
  2. ^ "What Is a VPN? - Virtual Private Network". Cisco. Archived from the original on 31 December 2021. Retrieved 5 September 2021.
  3. ^ Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7. ISBN 9781587050336.
  4. ^ RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks. sec. 1.1. doi:10.17487/RFC3809. RFC 3809.
  5. ^ "Connect to a VPN in Windows - Microsoft Support". support.microsoft.com. Retrieved 11 July 2024.
  6. ^ "Connect to a virtual private network (VPN) on Android". Retrieved 11 July 2024.
  7. ^ "VPN settings overview for Apple devices". Apple Support. Retrieved 11 July 2024.
  8. ^ "IPsec/IKEv2 Library". Android Open Source Project. Retrieved 11 July 2024.
  9. ^ E. Jankiewicz; J. Loughney; T. Narten (December 2011). IPv6 Node Requirements. Internet Engineering Task Force. doi:10.17487/RFC6434. ISSN 2070-1721. RFC 6434. Obsolete. p. 17. Obsoleted by RFC 8504. Obsoletes RFC 4294. Previously, IPv6 mandated implementation of IPsec and recommended the key management approach of IKE. This document updates that recommendation by making support of the IPsec Architecture RFC4301 a SHOULD for all IPv6 nodes.
  10. ^ "Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]". Cisco. Retrieved 9 July 2024.
  11. ^ "VPN overview for Apple device deployment". Apple Support. Retrieved 9 July 2024.
  12. ^ "About Always On VPN for Windows Server Remote Access". learn.microsoft.com. 22 May 2023. Retrieved 9 July 2024.
  13. ^ "1. Ultimate Powerful VPN Connectivity". www.softether.org. SoftEther VPN Project. Archived from the original on 8 October 2022. Retrieved 8 October 2022.
  14. ^ "OpenConnect". Archived from the original on 29 June 2022. Retrieved 8 April 2013. OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
  15. ^ "Why TCP Over TCP Is A Bad Idea". sites.inka.de. Archived from the original on 6 March 2015. Retrieved 24 October 2018.
  16. ^ "Trademark Status & Document Retrieval". tarr.uspto.gov. Archived from the original on 21 March 2012. Retrieved 8 October 2022.
  17. ^ "ssh(1) – OpenBSD manual pages". man.openbsd.org. Archived from the original on 5 July 2022. Retrieved 4 February 2018.
  18. ^ Salter, Jim (30 March 2020). "WireGuard VPN makes it to 1.0.0—and into the next Linux kernel". Ars Technica. Archived from the original on 31 March 2020. Retrieved 30 June 2020.
  19. ^ "Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google". android.googlesource.com. Archived from the original on 29 June 2022. Retrieved 30 June 2020.
  20. ^ Younglove, R. (December 2000). "Virtual private networks - how they work". Computing & Control Engineering Journal. 11 (6): 260–262. doi:10.1049/cce:20000602 (inactive 12 July 2025). ISSN 0956-3385.{{cite journal}}: CS1 maint: DOI inactive as of July 2025 (link)[dead link]
    • Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol". International Conference on Applied Cryptography and Network Security. ISBN 978-3-319-93386-3.
  21. ^ Fuller, Johnray; Ha, John (2002). Red Hat Linux 9: Red Hat Linux Security Guide (PDF). United States: Red Hat, Inc. pp. 48–53. Archived (PDF) from the original on 14 October 2022. Retrieved 8 September 2022.
  22. ^ Titz, Olaf (20 December 2011). "CIPE - Crypto IP Encapsulation". CIPE - Crypto IP Encapsulation. Archived from the original on 18 May 2022. Retrieved 8 September 2022.
  23. ^ Titz, Olaf (2 April 2013). "CIPE - encrypted IP in UDP tunneling". SourceForge. Archived from the original on 8 September 2022. Retrieved 8 September 2022.
  24. ^ Cisco Systems, Inc. (2004). Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233. ISBN 9781587051197. Retrieved 15 February 2013. [...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes called trusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised.
  25. ^ Layer Two Tunneling Protocol "L2TP" Archived 30 June 2022 at the Wayback Machine, RFC 2661, W. Townsley et al., August 1999
  26. ^ IP Based Virtual Private Networks Archived 9 July 2022 at the Wayback Machine, RFC 2341, A. Valencia et al., May 1998
  27. ^ Point-to-Point Tunneling Protocol (PPTP) Archived 2 July 2022 at the Wayback Machine, RFC 2637, K. Hamzeh et al., July 1999
  28. ^ Phifer, Lisa. "Mobile VPN: Closing the Gap" Archived 6 July 2020 at the Wayback Machine, SearchMobileComputing.com, 16 July 2006.
  29. ^ Willett, Andy. "Solving the Computing Challenges of Mobile Officers" Archived 12 April 2020 at the Wayback Machine, www.officer.com, May, 2006.
  30. ^ Cheng, Roger. "Lost Connections" Archived 28 March 2018 at the Wayback Machine, The Wall Street Journal, 11 December 2007.
  31. ^ Sowells, Julia (7 August 2017). "Virtual Private Network (VPN) : What VPN Is And How It Works". Hackercombat. Archived from the original on 17 June 2022. Retrieved 7 November 2021.

Further reading

[edit]
初心是什么 胃烧心吃什么能缓解 湿吻是什么意思 降压药有什么副作用 小孩脚麻是什么原因
湿热会引起什么症状 什么是无产阶级 giuseppe是什么牌子 青少年长白头发是什么原因 伤口吃什么消炎药
戾气什么意思 痛风是什么 紫茉莉什么时候开花 结石什么原因引起的 关心则乱是什么意思
tsh代表什么 梦见眼镜蛇是什么预兆 2024属什么生肖 感冒冒虚汗是什么原因 甲状腺激素高吃什么药
洋桔梗花语是什么hcv8jop4ns9r.cn 梦见走亲戚是什么意思hcv7jop9ns1r.cn 什么叫强迫症hcv8jop6ns7r.cn 后续是什么意思hcv7jop9ns6r.cn 杨桃什么味道ff14chat.com
嚣张是什么意思beikeqingting.com 欲钱知吃月饼是什么生肖aiwuzhiyu.com 接风是什么意思hcv9jop2ns5r.cn 西替利嗪是什么药hcv8jop3ns8r.cn 探索是什么意思hcv7jop9ns9r.cn
月经推迟是什么原因导致的hcv8jop7ns0r.cn 右下腹疼挂什么科xjhesheng.com 小马拉大车什么意思hcv9jop1ns4r.cn 区委副书记是什么级别xinjiangjialails.com 苹果是什么季节成熟的hcv9jop2ns8r.cn
帝加口念什么hcv9jop5ns8r.cn 炖牛肉放什么调料好吃hcv8jop7ns1r.cn 派特ct主要检查什么hcv9jop5ns3r.cn 内伤湿滞什么意思hcv9jop5ns0r.cn 什么地睡觉jasonfriends.com
百度