手麻脚麻吃什么药| 过敏性紫癜是什么原因引起的| 针清是什么| 大便有粘液是什么原因| 五定是什么| 急性上呼吸道感染是什么引起的| 脚背发麻是什么原因引起的| 单字五行属什么| 右眼一直跳是因为什么原因| 怕热出汗多是什么原因| 好逸恶劳什么意思| 碳酸钙d3颗粒什么时候吃最好| 腰椎间盘突出挂什么科| 大红色配什么颜色好看| 高血压看什么科室| 肾阳虚有什么症状男性| 窦性心律过缓什么意思| 降压药什么时候吃比较好| 鸟在家里做窝预示什么| 梦见情人是什么意思啊| 晚上难入睡是什么原因| 最近老坏东西暗示什么| 人言可畏是什么意思| 大黄泡水喝有什么功效| 沼泽地是什么意思| 由可以组什么词| 19岁属什么的生肖| rgp是什么| 脑膜瘤钙化意味着什么| 吃辣椒过敏是什么症状| 梅毒通过什么途径传染| 孟买血型是什么意思| 嘴唇正常颜色是什么样| 上马是什么意思| 母亲吃什么退婴儿黄疸| 窥视是什么意思| 什么是核素| 湖南有什么特产| 1959年属什么| 拉肚子吃什么菜| 脑干堵塞什么症状| 结肠炎吃什么药治疗效果好| 母女丼什么意思| 流浪猫吃什么| 莲叶和荷叶有什么区别| 掉以轻心是什么意思| 月经一直不干净吃什么药| 窦性心动过缓吃什么药| 什么是感恩| 前列腺液是什么东西| 孕妇心率快是什么原因| 咳嗽喝什么| 南无阿弥陀佛什么意思| 手脚热是什么原因| 人为什么会中暑| 秒了是什么意思| 血糖高可以吃什么水果| 大意失荆州是什么意思| 喝豆浆拉肚子什么原因| 生产周期是什么意思| get什么意思| 1996年出生属什么| 疖肿是什么意思| 张良属什么生肖| 扑朔迷离是什么意思| 人彘为什么还能活着| 女人左下巴有痣代表什么| 丘疹性荨麻疹吃什么药| 一个井一个点念什么| 蓓蕾是什么意思| 犹太人是什么| 盐酸苯海索片治什么病| 饴糖是什么糖| 千娇百媚是什么意思| 芥末是什么味道| 三点水加一个心读什么| 酷的意思是什么| 吃什么避孕药可以推迟月经| 什么的故事填空| 1943年属羊的是什么命| 胎盘成熟度1级是什么意思| 经常出鼻血是什么原因| 下焦湿热是什么意思| 舌头发白吃什么药好| rap什么意思| 喝什么可以减肥瘦肚子| 1212是什么星座| 馒头逼是什么意思| 维生素C起什么作用| 肿瘤和囊肿有什么区别| dady是什么意思| 天使综合征是什么病| 肾阴虚吃什么食物补| 阑尾炎手术后可以吃什么水果| 羽字五行属什么的| 2018年生肖属什么| 答辩是什么意思| 耳垂长痘痘是什么原因| 十月初七是什么星座| 男扮女装是什么意思| 獭尾肝是什么病| 核磁是检查什么的| 红烧肉是什么菜系| 男人练臀桥有什么用| 柱镜是什么| 催乳素高是什么原因| 手胶是什么| 小孩便秘吃什么食物好| 宝宝吐奶是什么原因| cindy是什么意思| cd56阳性是什么意思| neighborhood什么意思| emba是什么意思| 老豆腐和嫩豆腐有什么区别| 阴唇是什么颜色| 心电图异常q波是什么意思| ct什么意思| 眼球出血是什么原因引起的| saucony是什么品牌| vs是什么牌子| 徘徊是什么意思| 麦粒肿吃什么消炎药| 鼻涕有血丝是什么原因| 00年是什么命| 肋骨痛挂什么科| 痰饮是什么意思| 才华横溢是什么生肖| 胸口出汗是什么原因| 木字旁加差是什么字| 嗜碱性粒细胞比率偏高说明什么| 990金是什么金| 有痔疮不能吃什么食物| 高铁和地铁有什么区别| 甘油三酯高是什么原因引起的| 象是什么结构| 彤五行属什么| 感冒吃什么恢复快| touch是什么意思| 金风玉露是什么意思| 膝盖疼痛是什么原因| 老年人腿无力是什么原因导致的| 什么水果榨汁好喝| 边缘性人格障碍是什么| 2002年出生属什么| 哺乳期吃什么食物好| 可望不可求是什么意思| ng是什么单位| 吃什么水果能变白| 橘白猫是什么品种| 壬午是什么生肖| 耿耿于怀是什么意思| 5.25是什么星座| r是什么牌子衣服| 年轮稀疏的一面是什么方向| 南瓜什么颜色| 菲拉格慕属于什么档次| 为什么女生| 赢弱什么意思| 扁桃体发炎是什么症状| 脱式计算是什么意思| 胆固醇偏高是什么原因| 刘璋和刘备什么关系| 骨膜炎吃什么药| 糖化血红蛋白是检查什么的| 一花一草一世界的下一句是什么| 荷花什么时候种植| 不知道叫什么名字好| 县政府党组成员什么级别| 一动就出汗是什么原因| 机油用什么能洗掉| 细菌高是什么原因| 心脏不好挂什么科| 阴道炎用什么药| acd是什么意思| 绮罗是什么意思| 88年的属什么生肖| 5月份出生的是什么星座| 风信子的花语是什么| 此贝是什么字| 什么大什么粗| 同好是什么意思| 正能量是什么意思| 躺枪是什么意思| 常规血检能查出什么| 减脂是什么意思| 爱到什么时候| 土耳其说什么语言| 真丝棉是什么面料| 48年属什么| 树懒是什么动物| 女命七杀代表什么| 阑尾炎输液输什么药| 心跳和心率有什么区别| 尿蛋白质阳性是什么意思| 维生素是什么| 气节是什么意思| 为什么的拼音| 偏光镜片是什么意思| 医生五行属什么| 雾化是治疗什么的| 抗体和抗原有什么区别| 倒反天罡是什么意思| 伤口愈合慢是什么原因| 10.1什么星座| 吃什么能让肠道蠕动快| 手术室为什么在三楼| 双子座是什么象| 心脏有个小洞叫什么病| 淋巴结肿大用什么药| 什么是偏光镜| 手经常发麻是什么原因| 三七泡酒有什么功效| 发烧头疼吃什么药| 梦见自己换衣服是什么意思| 女性尿道炎挂什么科| 神经衰弱吃什么药好| 这是什么植物| 蓝莓有什么作用| 维生素b族什么时候吃| 区团委书记是什么级别| 草莓是什么植物| 支原体是什么意思| 家里有蜈蚣是什么原因| 身体有异味是什么原因| 为什么一照相脸就歪了| 天葬是什么| 观音菩萨是保佑什么的| 腰两边疼是什么原因| 折耳猫什么颜色最贵| 后背沉重感是什么原因引起的| 张飞穿针歇后语下一句是什么| 保底工资是什么意思| 肝实质回声欠均匀是什么意思| 痤疮用什么药膏| 弯是什么意思| 心什么神什么| 零和游戏是什么意思| 梦见掉了两颗牙齿是什么意思| 为什么胆固醇高| 阴性什么意思| 梦见骑自行车是什么意思| 女人做梦哭醒预示什么| 陈宝国的儿子叫什么| 一什么雨伞| 过期的啤酒能干什么| 金丝雀是什么意思| 平日是什么意思| 牛油果吃了有什么好处| 隐匿是什么意思| 慢性浅表性胃炎伴糜烂吃什么药| 昊字五行属什么| 左脸长痘是什么原因| 碧色是什么颜色| 跑步大腿痒是什么原因| 小孩感冒吃什么饭菜比较好| 乳腺增生吃什么| 枸杞补什么| 松香有毒吗对人体有什么危害| 吃中药为什么要忌口| 条件致病菌是什么意思| 铁蛋白高是什么意思| hbeab阳性是什么意思| 鬼打墙什么意思| 什么是果糖| 百度Jump to content

《水形物语》今天上映 市场表现还要看观众接受度

From Wikipedia, the free encyclopedia
百度 双发的生死地图来到inferno,FaZe先做防守方成功拿下手枪局不过很快就被C9完成翻盘双方战成1比1平。

Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]

A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.

It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.[3]

The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.

Motivation

[edit]

The goal of a virtual private network is to allow network hosts to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network transparent to network applications. Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.

In the case of a provider-provisioned VPN, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in VLAN).

Operation

[edit]

How a VPN works depends on which technologies and protocols the VPN is built upon. A tunneling protocol is used to transfer the network messages from one side to the other. The goal is to take network messages from applications on one side of the tunnel and replay them on the other side. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS.

Applications that do implement tunneling or proxying features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may achieve the same or similar end-user goal of exchanging private contents with a remote network.

Topology

[edit]
VPN classification tree based on the topology first, then on the technology used
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together

Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:

Remote access
A host-to-network configuration is analogous to joining one or more computers to a network to which they cannot be directly connected. This type of extension provides that computer access to local area network of a remote site, or any wider enterprise networks, such as an intranet. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for remote workers, or to enable people accessing their private home or company resources without exposing them on the public Internet. Remote access tunnels can be either on-demand or always-on. Because the remote host location is usually unknown to the central network until the former tries to reach it, proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing.
Site-to-site
A site-to-site configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between gateway devices located at each network location. These devices then make the tunnel available to other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarters or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other.

In the context of site-to-site configurations, the terms intranet and extranet are used to describe two different use cases.[4] An intranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an extranet site-to-site VPN joins sites belonging to multiple organizations.

Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for business-to-business, cloud computing, and branch office scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined.

Apart from the general topology configuration, a VPN may also be characterized by:

  • the tunneling protocol used to tunnel the traffic,
  • the tunnel's termination point location, e.g., on the customer edge or network-provider edge,
  • the security features provided,
  • the OSI layer they present to the connecting network, such as Layer 2 link/circuit or Layer 3 network connectivity,
  • the number of simultaneous allowed tunnels,
  • the relationship between the actor implementing the VPN and the network infrastructure provider, and whether the former trusts the medium of the former or not

A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.

Native and third-party support

[edit]

Operating systems vendors and developers do typically offer native support to a selection of VPN protocols. These are subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and others have emerged.

Support in consumer operating systems

[edit]

Desktop, smartphone and other end-user device operating systems usually support configuring remote access VPN from their graphical or command-line tools.[5][6][7] However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no longer natively supported by the OS.

For instance, Android lacked native IPsec IKEv2 support until version 11,[8] and users needed to install third-party apps in order to connect that kind of VPN. Conversely, Windows does not natively support plain IPsec IKEv1 remote access native VPN configuration (commonly used by Cisco and Fritz!Box VPN solutions).

Support in network devices

[edit]

Network appliances, such as firewalls, often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces often facilitate setting up virtual private networks with a selection of supported protocols. In some cases, like in the open source operating systems devoted to firewalls and network devices (like OpenWrt, IPFire, PfSense or OPNsense) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.

Commercial appliances with VPN features based on proprietary hardware or software platforms usually support a consistent VPN protocol across their products, but do not allow customizations outside the use cases they implement. This is often the case for appliances that rely on hardware acceleration of VPNs to provide higher throughput or support a larger number of simultaneously connected users.

Security mechanisms

[edit]

Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:

VPN are not intended to make connecting users anonymous or unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide those confidentiality features, their usage can increase user privacy by making the untrusted medium owner unable to access the private data exchanged across the VPN.

Authentication

[edit]

In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable authentication of connecting parties. This secures the joined remote network confidentiality, integrity and availability.

Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a web captive portal).

Remote-access VPNs, which are typically user-initiated, may use passwords, biometrics, two-factor authentication, or other cryptographic methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.

Site-to-site VPNs often use passwords (pre-shared keys) or digital certificates. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator.

Protocols

[edit]
The life cycle phases of an IPSec tunnel in a virtual private network

A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.

  • Internet Protocol Security (IPsec) was initially developed by the Internet Engineering Task Force (IETF) for IPv6, and was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[9] This standards-based security protocol is also widely used with IPv4. Its design meets most security goals: availability, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by Internet Key Exchange (IKE) protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the Layer 2 Tunneling Protocol (L2TP). Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g. Xauth), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on 3G or 4G LTE networks. IPsec is also often supported by network hardware accelerators,[10] which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.[11][12]
  • Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project and SoftEther VPN project[13]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (HTTPS) is supported without special extra configurations,
  • Datagram Transport Layer Security (DTLS) – used in Cisco AnyConnect VPN and in OpenConnect VPN[14] to solve the issues TLS has with tunneling over TCP (SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts[15]).
  • Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms.
  • Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL/TLS channel (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1).
  • Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".[relevant?][16]
  • Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port forwarding) to secure[ambiguous] remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[17] SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.
  • WireGuard is a protocol. In 2020, WireGuard support was added to both the Linux[18] and Android[19] kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.[20]
  • OpenVPN is a free and open-source VPN protocol based on the TLS protocol. It supports perfect forward-secrecy, and most modern secure cipher suites, like AES, Serpent, TwoFish, etc. It is currently[may be outdated as of March 2023] being developed and updated by OpenVPN Inc., a non-profit providing secure VPN technologies.
  • Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling IPv4 packets over UDP via encapsulation.[21] CIPE was developed for Linux operating systems by Olaf Titz, with a Windows port implemented by Damion K. Wilson.[22] Development for CIPE ended in 2002.[23]

Trusted delivery networks

[edit]

Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.[24]

From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.[citation needed]

Mobile environments

[edit]

Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points without dropping the secure VPN session or losing application sessions.[28] Mobile VPNs are widely used in public safety where they give law-enforcement officers access to applications such as computer-assisted dispatch and criminal databases,[29] and in other organizations with similar requirements such as field service management and healthcare.[30][need quotation to verify]

Networking limitations

[edit]

A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support broadcast domains; therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported as on a local area network. Variants on VPN such as Virtual Private LAN Service (VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.[31]

See also

[edit]

References

[edit]
  1. ^ "virtual private network". NIST Computer Security Resource Center Glossary. Archived from the original on 2 January 2023. Retrieved 2 January 2023.
  2. ^ "What Is a VPN? - Virtual Private Network". Cisco. Archived from the original on 31 December 2021. Retrieved 5 September 2021.
  3. ^ Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7. ISBN 9781587050336.
  4. ^ RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks. sec. 1.1. doi:10.17487/RFC3809. RFC 3809.
  5. ^ "Connect to a VPN in Windows - Microsoft Support". support.microsoft.com. Retrieved 11 July 2024.
  6. ^ "Connect to a virtual private network (VPN) on Android". Retrieved 11 July 2024.
  7. ^ "VPN settings overview for Apple devices". Apple Support. Retrieved 11 July 2024.
  8. ^ "IPsec/IKEv2 Library". Android Open Source Project. Retrieved 11 July 2024.
  9. ^ E. Jankiewicz; J. Loughney; T. Narten (December 2011). IPv6 Node Requirements. Internet Engineering Task Force. doi:10.17487/RFC6434. ISSN 2070-1721. RFC 6434. Obsolete. p. 17. Obsoleted by RFC 8504. Obsoletes RFC 4294. Previously, IPv6 mandated implementation of IPsec and recommended the key management approach of IKE. This document updates that recommendation by making support of the IPsec Architecture RFC4301 a SHOULD for all IPv6 nodes.
  10. ^ "Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]". Cisco. Retrieved 9 July 2024.
  11. ^ "VPN overview for Apple device deployment". Apple Support. Retrieved 9 July 2024.
  12. ^ "About Always On VPN for Windows Server Remote Access". learn.microsoft.com. 22 May 2023. Retrieved 9 July 2024.
  13. ^ "1. Ultimate Powerful VPN Connectivity". www.softether.org. SoftEther VPN Project. Archived from the original on 8 October 2022. Retrieved 8 October 2022.
  14. ^ "OpenConnect". Archived from the original on 29 June 2022. Retrieved 8 April 2013. OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
  15. ^ "Why TCP Over TCP Is A Bad Idea". sites.inka.de. Archived from the original on 6 March 2015. Retrieved 24 October 2018.
  16. ^ "Trademark Status & Document Retrieval". tarr.uspto.gov. Archived from the original on 21 March 2012. Retrieved 8 October 2022.
  17. ^ "ssh(1) – OpenBSD manual pages". man.openbsd.org. Archived from the original on 5 July 2022. Retrieved 4 February 2018.
  18. ^ Salter, Jim (30 March 2020). "WireGuard VPN makes it to 1.0.0—and into the next Linux kernel". Ars Technica. Archived from the original on 31 March 2020. Retrieved 30 June 2020.
  19. ^ "Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google". android.googlesource.com. Archived from the original on 29 June 2022. Retrieved 30 June 2020.
  20. ^ Younglove, R. (December 2000). "Virtual private networks - how they work". Computing & Control Engineering Journal. 11 (6): 260–262. doi:10.1049/cce:20000602 (inactive 12 July 2025). ISSN 0956-3385.{{cite journal}}: CS1 maint: DOI inactive as of July 2025 (link)[dead link]
    • Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol". International Conference on Applied Cryptography and Network Security. ISBN 978-3-319-93386-3.
  21. ^ Fuller, Johnray; Ha, John (2002). Red Hat Linux 9: Red Hat Linux Security Guide (PDF). United States: Red Hat, Inc. pp. 48–53. Archived (PDF) from the original on 14 October 2022. Retrieved 8 September 2022.
  22. ^ Titz, Olaf (20 December 2011). "CIPE - Crypto IP Encapsulation". CIPE - Crypto IP Encapsulation. Archived from the original on 18 May 2022. Retrieved 8 September 2022.
  23. ^ Titz, Olaf (2 April 2013). "CIPE - encrypted IP in UDP tunneling". SourceForge. Archived from the original on 8 September 2022. Retrieved 8 September 2022.
  24. ^ Cisco Systems, Inc. (2004). Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233. ISBN 9781587051197. Retrieved 15 February 2013. [...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes called trusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised.
  25. ^ Layer Two Tunneling Protocol "L2TP" Archived 30 June 2022 at the Wayback Machine, RFC 2661, W. Townsley et al., August 1999
  26. ^ IP Based Virtual Private Networks Archived 9 July 2022 at the Wayback Machine, RFC 2341, A. Valencia et al., May 1998
  27. ^ Point-to-Point Tunneling Protocol (PPTP) Archived 2 July 2022 at the Wayback Machine, RFC 2637, K. Hamzeh et al., July 1999
  28. ^ Phifer, Lisa. "Mobile VPN: Closing the Gap" Archived 6 July 2020 at the Wayback Machine, SearchMobileComputing.com, 16 July 2006.
  29. ^ Willett, Andy. "Solving the Computing Challenges of Mobile Officers" Archived 12 April 2020 at the Wayback Machine, www.officer.com, May, 2006.
  30. ^ Cheng, Roger. "Lost Connections" Archived 28 March 2018 at the Wayback Machine, The Wall Street Journal, 11 December 2007.
  31. ^ Sowells, Julia (7 August 2017). "Virtual Private Network (VPN) : What VPN Is And How It Works". Hackercombat. Archived from the original on 17 June 2022. Retrieved 7 November 2021.

Further reading

[edit]
张家界为什么叫张家界 肠胃不好吃什么水果比较好 安宫牛黄丸有什么作用 猫眼是什么 感冒喝什么粥
开户名是什么 烧仙草是什么 星期三打喷嚏代表什么 早搏什么症状 为什么会突然不爱了
就坡下驴什么意思 酒后打嗝是什么原因 虾皮有什么营养价值 腿抽筋吃什么钙片好 宝宝不长肉是什么原因
狼吞虎咽是什么生肖 血管病变是什么意思 人为什么要日b 腰酸挂什么科 今年七夕节是什么时候
胃不好能吃什么水果hcv9jop6ns8r.cn 枸杞与菊花一起泡水喝有什么功效hcv9jop3ns7r.cn 脂溢性脱发用什么洗发水hcv7jop9ns4r.cn 甲状腺饱满是什么意思xinjiangjialails.com 畏寒怕冷是什么原因hcv9jop2ns5r.cn
分水岭是什么意思hcv8jop2ns1r.cn 心理素质差是什么原因hcv9jop5ns9r.cn 肺气虚吃什么食物hcv7jop6ns8r.cn 人流后吃什么药hcv8jop9ns3r.cn 做梦梦到怀孕了是什么意思hcv9jop8ns1r.cn
化疗能吃什么水果zsyouku.com sch是什么意思hcv8jop5ns9r.cn 梦见老公出轨了是什么征兆hcv8jop7ns6r.cn 土地兼并是什么意思hcv9jop8ns1r.cn 金线莲有什么功效hcv9jop1ns5r.cn
对口升学什么意思hcv7jop6ns0r.cn crf是什么意思hcv7jop6ns1r.cn 马铃薯是什么hcv9jop7ns3r.cn 竹荪是什么hcv8jop9ns7r.cn 你想干什么hcv8jop6ns0r.cn
百度