红烧肉可以放什么配菜| 国防部长是什么级别| 睾丸痒是什么原因| 乳头疼吃什么药| 戾气什么意思| 鱼油不适合什么人吃| 三伏天晒背有什么好处| 吲达帕胺片是什么药| 为什么老是睡不着| 结肠多发息肉是什么意思| 小肚子鼓鼓的什么原因| 吃什么排宿便清肠彻底| 鸟喜欢吃什么| 结扎对男人有什么伤害| 左侧肋骨疼是什么原因| 热感冒流鼻涕吃什么药| 舌苔厚黄是什么病| 卡西欧属于什么档次| 小拇指旁边的手指叫什么| 鸡属于什么动物| 尿肌酐低说明什么原因| 什么叫低钾血症| 情债是什么意思| 什么叫手足口病| 尿酸高什么水果不能吃| 人流后吃什么| 张学友属什么生肖| 高温丝假发是什么材质| 浆糊是什么意思| 今天吃什么菜| 易烊千玺原名叫什么| 王大锤真名叫什么| 喷字去掉口念什么| 为什么今年夏天特别热| 吃阿司匹林有什么副作用| 肺部有问题一般会出现什么症状| 牛排骨炖什么好吃| 舌头根发麻是什么原因| 粉碎性骨折吃什么好| 哮喘吃什么药管用| 低钠盐是什么意思| 脑梗什么东西不能吃| 什么是子公司| 脚底发红是什么原因| 吃维生素c片有什么好处| 胸片是什么| 助力油是什么油| 大荔冬枣什么时候成熟| 心动过缓吃什么药最好| 黄豆酱做什么菜好吃| 前庭功能减退是什么原因| 不割包皮有什么影响吗| 后背容易出汗是什么原因| 试管都有什么方案| 四点半是什么时辰| 性生活过后出血是什么原因| na什么意思| 什么的积雪| 新生儿什么时候能看见东西| 空心是什么意思| 珍贵的动物是什么生肖| 绝育是什么意思| 无菌性前列腺炎吃什么药效果好| 一个虫一个尧念什么| 什么是公主病| 古龙香水什么味道| 女性什么时间是排卵期| 鱼子酱是什么鱼| 什么是荠菜| 晚上吃什么有助于减肥| 自由职业可以做什么| 灰色配什么色好看| 子宁不嗣音什么意思| 肽是什么东西| 白起为什么被赐死| 人的胆量由什么决定| 土霉素治什么病| 头晕恶心想吐吃什么药| 胃病挂什么科| 把妹是什么意思| 坎是什么意思| 半夜鸡叫是什么征兆| 慌张的反义词是什么| 叶公好龙是什么生肖| 发改委是管什么的| 梦见自己生了个女孩是什么意思| 补钙吃什么最好| 贬低是什么意思| 下午茶是什么意思| 走路脚后跟疼是什么原因| 负面影响是什么意思| 阳痿什么意思| 鼻子上的痣有什么寓意| 结肠和直肠有什么区别| 怀疑哮喘要做什么检查| 金字旁土念什么字| 3月26号是什么星座| 为什么养鱼双数是大忌| 少尉军衔是什么级别| 何五行属性是什么| 没什么大不了| 1935年属什么生肖属相| 真丝丝绒是什么面料| 没品什么意思| 孕妇胃疼可以吃什么药| 皮肤发黄是什么原因| 软饮是什么意思| 什么是活性叶酸| 吃什么可以提高免疫力和抵抗力| 光谱是什么| 水瓶座是什么星象| 男人梦见龙是什么征兆| 虱子长什么样子图片| 1976年是什么命| 雪白雪白的什么| 窦性心动过速是什么原因| 狗狗假孕是什么症状| pre什么意思| 玉和石头有什么区别| 更年期失眠吃什么药| 2035年是什么年| 回笼觉是什么意思| 什么人适合喝蛋白粉| 绿杨春属于什么茶| 四不放过是指什么| 贯众是什么植物| 黄芪什么人不能喝| 血糖高初期有什么症状| 猪心炖什么补气补血| 11月10号是什么星座| 记忆力差是什么原因| 小土豆是什么意思| 保健品是什么意思| 樟脑是什么| 为什么会得淋巴肿瘤| 三月十七是什么星座| 肝炎是什么病| 生蚝有什么功效| 花生有什么营养| 吴用的绰号是什么| 不想长胡子有什么办法| 阻生齿是什么| 走路不稳是什么原因| 什么是虚岁| 山见念什么| 怀孕前三个月忌吃什么| versace什么牌子| 什么叫皈依| 00后是什么意思| 奥硝唑和甲硝唑有什么区别| 野蛮生长是什么意思| 什么地移入| 早搏吃什么药最好| oa是什么意思| 喝醋有什么作用与功效| 梦见炒菜是什么意思| 王八蛋是什么意思| 阁五行属什么| 小强是什么意思| 所以我求求你别让我离开你是什么歌| 生抽可以用什么代替| 7.1什么星座| 心率过速吃什么药| 光感是什么意思| 活色生香什么意思| 纯字五行属什么| 鸡头上长痘痘用什么药| 浊是什么意思| 腿硬邦邦的是什么原因| 红色学士服是什么学位| rt是什么单位| phicomm是什么牌子| 软冷冻室一般放什么东西| 小代表什么生肖| 仓促是什么意思| 1998年出生属什么| 卯木代表什么| 阴道里面痒用什么药| 长智齿牙龈肿痛吃什么药| 什么是蜘蛛痣| 颜值担当是什么意思| 跟班是什么意思| 脉压是什么| 什么病不能吃鲤鱼| 军长是什么级别| 肠胃炎可以吃什么食物| 胃气不足吃什么中成药| 碳水化合物是什么食物| 从容不迫什么意思| 急诊是什么意思| 鱼吃什么| 文旦是什么| 什么是活性叶酸| crocodile是什么牌子| 吃苦瓜对身体有什么好处| 血虚吃什么中成药最好| 榴莲补什么| 什么能增强免疫力| 为什么耳鸣| 陈世美是什么样的人| 1月27日是什么星座| 81什么节| 为什么拍照脸是歪的| 手脱皮用什么药膏| 喝苦荞茶有什么好处和坏处| 1r是什么意思| 清朝前面是什么朝代| 灯笼裤配什么鞋子好看| 什么东西养胃| 流鼻涕吃什么药最管用| 梦到抓到鱼是什么意思| 迎春花什么时候开花| 骨折吃什么消炎药| 比重是什么| 手指甲没有月牙是什么原因| 泡脚不出汗是什么原因| 痛风都有什么症状| 狮子座和什么座最不配| 6月23日是什么节日| 龙井属于什么茶| 吃什么可以流产| 男属兔和什么属相最配| 漠河什么时候可以看到极光| 八年是什么婚| 湿气重吃什么药| 音容笑貌的意思是什么| 结肠炎吃什么药最见效| 玉镯子断了有什么预兆| 月子餐吃什么| 红花油和活络油有什么区别| 月经前乳房胀痛是什么原因| 午夜梦回是什么意思| 手经常抽筋是什么原因| 什么是朱砂痣| 元宵节的习俗是什么| 嘴唇发黑是什么原因| 一心一意指什么生肖| 庸人自扰之是什么意思| 沉香有什么作用与功效| 喝什么水减肥最快| 内向男生适合什么工作| skr什么意思| 夏季喝什么汤好| 女命带驿马是什么意思| 白衬衫太透里面穿什么| 控评是什么意思| 低频是什么意思| 泔水是什么意思| 脚心有痣代表什么| 血糖高能吃什么蔬菜| 口差念什么| 正常白带是什么味道| 夏令时是什么意思| 糟卤可以做什么菜| 中途疲软吃什么药| 牛油果吃了有什么好处| 我俩太不公平这是什么歌| 肝内胆管结石吃什么药好| 阴婚是什么意思| 子宫内膜单纯性增生是什么意思| 为什么不建议吃茵栀黄| 抽血血液偏黑什么原因| 三只手是什么意思| 海鲜都有什么| 百度Jump to content

为身边朋友打造绝美肖像 光影之下的神态汇聚

From Wikipedia, the free encyclopedia
百度 各地区各部门要结合实际认真学习、深刻领会、切实贯彻。

Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]

A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.

It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.[3]

The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.

Motivation

[edit]

The goal of a virtual private network is to allow network hosts to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network transparent to network applications. Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.

In the case of a provider-provisioned VPN, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in VLAN).

Operation

[edit]

How a VPN works depends on which technologies and protocols the VPN is built upon. A tunneling protocol is used to transfer the network messages from one side to the other. The goal is to take network messages from applications on one side of the tunnel and replay them on the other side. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS.

Applications that do implement tunneling or proxying features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may achieve the same or similar end-user goal of exchanging private contents with a remote network.

Topology

[edit]
VPN classification tree based on the topology first, then on the technology used
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together

Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:

Remote access
A host-to-network configuration is analogous to joining one or more computers to a network to which they cannot be directly connected. This type of extension provides that computer access to local area network of a remote site, or any wider enterprise networks, such as an intranet. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for remote workers, or to enable people accessing their private home or company resources without exposing them on the public Internet. Remote access tunnels can be either on-demand or always-on. Because the remote host location is usually unknown to the central network until the former tries to reach it, proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing.
Site-to-site
A site-to-site configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between gateway devices located at each network location. These devices then make the tunnel available to other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarters or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other.

In the context of site-to-site configurations, the terms intranet and extranet are used to describe two different use cases.[4] An intranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an extranet site-to-site VPN joins sites belonging to multiple organizations.

Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for business-to-business, cloud computing, and branch office scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined.

Apart from the general topology configuration, a VPN may also be characterized by:

  • the tunneling protocol used to tunnel the traffic,
  • the tunnel's termination point location, e.g., on the customer edge or network-provider edge,
  • the security features provided,
  • the OSI layer they present to the connecting network, such as Layer 2 link/circuit or Layer 3 network connectivity,
  • the number of simultaneous allowed tunnels,
  • the relationship between the actor implementing the VPN and the network infrastructure provider, and whether the former trusts the medium of the former or not

A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.

Native and third-party support

[edit]

Operating systems vendors and developers do typically offer native support to a selection of VPN protocols. These are subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and others have emerged.

Support in consumer operating systems

[edit]

Desktop, smartphone and other end-user device operating systems usually support configuring remote access VPN from their graphical or command-line tools.[5][6][7] However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no longer natively supported by the OS.

For instance, Android lacked native IPsec IKEv2 support until version 11,[8] and users needed to install third-party apps in order to connect that kind of VPN. Conversely, Windows does not natively support plain IPsec IKEv1 remote access native VPN configuration (commonly used by Cisco and Fritz!Box VPN solutions).

Support in network devices

[edit]

Network appliances, such as firewalls, often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces often facilitate setting up virtual private networks with a selection of supported protocols. In some cases, like in the open source operating systems devoted to firewalls and network devices (like OpenWrt, IPFire, PfSense or OPNsense) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.

Commercial appliances with VPN features based on proprietary hardware or software platforms usually support a consistent VPN protocol across their products, but do not allow customizations outside the use cases they implement. This is often the case for appliances that rely on hardware acceleration of VPNs to provide higher throughput or support a larger number of simultaneously connected users.

Security mechanisms

[edit]

Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:

VPN are not intended to make connecting users anonymous or unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide those confidentiality features, their usage can increase user privacy by making the untrusted medium owner unable to access the private data exchanged across the VPN.

Authentication

[edit]

In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable authentication of connecting parties. This secures the joined remote network confidentiality, integrity and availability.

Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a web captive portal).

Remote-access VPNs, which are typically user-initiated, may use passwords, biometrics, two-factor authentication, or other cryptographic methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.

Site-to-site VPNs often use passwords (pre-shared keys) or digital certificates. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator.

Protocols

[edit]
The life cycle phases of an IPSec tunnel in a virtual private network

A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.

  • Internet Protocol Security (IPsec) was initially developed by the Internet Engineering Task Force (IETF) for IPv6, and was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[9] This standards-based security protocol is also widely used with IPv4. Its design meets most security goals: availability, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by Internet Key Exchange (IKE) protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the Layer 2 Tunneling Protocol (L2TP). Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g. Xauth), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on 3G or 4G LTE networks. IPsec is also often supported by network hardware accelerators,[10] which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.[11][12]
  • Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project and SoftEther VPN project[13]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (HTTPS) is supported without special extra configurations,
  • Datagram Transport Layer Security (DTLS) – used in Cisco AnyConnect VPN and in OpenConnect VPN[14] to solve the issues TLS has with tunneling over TCP (SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts[15]).
  • Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms.
  • Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL/TLS channel (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1).
  • Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".[relevant?][16]
  • Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port forwarding) to secure[ambiguous] remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[17] SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.
  • WireGuard is a protocol. In 2020, WireGuard support was added to both the Linux[18] and Android[19] kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.[20]
  • OpenVPN is a free and open-source VPN protocol based on the TLS protocol. It supports perfect forward-secrecy, and most modern secure cipher suites, like AES, Serpent, TwoFish, etc. It is currently[may be outdated as of March 2023] being developed and updated by OpenVPN Inc., a non-profit providing secure VPN technologies.
  • Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling IPv4 packets over UDP via encapsulation.[21] CIPE was developed for Linux operating systems by Olaf Titz, with a Windows port implemented by Damion K. Wilson.[22] Development for CIPE ended in 2002.[23]

Trusted delivery networks

[edit]

Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.[24]

From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.[citation needed]

Mobile environments

[edit]

Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points without dropping the secure VPN session or losing application sessions.[28] Mobile VPNs are widely used in public safety where they give law-enforcement officers access to applications such as computer-assisted dispatch and criminal databases,[29] and in other organizations with similar requirements such as field service management and healthcare.[30][need quotation to verify]

Networking limitations

[edit]

A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support broadcast domains; therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported as on a local area network. Variants on VPN such as Virtual Private LAN Service (VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.[31]

See also

[edit]

References

[edit]
  1. ^ "virtual private network". NIST Computer Security Resource Center Glossary. Archived from the original on 2 January 2023. Retrieved 2 January 2023.
  2. ^ "What Is a VPN? - Virtual Private Network". Cisco. Archived from the original on 31 December 2021. Retrieved 5 September 2021.
  3. ^ Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7. ISBN 9781587050336.
  4. ^ RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks. sec. 1.1. doi:10.17487/RFC3809. RFC 3809.
  5. ^ "Connect to a VPN in Windows - Microsoft Support". support.microsoft.com. Retrieved 11 July 2024.
  6. ^ "Connect to a virtual private network (VPN) on Android". Retrieved 11 July 2024.
  7. ^ "VPN settings overview for Apple devices". Apple Support. Retrieved 11 July 2024.
  8. ^ "IPsec/IKEv2 Library". Android Open Source Project. Retrieved 11 July 2024.
  9. ^ E. Jankiewicz; J. Loughney; T. Narten (December 2011). IPv6 Node Requirements. Internet Engineering Task Force. doi:10.17487/RFC6434. ISSN 2070-1721. RFC 6434. Obsolete. p. 17. Obsoleted by RFC 8504. Obsoletes RFC 4294. Previously, IPv6 mandated implementation of IPsec and recommended the key management approach of IKE. This document updates that recommendation by making support of the IPsec Architecture RFC4301 a SHOULD for all IPv6 nodes.
  10. ^ "Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]". Cisco. Retrieved 9 July 2024.
  11. ^ "VPN overview for Apple device deployment". Apple Support. Retrieved 9 July 2024.
  12. ^ "About Always On VPN for Windows Server Remote Access". learn.microsoft.com. 22 May 2023. Retrieved 9 July 2024.
  13. ^ "1. Ultimate Powerful VPN Connectivity". www.softether.org. SoftEther VPN Project. Archived from the original on 8 October 2022. Retrieved 8 October 2022.
  14. ^ "OpenConnect". Archived from the original on 29 June 2022. Retrieved 8 April 2013. OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
  15. ^ "Why TCP Over TCP Is A Bad Idea". sites.inka.de. Archived from the original on 6 March 2015. Retrieved 24 October 2018.
  16. ^ "Trademark Status & Document Retrieval". tarr.uspto.gov. Archived from the original on 21 March 2012. Retrieved 8 October 2022.
  17. ^ "ssh(1) – OpenBSD manual pages". man.openbsd.org. Archived from the original on 5 July 2022. Retrieved 4 February 2018.
  18. ^ Salter, Jim (30 March 2020). "WireGuard VPN makes it to 1.0.0—and into the next Linux kernel". Ars Technica. Archived from the original on 31 March 2020. Retrieved 30 June 2020.
  19. ^ "Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google". android.googlesource.com. Archived from the original on 29 June 2022. Retrieved 30 June 2020.
  20. ^ Younglove, R. (December 2000). "Virtual private networks - how they work". Computing & Control Engineering Journal. 11 (6): 260–262. doi:10.1049/cce:20000602 (inactive 12 July 2025). ISSN 0956-3385.{{cite journal}}: CS1 maint: DOI inactive as of July 2025 (link)[dead link]
    • Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol". International Conference on Applied Cryptography and Network Security. ISBN 978-3-319-93386-3.
  21. ^ Fuller, Johnray; Ha, John (2002). Red Hat Linux 9: Red Hat Linux Security Guide (PDF). United States: Red Hat, Inc. pp. 48–53. Archived (PDF) from the original on 14 October 2022. Retrieved 8 September 2022.
  22. ^ Titz, Olaf (20 December 2011). "CIPE - Crypto IP Encapsulation". CIPE - Crypto IP Encapsulation. Archived from the original on 18 May 2022. Retrieved 8 September 2022.
  23. ^ Titz, Olaf (2 April 2013). "CIPE - encrypted IP in UDP tunneling". SourceForge. Archived from the original on 8 September 2022. Retrieved 8 September 2022.
  24. ^ Cisco Systems, Inc. (2004). Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233. ISBN 9781587051197. Retrieved 15 February 2013. [...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes called trusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised.
  25. ^ Layer Two Tunneling Protocol "L2TP" Archived 30 June 2022 at the Wayback Machine, RFC 2661, W. Townsley et al., August 1999
  26. ^ IP Based Virtual Private Networks Archived 9 July 2022 at the Wayback Machine, RFC 2341, A. Valencia et al., May 1998
  27. ^ Point-to-Point Tunneling Protocol (PPTP) Archived 2 July 2022 at the Wayback Machine, RFC 2637, K. Hamzeh et al., July 1999
  28. ^ Phifer, Lisa. "Mobile VPN: Closing the Gap" Archived 6 July 2020 at the Wayback Machine, SearchMobileComputing.com, 16 July 2006.
  29. ^ Willett, Andy. "Solving the Computing Challenges of Mobile Officers" Archived 12 April 2020 at the Wayback Machine, www.officer.com, May, 2006.
  30. ^ Cheng, Roger. "Lost Connections" Archived 28 March 2018 at the Wayback Machine, The Wall Street Journal, 11 December 2007.
  31. ^ Sowells, Julia (7 August 2017). "Virtual Private Network (VPN) : What VPN Is And How It Works". Hackercombat. Archived from the original on 17 June 2022. Retrieved 7 November 2021.

Further reading

[edit]
珀莱雅属于什么档次 想念是什么意思 牙痛什么原因引起的 rose是什么意思 耗儿鱼是什么鱼
孕妇流鼻血是什么原因 脸上过敏是什么症状 婴幼儿积食会有什么症状 小猫踩奶是什么意思 女人为什么会得霉菌
半月板变性是什么意思 皇子的妻子叫什么 为什么会长疣 c14呼气试验是检查什么的 小孩子黑眼圈重是什么原因
风口浪尖是什么意思 八百里加急是什么意思 火字旁的有什么字 子宫肌瘤钙化是什么意思 月经期吃什么水果
牛大力泡酒有什么功效hcv8jop2ns4r.cn 肆意洒脱 什么意思hcv8jop2ns1r.cn 中二病是什么意思hcv8jop5ns6r.cn 结节影是什么意思hcv8jop6ns4r.cn 心律不齐什么症状hcv9jop2ns7r.cn
低血糖吃什么药hcv8jop8ns5r.cn 腰扭伤吃什么药最有效dajiketang.com 上海新华医院擅长什么hcv8jop7ns5r.cn 春天什么花开hcv7jop4ns6r.cn 减肥吃什么药效果最好hcv8jop1ns8r.cn
狡兔三窟是什么生肖hcv9jop4ns2r.cn 什么时候跳绳减肥效果最好hcv9jop4ns7r.cn 孕32周需要做什么检查hcv9jop6ns6r.cn 阿尔兹海默症挂什么科hcv8jop2ns5r.cn epl是什么意思hcv8jop0ns6r.cn
什么清什么秀travellingsim.com cmyk代表什么颜色hlguo.com 屎壳郎是什么意思hcv8jop8ns3r.cn 数典忘祖指什么动物hcv9jop4ns0r.cn 葡萄籽什么牌子效果好hcv8jop9ns6r.cn
百度