There Are Some Security Models In VPN
VPN security systems usually require remote access to be authorized and utilize encryption techniques to prevent the disclosure of personal information. VPN provide security through tunneling protocols and security procedures. Therefore, security is the main concern for you to decide which vpn service is best according to your own needs.
Here are some security models that we can see in VPNs:
– Confidentiality. It exists so that even if a cybercriminal sniffs your data, the attacker will only see encrypted data that he cannot understand. It allows sender authentication to prevent unauthorized users from accessing the VPN. It maintains the message integrity to detect each case of transmitted messages that have been tampered with the Secure VPN protocol.
– IPSec (Internet Protocol Security) was developed by the Internet Engineering Task Force (IETF) and it was originally developed for IPv6, which requires it. Then, the Layer 2 Tunneling Protocol often runs more than IPSec. The design meets the most security goals: authentication, integrity, and confidentiality. IPSec functions through encryption and encapsulating IP packets in an IPSec packet. De-encapsulation occurs at the end of the tunnel, where the original IP packet is decrypted and forwarded to the intended destination.
– Transport Layer Security (SSL / TLS) can tunnel traffic throughout that network, as is the case in the OpenVPN project, or secure individual connections. A number of vendors provide remote VPN access capabilities via SSL. It can connect where the IPsec runs into troubles with the address of network Translation & the rules of firewall.
– Datagram Transport Layer Security (DTLS), it’s used in Cisco VPN AnyConnect, to solve SSL / TLS problems already with tunneling over UDP.
– Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and several compatible implementations on other platforms.
– Microsoft Secure Protocol Socket Tunneling (SSTP), introduced in Windows Server 2008 and Windows Vista Service Pack 1. It’s basically SSTP tunnel Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through SSL 3.0 channels.
– MPVPN (Multi Virtual Private Network Path).
– Secure Shell (SSH) VPN. OpenSSH offers VPN tunneling (different from port forwarding) to secure remote connections to networks or inter-network links. The OpenSSH server provides a number of concurrent tunnels and the VPN feature itself does not support private authentication.