How to Install Lite VPN on Your Device

How to Install Lite VPN on Your Device

Configuring the VPN Settings

Configuring the VPN Settings


Configuring the VPN settings is a crucial step when it comes to installing Lite VPN on your device. Learn more about Lite VPN here. Virtual Private Networks (VPNs) have become an essential tool for ensuring online privacy and security, and Lite VPN is a popular choice due to its user-friendly interface and reliable performance. This essay will guide you through the process of configuring the VPN settings to ensure a smooth and secure experience.


Once you have installed Lite VPN on your device, the next step is to configure the settings to match your preferences and security needs. The configuration process begins with selecting the server location. Lite VPN offers a variety of server locations worldwide, allowing you to choose one that best suits your needs. For instance, if you are traveling and wish to access content from your home country, selecting a server in that country can help bypass geographical restrictions.


After selecting your preferred server location, the next step is to choose the appropriate VPN protocol. Lite VPN supports several protocols, including OpenVPN, IKEv2, and L2TP/IPsec. Each protocol offers a different balance between speed and security. OpenVPN is known for its high level of security and is widely recommended for most users. However, if speed is a priority, especially for streaming or gaming, IKEv2 may be a better option due to its faster connection speeds.


Another important aspect of configuring the VPN settings is enabling the kill switch feature. This feature ensures that your internet connection is immediately cut off if the VPN connection drops unexpectedly. This prevents any data from being transmitted over an unsecured connection, thereby protecting your privacy. Enabling the kill switch is a simple yet effective way to add an extra layer of security to your VPN usage.


Its also advisable to configure the DNS settings within Lite VPN. By default, Lite VPN may use its own DNS servers, which can help prevent DNS leaks and ensure that your browsing activity remains private. However, if you have specific DNS preferences, such as using a third-party DNS service for additional security or speed, you can manually configure these settings within the app.


Finally, consider setting up automatic connection features. Lite VPN allows you to configure the VPN to automatically connect whenever you join a Wi-Fi network. This is particularly useful for users who frequently connect to public Wi-Fi networks, as it ensures that your data is always encrypted and secure without requiring manual intervention each time.


In conclusion, configuring the VPN settings when installing Lite VPN on your device is a straightforward process that significantly enhances your online security and privacy. By carefully selecting the server location, choosing the right protocol, enabling the kill switch, configuring DNS settings, and setting up automatic connections, you can ensure a seamless and secure VPN experience. With these configurations, Lite VPN becomes a powerful tool in safeguarding your digital presence, allowing you to browse the internet with peace of mind.

Testing Your VPN Connection


Installing a VPN on your device, such as Lite VPN, is a great way to secure your internet connection and protect your privacy. However, simply installing the software is not enough. It is crucial to test your VPN connection to ensure that it is functioning correctly and providing the security and privacy you expect.


Once you have installed Lite VPN on your device, the first step in testing your VPN connection is to check whether your IP address has changed. When youre connected to a VPN, it should mask your original IP address and replace it with one from the VPN servers location. To verify this, you can use a simple online tool that shows your current IP address. Before connecting to Lite VPN, note your original IP address. After connecting, check again to see if it has changed to the new one provided by the VPN. If your IP address remains the same, there might be an issue with your VPN connection.


Another important test is to check for DNS leaks. Even if your IP address is hidden, a DNS leak can expose your browsing history and location to your Internet Service Provider (ISP) or other third parties. There are various online DNS leak test tools available. By running one of these tests while connected to Lite VPN, you can ensure that all DNS requests are being routed through the VPN tunnel and not leaking back to your ISP.


Additionally, testing for WebRTC leaks is essential, particularly if you frequently use web-based applications that rely on real-time communication. WebRTC can bypass the VPN and reveal your true IP address. To check for this, there are online WebRTC leak test tools. Running these tests will help you confirm that your real IP address is not being exposed.


Furthermore, conduct a speed test to evaluate the performance of your VPN connection. While some slowdown is expected due to the encryption process, significant drops in speed might indicate issues with the server you are connected to. Testing your connection speed before and after activating the VPN will give you an idea of its impact on your internet performance.


Finally, ensure that the kill switch feature, if provided by Lite VPN, is enabled and functioning properly. This feature disconnects your device from the internet if the VPN connection drops unexpectedly, preventing your data from being exposed. To test the kill switch, disconnect your VPN while monitoring your internet connection. If youre unable to access the internet, the kill switch is working as intended.


In conclusion, testing your VPN connection is an essential step after installing Lite VPN on your device. By verifying that your IP address is masked, checking for DNS and WebRTC leaks, evaluating connection speed, and ensuring the kill switch is operational, you can confidently rely on your VPN for enhanced online privacy and security.

Troubleshooting Common Issues


Installing a VPN can greatly enhance your online privacy and security, and Lite VPN is a popular choice for many users due to its user-friendly interface and reliable performance. However, like any software, you might encounter some issues during the installation process. Troubleshooting these common issues can help ensure a smooth setup and a secure browsing experience.


One of the most common issues users face when installing Lite VPN is compatibility with their devices operating system. Before starting the installation, it's crucial to ensure that your device meets the system requirements specified by Lite VPN. Often, users overlook this step, leading to installation failures or suboptimal performance. If you encounter compatibility issues, check for any available updates for your operating system or consider upgrading your device to meet the necessary specifications.


Another frequent hurdle is network connectivity problems. A stable internet connection is essential for downloading the VPN application and for its subsequent operation. If you experience connectivity issues during installation, double-check your internet connection. Sometimes, resetting your modem or router can resolve these problems. Additionally, ensure that no firewall or security software is blocking the VPN installation process, as these can sometimes interfere with the download or setup.


Incorrect login credentials can also pose a problem. After installing the VPN, users need to log in to activate the service. Ensure that you are entering the correct username and password associated with your Lite VPN account. If you have forgotten your credentials, use the password recovery feature provided by Lite VPN to reset your password.


Furthermore, if Lite VPN fails to connect after installation, it might be due to server overloads or geographical restrictions. Try switching to a different server location within the VPN application. Lite VPN usually offers multiple server options, and switching to a less crowded server can often resolve connectivity issues. Additionally, check if your ISP is blocking VPN usage, as this can also affect connectivity. In such cases, contacting Lite VPN's support team for assistance can provide a solution.


Lastly, keep an eye out for any software conflicts. Other applications, particularly those that involve internet usage or security, might conflict with Lite VPN. Temporarily disabling such applications during the installation process can help. Once the VPN is successfully installed, you can usually re-enable these programs without issue.


In conclusion, while installing Lite VPN on your device can occasionally present challenges, most issues can be resolved with a little troubleshooting. By ensuring compatibility, maintaining a stable internet connection, verifying login credentials, and addressing potential software conflicts, you can overcome these common obstacles. With Lite VPN up and running, you can enjoy a secure and private online experience across all your devices.

Optimizing Performance and Security


In todays digital age, the need for virtual private networks (VPNs) has become increasingly critical due to the growing concerns about privacy and security. Lite VPN stands out as a popular choice for those who wish to optimize both performance and security when surfing the internet. Installing Lite VPN on your device not only enhances your online security but also ensures that your browsing experience remains smooth and efficient.


To begin with, Lite VPN installation is a straightforward process that caters to a diverse range of devices, including smartphones, tablets, and computers. The first step is to download the Lite VPN app from the official website or an authorized app store. Ensuring that you download from a reputable source is crucial to prevent the risk of malware or fraudulent software. Once downloaded, the installation process is typically user-friendly, with guided prompts that assist you in setting up the VPN easily.


After installing Lite VPN, the next crucial step is configuring it to optimize performance and security. One of the key features of Lite VPN is its ability to automatically select the best server location based on your current network conditions. This feature ensures that your connection remains fast and reliable, minimizing any potential lag or slowdown while browsing. Additionally, users have the option to manually select server locations based on their specific needs, such as accessing content specific to a certain region.


Security is at the forefront of Lite VPNs offerings. To maximize security, it is essential to enable features such as the kill switch, which automatically disconnects your device from the internet if the VPN connection drops unexpectedly. This prevents any accidental exposure of your data. Furthermore, Lite VPN employs robust encryption protocols to secure your data, ensuring that your online activities remain private and protected from potential cyber threats.


It is also advisable to regularly update the Lite VPN app to benefit from the latest security patches and performance enhancements. Updates often include improvements to encryption methods and the addition of new server locations, which contribute to a more secure and efficient browsing experience.


In conclusion, installing Lite VPN on your device is a prudent step towards optimizing both performance and security in your digital life. The process is simple and, when configured correctly, provides a seamless and secure internet experience. By taking advantage of Lite VPNs features and keeping the app updated, you can enjoy the benefits of enhanced privacy and a fast, reliable connection, empowering you to navigate the digital world with confidence.

 

Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]

A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.

It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.[3]

The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.

Motivation

[edit]

The goal of a virtual private network is to allow network hosts to exchange network messages across another network to access private content, as if they were part of the same network. This is done in a way that makes crossing the intermediate network transparent to network applications. Users of a network connectivity service may consider such an intermediate network to be untrusted, since it is controlled by a third-party, and might prefer a VPN implemented via protocols that protect the privacy of their communication.

In the case of a Provider-provisioned VPN, the goal is not to protect against untrusted networks, but to isolate parts of the provider's own network infrastructure in virtual segments, in ways that make the contents of each segment private with respect to the others. This situation makes many other tunneling protocols suitable for building PPVPNs, even with weak or no security features (like in VLAN).

VPN general working

[edit]

How a VPN works depends on which technologies and protocols the VPN is built upon. A tunneling protocol is used to transfer the network messages from one side to the other. The goal is to take network messages from applications on one side of the tunnel and replay them on the other side. Applications do not need to be modified to let their messages pass through the VPN, because the virtual network or link is made available to the OS.

Applications that do implement tunneling or proxying features for themselves without making such features available as a network interface, are not to be considered VPN implementations but may achieve the same or similar end-user goal of exchanging private contents with a remote network.

VPN topology configurations

[edit]
VPN classification tree based on the topology first, then on the technology used
VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together

Virtual private networks configurations can be classified depending on the purpose of the virtual extension, which makes different tunneling strategies appropriate for different topologies:

Remote access
A host-to-network configuration is analogous to joining one or more computers to a network to which they cannot be directly connected. This type of extension provides that computer access to local area network of a remote site, or any wider enterprise networks, such as an intranet. Each computer is in charge of activating its own tunnel towards the network it wants to join. The joined network is only aware of a single remote host for each tunnel. This may be employed for remote workers, or to enable people accessing their private home or company resources without exposing them on the public Internet. Remote access tunnels can be either on-demand or always-on. Because the remote host location is usually unknown to the central network until the former tries to reach it, proper implementations of this configuration require the remote host to initiate the communication towards the central network it is accessing.
Site-to-site
A site-to-site configuration connects two networks. This configuration expands a network across geographically disparate locations. Tunneling is only done between gateway devices located at each network location. These devices then make the tunnel available to other local network hosts that aim to reach any host on the other side. This is useful to keep sites connected to each other in a stable manner, like office networks to their headquarters or datacenter. In this case, any side may be configured to initiate the communication as long as it knows how to reach the other.

In the context of site-to-site configurations, the terms intranet and extranet are used to describe two different use cases.[4] An intranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an extranet site-to-site VPN joins sites belonging to multiple organizations.

Typically, individuals interact with remote access VPNs, whereas businesses tend to make use of site-to-site connections for business-to-business, cloud computing, and branch office scenarios. However, these technologies are not mutually exclusive and, in a significantly complex business network, may be combined.

Apart from the general topology configuration, a VPN may also be characterized by:

  • the tunneling protocol used to tunnel the traffic.
  • the tunnel's termination point location, e.g., on the customer edge or network-provider edge.
  • the security features provided.
  • the OSI layer they present to the connecting network, such as Layer 2 link/circuit or Layer 3 network connectivity.
  • the number of simultaneous allowed tunnels.
  • the relationship between the actor implementing the VPN and the network infrastructure owner/provider, and whether the former trusts the medium of the former or not.

A variety of VPN technics exist to adapt to the above characteristics, each providing different network tunneling capabilities and different security model coverage or interpretation.

VPN native and third-party support

[edit]

Operating systems vendors and developers do typically offer native support to a selection of VPN protocols which is subject to change over the years, as some have been proven to be unsecure with respect to modern requirements and expectations, and some others emerged.

VPN support in consumer operating systems

[edit]

Desktop, smartphone and other end-user device operating systems do usually support configuring remote access VPN from their graphical or command-line tools.[5][6][7] However, due to the variety of, often non standard, VPN protocols there exists many third-party applications that implement additional protocols not yet or no more natively supported by the OS.

For instance, Android lacked native IPsec IKEv2 support until version 11,[8] and people needed to install third-party apps in order to connect that kind of VPNs, while Microsoft Windows, BlackBerry OS and others got it supported in the past.

Conversely, Windows does not support plain IPsec IKEv1 remote access native VPN configuration (commonly used by Cisco and Fritz!Box VPN solutions) which makes the use of third-party applications mandatory for people and companies relying on such VPN protocol.

VPN support in network devices

[edit]

Network appliances, such as firewalls, do often include VPN gateway functionality for either remote access or site-to-site configurations. Their administration interfaces do often facilitate setting up virtual private networks with a selection of supported protocols which have been integrated for an easy out-of-box setup.

In some cases, like in the open source operating systems devoted to firewalls and network devices (like OpenWrt, IPFire, PfSense or OPNsense) it is possible to add support for additional VPN protocols by installing missing software components or third-party apps.

Similarly, it is possible to get additional VPN configurations working, even if the OS does not facilitate the setup of that particular configuration, by manually editing internal configurations of by modifying the open source code of the OS itself. For instance, pfSense does not support remote access VPN configurations through its user interface where the OS runs on the remote host, while provides comprehensive support for configuring it as the central VPN gateway of such remote-access configuration scenario.

Otherwise, commercial appliances with VPN features based on proprietary hardware/software platforms, usually support a consistent VPN protocol across their products but do not open up for customizations outside the use cases they intended to implement. This is often the case for appliances that rely on hardware acceleration of VPNs to provide higher throughput or support a larger amount of simultaneously connected users.

Security mechanisms

[edit]

Whenever a VPN is intended to virtually extend a private network over a third-party untrusted medium, it is desirable that the chosen protocols match the following security model:

VPN are not intended to make connecting users anonymous or unidentifiable from the untrusted medium network provider perspective. If the VPN makes use of protocols that do provide those confidentiality features, their usage can increase user privacy by making the untrusted medium owner unable to access the private data exchanged across the VPN.

Authentication

[edit]

In order to prevent unauthorized users from accessing the VPN, most protocols can be implemented in ways that also enable authentication of connecting parties. This secures the joined remote network confidentiality, integrity and availability.

Tunnel endpoints can be authenticated in various ways during the VPN access initiation. Authentication can happen immediately on VPN initiation (e.g. by simple whitelisting of endpoint IP address), or very lately after actual tunnels are already active (e.g. with a web captive portal).

Remote-access VPNs, which are typically user-initiated, may use passwords, biometrics, two-factor authentication, or other cryptographic methods. People initiating this kind of VPN from unknown arbitrary network locations are also called "road-warriors". In such cases, it is not possible to use originating network properties (e.g. IP addresses) as secure authentication factors, and stronger methods are needed.

Site-to-site VPNs often use passwords (pre-shared keys) or digital certificates. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator.

VPN protocols to highlight

[edit]
The life cycle phases of an IPSec tunnel in a virtual private network

A virtual private network is based on a tunneling protocol, and may be possibly combined with other network or application protocols providing extra capabilities and different security model coverage.

  • Internet Protocol Security (IPsec) was initially developed by the Internet Engineering Task Force (IETF) for IPv6, and was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[9] This standards-based security protocol is also widely used with IPv4. Its design meets most security goals: availability, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. IPsec tunnels are set up by Internet Key Exchange (IKE) protocol. IPsec tunnels made with IKE version 1 (also known as IKEv1 tunnels, or often just "IPsec tunnels") can be used alone to provide VPN, but have been often combined to the Layer 2 Tunneling Protocol (L2TP). Their combination made possible to reuse existing L2TP-related implementations for more flexible authentication features (e.g. Xauth), desirable for remote-access configurations. IKE version 2, which was created by Microsoft and Cisco, can be used alone to provide IPsec VPN functionality. Its primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored when the IP address of the associated host is changing, which is typical of a roaming mobile device, whether on 3G or 4G LTE networks. IPsec is also often supported by network hardware accelerators,[10] which makes IPsec VPN desirable for low-power scenarios, like always-on remote access VPN configurations.[11][12]
  • Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project and SoftEther VPN project[13]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through TLS. A VPN based on TLS can connect from locations where the usual TLS web navigation (HTTPS) is supported without special extra configurations,
  • Datagram Transport Layer Security (DTLS) – used in Cisco AnyConnect VPN and in OpenConnect VPN[14] to solve the issues TLS has with tunneling over TCP (SSL/TLS are TCP-based, and tunneling TCP over TCP can lead to big delays and connection aborts[15]).
  • Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms.
  • Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL/TLS channel (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1).
  • Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".[relevant?][16]
  • Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port forwarding) to secure[ambiguous] remote connections to a network, inter-network links, and remote systems. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[17] SSH is more often used to remotely connect to machines or networks instead of a site to site VPN connection.
  • WireGuard is a protocol. In 2020, WireGuard support was added to both the Linux[18] and Android[19] kernels, opening it up to adoption by VPN providers. By default, WireGuard utilizes the Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key between the client and server.[20]
  • OpenVPN is a free and open-source VPN protocol based on the TLS protocol. It supports perfect forward-secrecy, and most modern secure cipher suites, like AES, Serpent, TwoFish, etc. It is currently[may be outdated as of March 2023] being developed and updated by OpenVPN Inc., a non-profit providing secure VPN technologies.
  • Crypto IP Encapsulation (CIPE) is a free and open-source VPN implementation for tunneling IPv4 packets over UDP via encapsulation.[21] CIPE was developed for Linux operating systems by Olaf Titz, with a Windows port implemented by Damion K. Wilson.[22] Development for CIPE ended in 2002.[23]

Trusted delivery networks

[edit]

Trusted VPNs do not use cryptographic tunneling; instead, they rely on the security of a single provider's network to protect the traffic.[24]

From a security standpoint, a VPN must either trust the underlying delivery network or enforce security with a mechanism in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.[citation needed]

VPNs in mobile environments

[edit]

Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points without dropping the secure VPN session or losing application sessions.[28] Mobile VPNs are widely used in public safety where they give law-enforcement officers access to applications such as computer-assisted dispatch and criminal databases,[29] and in other organizations with similar requirements such as field service management and healthcare.[30][need quotation to verify]

Networking limitations

[edit]

A limitation of traditional VPNs is that they are point-to-point connections and do not tend to support broadcast domains; therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported as on a local area network. Variants on VPN such as Virtual Private LAN Service (VPLS) and layer 2 tunneling protocols are designed to overcome this limitation.[31]

 

See also

[edit]

References

[edit]
  1. ^ "virtual private network". NIST Computer Security Resource Center Glossary. Archived from the original on 2 January 2023. Retrieved 2 January 2023.
  2. ^ "What Is a VPN? - Virtual Private Network". Cisco. Archived from the original on 31 December 2021. Retrieved 5 September 2021.
  3. ^ Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7. ISBN 9781587050336.
  4. ^ RFC 3809 - Generic Requirements for Provider Provisioned Virtual Private Networks. sec. 1.1. doi:10.17487/RFC3809. RFC 3809.
  5. ^ "Connect to a VPN in Windows - Microsoft Support". support.microsoft.com. Retrieved 11 July 2024.
  6. ^ "Connect to a virtual private network (VPN) on Android". Retrieved 11 July 2024.
  7. ^ "VPN settings overview for Apple devices". Apple Support. Retrieved 11 July 2024.
  8. ^ "IPsec/IKEv2 Library". Android Open Source Project. Retrieved 11 July 2024.
  9. ^ RFC 6434, "IPv6 Node Requirements", E. Jankiewicz, J. Loughney, T. Narten (December 2011)
  10. ^ "Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S - VPN Acceleration Module [Support]". Cisco. Retrieved 9 July 2024.
  11. ^ "VPN overview for Apple device deployment". Apple Support. Retrieved 9 July 2024.
  12. ^ "About Always On VPN for Windows Server Remote Access". learn.microsoft.com. 22 May 2023. Retrieved 9 July 2024.
  13. ^ "1. Ultimate Powerful VPN Connectivity". www.softether.org. SoftEther VPN Project. Archived from the original on 8 October 2022. Retrieved 8 October 2022.
  14. ^ "OpenConnect". Archived from the original on 29 June 2022. Retrieved 8 April 2013. OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment.
  15. ^ "Why TCP Over TCP Is A Bad Idea". sites.inka.de. Archived from the original on 6 March 2015. Retrieved 24 October 2018.
  16. ^ "Trademark Status & Document Retrieval". tarr.uspto.gov. Archived from the original on 21 March 2012. Retrieved 8 October 2022.
  17. ^ "ssh(1) – OpenBSD manual pages". man.openbsd.org. Archived from the original on 5 July 2022. Retrieved 4 February 2018.
  18. ^ Salter, Jim (30 March 2020). "WireGuard VPN makes it to 1.0.0—and into the next Linux kernel". Ars Technica. Archived from the original on 31 March 2020. Retrieved 30 June 2020.
  19. ^ "Diff - 99761f1eac33d14a4b1613ae4b7076f41cb2df94^! - kernel/common - Git at Google". android.googlesource.com. Archived from the original on 29 June 2022. Retrieved 30 June 2020.
  20. ^ Younglove, R. (December 2000). "Virtual private networks - how they work". Computing & Control Engineering Journal. 11 (6): 260–262. doi:10.1049/cce:20000602 (inactive 7 December 2024). ISSN 0956-3385.cite journal: CS1 maint: DOI inactive as of December 2024 (link)[dead link]
    • Benjamin Dowling, and Kenneth G. Paterson (12 June 2018). "A cryptographic analysis of the WireGuard protocol". International Conference on Applied Cryptography and Network Security. ISBN 978-3-319-93386-3.
  21. ^ Fuller, Johnray; Ha, John (2002). Red Hat Linux 9: Red Hat Linux Security Guide (PDF). United States: Red Hat, Inc. pp. 48–53. Archived (PDF) from the original on 14 October 2022. Retrieved 8 September 2022.
  22. ^ Titz, Olaf (20 December 2011). "CIPE - Crypto IP Encapsulation". CIPE - Crypto IP Encapsulation. Archived from the original on 18 May 2022. Retrieved 8 September 2022.
  23. ^ Titz, Olaf (2 April 2013). "CIPE - encrypted IP in UDP tunneling". SourceForge. Archived from the original on 8 September 2022. Retrieved 8 September 2022.
  24. ^ Cisco Systems, Inc. (2004). Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233. ISBN 9781587051197. Retrieved 15 February 2013. [...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes called trusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised.
  25. ^ Layer Two Tunneling Protocol "L2TP" Archived 30 June 2022 at the Wayback Machine, RFC 2661, W. Townsley et al., August 1999
  26. ^ IP Based Virtual Private Networks Archived 9 July 2022 at the Wayback Machine, RFC 2341, A. Valencia et al., May 1998
  27. ^ Point-to-Point Tunneling Protocol (PPTP) Archived 2 July 2022 at the Wayback Machine, RFC 2637, K. Hamzeh et al., July 1999
  28. ^ Phifer, Lisa. "Mobile VPN: Closing the Gap" Archived 6 July 2020 at the Wayback Machine, SearchMobileComputing.com, 16 July 2006.
  29. ^ Willett, Andy. "Solving the Computing Challenges of Mobile Officers" Archived 12 April 2020 at the Wayback Machine, www.officer.com, May, 2006.
  30. ^ Cheng, Roger. "Lost Connections" Archived 28 March 2018 at the Wayback Machine, The Wall Street Journal, 11 December 2007.
  31. ^ Sowells, Julia (7 August 2017). "Virtual Private Network (VPN) : What VPN Is And How It Works". Hackercombat. Archived from the original on 17 June 2022. Retrieved 7 November 2021.

Further reading

[edit]