{"id":932,"date":"2013-10-08T23:41:10","date_gmt":"2013-10-08T22:41:10","guid":{"rendered":"https:\/\/seed4.me\/blog\/?p=932"},"modified":"2013-10-08T23:41:10","modified_gmt":"2013-10-08T22:41:10","slug":"how-many-types-of-vpn-are-there","status":"publish","type":"post","link":"https:\/\/alexahub.net\/blog\/how-many-types-of-vpn-are-there\/","title":{"rendered":"How many types of VPN are there?"},"content":{"rendered":"<p>That&#8217;s a bit of a tricky question, since VPN protocols can have different settings and can encapsulate each other. But let&#8217;s try to count them one by one.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-933\" style=\"margin-bottom: 10px;\" alt=\"VPN Types\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/vpn-types.jpg\" width=\"480\" height=\"360\" \/><br \/>\n1) <strong>PPTP<\/strong> most popular and widely supported protocol, has 128-bit encryption and quite fast comparing to other protocols. But not so well protected, since encryption key of 128-bits is too short for today.<\/p>\n<p>2) <strong>L2TP<\/strong> is a protocol which does not imply encryption an usually used over IPSec protocol to secure data transfer. L2TP supports authentication in a very similar way as PPTP, but has no encryption. IPSec provides high industry standard encryption and even certificate authentication. L2TP rarely used without IPSec<\/p>\n<p>3) <strong>SSTP<\/strong> is <strong>L2TP<\/strong> protocol over <strong>SSL<\/strong> connection.<\/p>\n<p>3) <strong>OpenVPN<\/strong> &#8211; open standard and open source implementation. Supports different kinds of encryption. Advantages: can use TCP\/IP to pretend SSL connection. Can bypass HTTP proxy. High level of protection, but VERY slow and requires a lot of processing power comparing to other protocols.<\/p>\n<p>4) Private VPN implementation (for instance CISCO)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>That&#8217;s a bit of a tricky question, since VPN protocols can have different settings and can encapsulate each other. But let&#8217;s try to count them one by one. 1) PPTP most popular and widely supported protocol, has 128-bit encryption and quite fast comparing to other protocols. But not so well protected, since encryption key of&#8230;  <a href=\"https:\/\/alexahub.net\/blog\/how-many-types-of-vpn-are-there\/\" class=\"more-link\" title=\"Read How many types of VPN are there?\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,9],"tags":[43,58,57,4],"_links":{"self":[{"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/posts\/932"}],"collection":[{"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":2,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":935,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/posts\/932\/revisions\/935"}],"wp:attachment":[{"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alexahub.net\/blog\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}