We are developing our virtual infrastructure service and we offer to use a ready-made implementation of virtual networks (VLANs) for servers leased from us. Our task regarding working with such technologies is to provide an opportunity and help configure everything on our own, for example, a VPN on a physical or virtual server (VPS / VDS) .
Beginners VPN: Everything You Need to KnowA good "tutorial" for those who are just beginning to get acquainted with the principles of the VPN (and that is not included in the tasks of VPN). Authors deal with paid services, security issues and the use of VPN on different platforms.
Comparative overview of VPN technology implementations: What to chooseOur own review of today's most common software solutions for creating virtual private networks. This information may be useful as a starting point for exploring the topic of Virtual Private Network.
Additions to the VPN software implementations overview: Simple wordsIn this article, we looked at the following software solutions for creating virtual private networks: AnyConnect VPN, OpenConnect VPN, SoftEther VPN, and Tinc.
A little about the technology of anonymity on the InternetIntroductory review of VPN solutions, proxy, Tor, combined use cases and examples of other ways to ensure anonymity on the Web.
VPN goals and objectives: why it is neededHere are the basic protocols (plus OpenVPN) and the basic steps that are needed to configure. Great for beginners.
Introducing VPN: BasicsMaterial on VPN principles, VPN types, protocols and VPN encryption.
Small Business VPNA little more detailed analysis of the main features that will allow to organize remote work of employees of a small company.
What's inside: an introduction to IPSec VPN, PPTP VPN, and SSL VPN.
VPN: past, present, futureA translation prepared by the authors of the blog of the company Celecom, and the original was written by Adrien Bridgewater from Computer Weekly. It is about how the development of cloud technology affects the development of VPN.
Anonymity online: just about the complexA bit of “ancient”, but somehow a good series of publications by Pandos , which told about data leakage, Tor, VPN, Whonix and much more.
What you need to know before moving to VPNThe authors of corporate media at Kaspersky Lab share near-technical and legal aspects directly related to the VPN technology, and provide as a useful source a comparative label describing popular VPN providers.

Network for the smallest: VPNA detailed guide from eGuariot and theGluck , which is one of 9 parts of a series of materials on the topic. This material discusses possible connectivity options, Site-to-Site VPN based on GRE and IPSec, a dynamic multipoint virtual network (DMVPN).
Configuring Site-to-Site VPN with pfSense 2.3This is a way to implement technology OpenVPN, designed to create a secure virtual tunnel. This manual will help you to raise Site-to-Site VPN using the pfSense software router, using the example of connecting a private network of 1cloud servers and an external network (physical or virtual).
Additional OpenVPN security featuresIf you are using OpenVPN, we recommend that you pay attention to the additional security tools offered for this product.
This material implies that you have a ready-to-work OpenVPN basic configuration ( instructions for setting up an OpenVPN server for Windows Server 2008/2012).
SBC + VPN + Tor + obfsproxy in your pocket (from the sandbox)Good practical analysis from Revery , which tells about setting up a mobile solution with the ability to "wrap" traffic in a VPN, then in Tor and obfusts it.
Checklist of Windows / Linux server security settingsThis checklist will help you with the configuration and initial verification of the security of your Windows or Linux infrastructure. It lists the available basic measures to prevent possible attacks that do not require special knowledge and skills.
We implement secure VPN protocolThe first part of the good material on the topic, which was prepared by Sergey Matveev, Python and Go, the developer ivi.ru. He does not propose to remake the protocol itself, but simply describes its vision of the possibilities for improvement ( part 2 ).
Transparent bypass in home networkAn interesting guide that Zolg prepared. He suggested redirecting only blocked resources to VPN / Tor, passing the rest in the usual way.
Kill switch for OpenVPN based on iptablesWGH 's story about how to avoid getting active applications to the Internet, including open browser tabs, bypassing the VPN connection (while the VPN connection is not yet established).
Automatic password retrieval for VPN on MikrotikPost 12pz21 on how he set up an automatic update of the connection parameters on Mikrotik. In the material: a little about the parser and the script to create a VPN connection.
MikroTik and 192.168.0.0/24The story of vasilevkirill about how he got at first glance with the simple task of “raising two providers and setting up a VPN between two offices,” and what came of it.
Source: https://habr.com/ru/post/316266/
All Articles