A good "tutorial" for those who are just beginning to get acquainted with the principles of the VPN (and that is not included in the tasks of VPN). Authors deal with paid services, security issues and the use of VPN on different platforms.
Our own review of today's most common software solutions for creating virtual private networks. This information may be useful as a starting point for exploring the topic of Virtual Private Network.
In this article, we looked at the following software solutions for creating virtual private networks: AnyConnect VPN, OpenConnect VPN, SoftEther VPN, and Tinc.
Introductory review of VPN solutions, proxy, Tor, combined use cases and examples of other ways to ensure anonymity on the Web.
Here are the basic protocols (plus OpenVPN) and the basic steps that are needed to configure. Great for beginners.
Material on VPN principles, VPN types, protocols and VPN encryption.
A little more detailed analysis of the main features that will allow to organize remote work of employees of a small company.
What's inside: an introduction to IPSec VPN, PPTP VPN, and SSL VPN.
A translation prepared by the authors of the blog of the company Celecom, and the original was written by Adrien Bridgewater from Computer Weekly. It is about how the development of cloud technology affects the development of VPN.
A bit of “ancient”, but somehow a good series of publications by Pandos , which told about data leakage, Tor, VPN, Whonix and much more.
The authors of corporate media at Kaspersky Lab share near-technical and legal aspects directly related to the VPN technology, and provide as a useful source a comparative label describing popular VPN providers.
A detailed guide from eGuariot and theGluck , which is one of 9 parts of a series of materials on the topic. This material discusses possible connectivity options, Site-to-Site VPN based on GRE and IPSec, a dynamic multipoint virtual network (DMVPN).
This is a way to implement technology OpenVPN, designed to create a secure virtual tunnel. This manual will help you to raise Site-to-Site VPN using the pfSense software router, using the example of connecting a private network of 1cloud servers and an external network (physical or virtual).
If you are using OpenVPN, we recommend that you pay attention to the additional security tools offered for this product.
This material implies that you have a ready-to-work OpenVPN basic configuration ( instructions for setting up an OpenVPN server for Windows Server 2008/2012).
Good practical analysis from Revery , which tells about setting up a mobile solution with the ability to "wrap" traffic in a VPN, then in Tor and obfusts it.
This checklist will help you with the configuration and initial verification of the security of your Windows or Linux infrastructure. It lists the available basic measures to prevent possible attacks that do not require special knowledge and skills.
The first part of the good material on the topic, which was prepared by Sergey Matveev, Python and Go, the developer ivi.ru. He does not propose to remake the protocol itself, but simply describes its vision of the possibilities for improvement ( part 2 ).
An interesting guide that Zolg prepared. He suggested redirecting only blocked resources to VPN / Tor, passing the rest in the usual way.
WGH 's story about how to avoid getting active applications to the Internet, including open browser tabs, bypassing the VPN connection (while the VPN connection is not yet established).
Post 12pz21 on how he set up an automatic update of the connection parameters on Mikrotik. In the material: a little about the parser and the script to create a VPN connection.
The story of vasilevkirill about how he got at first glance with the simple task of “raising two providers and setting up a VPN between two offices,” and what came of it.
Source: https://habr.com/ru/post/316266/
All Articles