Statements (165)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:cloud_service
gptkb:smartphone computer networking network concept |
gptkbp:abbreviation |
gptkb:VPN
gptkb:VPC gptkb:VPWS |
gptkbp:alternativeName |
VPN_appliance
VPN_client VPN_client_software VPN_protocol VPN_service VPN_software Virtual_Circuit Virtual_Private_Cloud Virtual_Private_Network_technology Virtual_Private_Wire_Service virtual_private_network |
gptkbp:alternativeTo |
gptkb:Tor_network
reverse proxy |
gptkbp:blockedIn |
gptkb:China
gptkb:Iran gptkb:Russia firewalls network administrators |
gptkbp:can_be_free |
yes
|
gptkbp:can_be_paid |
yes
|
gptkbp:can_be_self-hosted |
yes
|
gptkbp:can_mask |
IP address
|
gptkbp:canBe |
multi-factor authentication
client-to-site remote access site-to-site anonymous browsing client-to-client kill switch split tunneling accessing blocked websites secure Wi-Fi usage permanent virtual circuit (PVC) switched virtual circuit (SVC) |
gptkbp:canBeBypassedBy |
geo-restrictions
internet censorship |
gptkbp:category |
Computer networking
Telecommunications computer networking cybersecurity cloud security cloud networking internet privacy |
gptkbp:commercialUse |
yes
|
gptkbp:common_use_case |
remote work
public Wi-Fi security streaming services access |
gptkbp:component |
VPN server
Virtual Private Network VPN tunnel |
gptkbp:contrastsWith |
connectionless communication
datagram communication |
gptkbp:definedIn |
gptkb:IETF
|
gptkbp:detects |
deep packet inspection
|
gptkbp:enables |
gptkb:Layer_2_VPN
connection-oriented communication resource reservation bypassing geo-restrictions encrypted data transmission network access control lists subnet creation network gateway configuration route table configuration security group configuration custom IP address range predictable routing |
gptkbp:establishedBy |
setup phase
|
gptkbp:feature |
anonymity
data encryption IP address masking location spoofing |
gptkbp:features |
encryption
authentication confidentiality data integrity tunneling |
gptkbp:firstAppearance |
1990s
|
gptkbp:identified_by |
virtual circuit identifier (VCI)
|
gptkbp:implementedIn |
gptkb:Layer_3_(Network_Layer)
extranet VPN intranet VPN Layer 2 (Data Link Layer) remote access VPN site-to-site VPN client-to-site VPN |
gptkbp:introducedIn |
1990s
|
gptkbp:maintainedBy |
state information
|
gptkbp:offeredBy |
gptkb:Google_Cloud_Platform
gptkb:Amazon_Web_Services gptkb:Microsoft_Azure |
gptkbp:provides |
error control
flow control sequencing reliable data transfer point-to-point connectivity isolated virtual network |
gptkbp:purpose |
privacy protection
remote access secure communication |
gptkbp:regulates |
local laws
|
gptkbp:relatedTo |
gptkb:MPLS
gptkb:SSL/TLS gptkb:Tor_network gptkb:fire gptkb:Pseudowire gptkb:Virtual_Private_LAN_Service cloud computing encryption network security internet privacy zero trust security reverse proxy |
gptkbp:requires |
authentication
internet connection connection setup connection teardown |
gptkbp:riskFactor |
possible speed reduction
potential data logging trust in VPN provider |
gptkbp:supports |
VPN connections
private connectivity hybrid cloud deployments public connectivity |
gptkbp:supportsProtocol |
gptkb:MPLS
gptkb:L2TPv3 gptkb:GRE gptkb:IPsec gptkb:L2TP gptkb:OpenVPN gptkb:PPTP gptkb:WireGuard gptkb:SSTP |
gptkbp:used_in |
gptkb:X.25
gptkb:ATM_(Asynchronous_Transfer_Mode) individuals packet-switched networks telecommunications businesses computer networks developers enterprises frame relay |
gptkbp:usedBy |
individuals
businesses |
gptkbp:usedFor |
accessing restricted content
secure remote work protecting data on public Wi-Fi hosting resources in the cloud secure cloud resource management |
gptkbp:usedIn |
gptkb:MPLS_networks
Ethernet networks |
gptkbp:vulnerableTo |
DNS leaks
IP leaks weak encryption |
gptkbp:bfsParent |
gptkb:VPN
gptkb:TLS_1.3 gptkb:OPERA |
gptkbp:bfsLayer |
5
|