Virtual Private Network

GPTKB entity

Statements (165)
Predicate Object
gptkbp:instanceOf gptkb:cloud_service
gptkb:smartphone
computer networking
network concept
gptkbp:abbreviation gptkb:VPN
gptkb:VPC
gptkb:VPWS
gptkbp:alternativeName VPN_appliance
VPN_client
VPN_client_software
VPN_protocol
VPN_service
VPN_software
Virtual_Circuit
Virtual_Private_Cloud
Virtual_Private_Network_technology
Virtual_Private_Wire_Service
virtual_private_network
gptkbp:alternativeTo gptkb:Tor_network
reverse proxy
gptkbp:blockedIn gptkb:China
gptkb:Iran
gptkb:Russia
firewalls
network administrators
gptkbp:can_be_free yes
gptkbp:can_be_paid yes
gptkbp:can_be_self-hosted yes
gptkbp:can_mask IP address
gptkbp:canBe multi-factor authentication
client-to-site
remote access
site-to-site
anonymous browsing
client-to-client
kill switch
split tunneling
accessing blocked websites
secure Wi-Fi usage
permanent virtual circuit (PVC)
switched virtual circuit (SVC)
gptkbp:canBeBypassedBy geo-restrictions
internet censorship
gptkbp:category Computer networking
Telecommunications
computer networking
cybersecurity
cloud security
cloud networking
internet privacy
gptkbp:commercialUse yes
gptkbp:common_use_case remote work
public Wi-Fi security
streaming services access
gptkbp:component VPN server
Virtual Private Network
VPN tunnel
gptkbp:contrastsWith connectionless communication
datagram communication
gptkbp:definedIn gptkb:IETF
gptkbp:detects deep packet inspection
gptkbp:enables gptkb:Layer_2_VPN
connection-oriented communication
resource reservation
bypassing geo-restrictions
encrypted data transmission
network access control lists
subnet creation
network gateway configuration
route table configuration
security group configuration
custom IP address range
predictable routing
gptkbp:establishedBy setup phase
gptkbp:feature anonymity
data encryption
IP address masking
location spoofing
gptkbp:features encryption
authentication
confidentiality
data integrity
tunneling
gptkbp:firstAppearance 1990s
gptkbp:identified_by virtual circuit identifier (VCI)
gptkbp:implementedIn gptkb:Layer_3_(Network_Layer)
extranet VPN
intranet VPN
Layer 2 (Data Link Layer)
remote access VPN
site-to-site VPN
client-to-site VPN
gptkbp:introducedIn 1990s
gptkbp:maintainedBy state information
gptkbp:offeredBy gptkb:Google_Cloud_Platform
gptkb:Amazon_Web_Services
gptkb:Microsoft_Azure
gptkbp:provides error control
flow control
sequencing
reliable data transfer
point-to-point connectivity
isolated virtual network
gptkbp:purpose privacy protection
remote access
secure communication
gptkbp:regulates local laws
gptkbp:relatedTo gptkb:MPLS
gptkb:SSL/TLS
gptkb:Tor_network
gptkb:fire
gptkb:Pseudowire
gptkb:Virtual_Private_LAN_Service
cloud computing
encryption
network security
internet privacy
zero trust security
reverse proxy
gptkbp:requires authentication
internet connection
connection setup
connection teardown
gptkbp:riskFactor possible speed reduction
potential data logging
trust in VPN provider
gptkbp:supports VPN connections
private connectivity
hybrid cloud deployments
public connectivity
gptkbp:supportsProtocol gptkb:MPLS
gptkb:L2TPv3
gptkb:GRE
gptkb:IPsec
gptkb:L2TP
gptkb:OpenVPN
gptkb:PPTP
gptkb:WireGuard
gptkb:SSTP
gptkbp:used_in gptkb:X.25
gptkb:ATM_(Asynchronous_Transfer_Mode)
individuals
packet-switched networks
telecommunications
businesses
computer networks
developers
enterprises
frame relay
gptkbp:usedBy individuals
businesses
gptkbp:usedFor accessing restricted content
secure remote work
protecting data on public Wi-Fi
hosting resources in the cloud
secure cloud resource management
gptkbp:usedIn gptkb:MPLS_networks
Ethernet networks
gptkbp:vulnerableTo DNS leaks
IP leaks
weak encryption
gptkbp:bfsParent gptkb:VPN
gptkb:TLS_1.3
gptkb:OPERA
gptkbp:bfsLayer 5