By using IPSec, entities that have IP addresses can create a secure
tunnel.
|
Many types of VPN protocols offer varying levels of security and
other features. The most commonly used tunneling protocols in the
VPN industry are Point-to-Point Tunnel Protocol (PPTP), Layer Two
Tunneling Protocol (L2TP), IPSec, Secure Socket Tunneling Protocol
(SSTP), and OpenVPN.
|