The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer. All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. This policy is subject to change at any time. The owner is not an attorney, and nothing posted on this site should be construed as legal advice. Litigation Support Tip of the Night does not provide confirmation that any e-discovery technique or conduct is compliant with legal, regulatory, contractual or ethical requirements.
New tips for paralegals and litigation support profesionals are posted to this site each night. Click on the blog headings for better detail.
Avenir Light is a clean and stylish font favored by designers. It's easy on the eyes and a great go to font for titles, paragraphs & more.
Nov 4, 2020
Virtual private networks can use different protocols.
1. OpenVPN is the most widely used VPN protocol, and is considered to be the most secure protocol. There are actually two different versions of OpenVPN - OpenVPN with UDP (User Datagram Protocol), or OpenVPN with TCP (Transmission Control Protocol). The latter is slower, but more stable.
2. Internet Protocol Security (IPSec) differs from OpenVPN in that it does not require a third party application. It works on the network level, rather than using SSL (secure socket layer), like OpenVPN.
3. WireGuard is an experimental VPN protocol that has not been widely adopted. It should offer faster performance, and it was designed for use on cell phones since it switches between network interfaces without dropping the connection.
4. Point-to-Point Tunneling Protocol (PPTP) is an older protocol with security vulnerabilities that should be avoided.