According to Wikipedia, Transport Layer Security (SSL/TLS) can tunnel an entire network’s traffic (as it does in the OpenVPN project and SoftEther VPN project) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through SSL. An SSL VPN can connect from locations where IPsec runs into trouble with Network Address Translation and firewall rules.
According to Wikipedia, Internet Protocol Security (IPsec) as initially developed by the Internet Engineering Task Force (IETF) for IPv6, which was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation. This standards-based security protocol is also widely used with IPv4 and the Layer 2 Tunneling Protocol. Its design meets most security goals: authentication, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination.
A VPN or a virtual private network provides a private network across a public network, as we see with the Internet. The VPN enables a computer to send and receive data across shared networks or public networks as if it is directly connected to the private network, while it is benefiting from the functionality, security and management policies set for the private network. A VPN is created by establishing a virtual (PTP) point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.
Through a (VPN) Virtual Private Network, you can access your private network over the Internet.
A (VPN) virtual private network connection across the Internet is similar to a (WAN) wide area network link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.
VPNs Virtual Private Networks allows employees to securely access their company’s intranet while traveling outside the office’s private network. Similarly, VPNs securely connect geographically different offices of an organization, creating one cohesive network as if it is all under one roof. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location, by masking the ip with another ip or host name with another host name, and this again for the safety of maintaining privacy.
VPN: A network access for remote users:a network that provides remote offices or users with secure access to their organization’s network using the Internet or other public telecommunications system.
1. Proxy hides behind another IP
2. VPN hides the whole entire computer. (much more secure than a proxy)