This assignment discusses the various protocols used by VPN for tunneling, including Internet Protocol Security (IPSEC), Layer2 Tunneling Protocol (L2TP), Point-to-Point Tunneling Protocol (PPTP), and Secure Sockets Layer (SSL). It also outlines the process of setting up a VPN in a campus environment, highlighting user-based authentication, encryption, and data authentication. The study uses a deductive approach and secondary sources to analyze the existing literature on VPNs. The expected outcomes include an explanation of the setup process, identification of required hardware and software tools, and description of benefits for students and the university.