Comprehensive Report: VPN Replacement Technologies and Future Trends
VerifiedAdded on 2023/01/04
|10
|3533
|1
Report
AI Summary
This report provides a comprehensive analysis of VPN replacement technologies, focusing on the drawbacks of traditional VPN solutions and the advantages of modern alternatives. It begins with a literature review tracing the evolution of VPNs, discussing the technologies employed by IPsec and SSL VPNs, and highlighting the corporate world's confusion in choosing the right VPN. The report then identifies Microsoft DirectAccess, used in conjunction with Active Directory, and the SoftEther multi-protocol VPN program as key alternatives. SoftEther, an open-source VPN supporting both IPsec and SSL, offers features like VoIP and BYOD, alongside security features. The report suggests that while SSL VPNs are gaining popularity due to their simplicity, corporate users will likely choose between Microsoft DirectAccess and multi-protocol VPNs, potentially leading to a future where IPsec-based VPNs are preferred. The report concludes with observations from the study, emphasizing the shift towards more user-friendly and secure VPN solutions.

Running head: VPN REPLACEMENT TECHNOLOGIES
VPN Replacement Technologies
Name of the Student
Name of the University
Author Note
VPN Replacement Technologies
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1VPN REPLACEMENT TECHNOLOGIES
Summary
The purpose of this report is to identify the drawbacks of traditional VPN solutions compared to the
alternatives like Microsoft DirectAccess and multi-protocol VPN programs like SoftEther. The literature
review discusses how VPN solutions have evolved over time. It goes on to explain what technologies are
being employed by the recent implementations of IPsec and SSL VPNs and notes how neither the most
advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred ones by the corporate world. Rather the
businesses are mostly confused and finding it difficult to choose the right VPN for their specific needs. This
gap has led Microsoft to come up with completely different program which acts as an alternative to VPN.
This is nothing but Microsoft DirectAccess and it seen to be used in conjunction with Active Directory. The
other important alternative to traditional VPNs based solely on SSL and IPsec protocols is identified to be
the SoftEther multi-protocol VPN program. The report suggests that SoftEther is an open source free to use
VPN which supports both IPsec and SSL protocols and offers a wide range of features like VoIP, BYOD as
also comprising a host of security features. In the future scope the report notes that the simplicity and ease
of use of SSL based VPN will contribute the growing trend of SSL VPN adoption among the masses while
more serious users like the corporate world will choose between Microsoft DirectAccess or multiprotocol
VPNs like SoftEther and Cisco AnyConnect and because of which the report suggests that VPNs based only
on IPsec may be the sought after VPNs in future. Afterwards observations from the study are given in
concluding notes.
Summary
The purpose of this report is to identify the drawbacks of traditional VPN solutions compared to the
alternatives like Microsoft DirectAccess and multi-protocol VPN programs like SoftEther. The literature
review discusses how VPN solutions have evolved over time. It goes on to explain what technologies are
being employed by the recent implementations of IPsec and SSL VPNs and notes how neither the most
advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred ones by the corporate world. Rather the
businesses are mostly confused and finding it difficult to choose the right VPN for their specific needs. This
gap has led Microsoft to come up with completely different program which acts as an alternative to VPN.
This is nothing but Microsoft DirectAccess and it seen to be used in conjunction with Active Directory. The
other important alternative to traditional VPNs based solely on SSL and IPsec protocols is identified to be
the SoftEther multi-protocol VPN program. The report suggests that SoftEther is an open source free to use
VPN which supports both IPsec and SSL protocols and offers a wide range of features like VoIP, BYOD as
also comprising a host of security features. In the future scope the report notes that the simplicity and ease
of use of SSL based VPN will contribute the growing trend of SSL VPN adoption among the masses while
more serious users like the corporate world will choose between Microsoft DirectAccess or multiprotocol
VPNs like SoftEther and Cisco AnyConnect and because of which the report suggests that VPNs based only
on IPsec may be the sought after VPNs in future. Afterwards observations from the study are given in
concluding notes.

2VPN REPLACEMENT TECHNOLOGIES
Introduction
The following study tries identifying the disadvantages of traditional VPN solutions with respect to the
alternatives as in Microsoft DirectAccess, SoftEther multi-protocol VPN program among others. The
literature review begins by explaining how the VPN solutions have evolved over time and goes on to explain
what technologies are being employed by the recent implementations of IPsec and SSL VPNs. After which it
notes that neither the most advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred ones by the
corporate world. Instead, these businesses are mostly confused and finding it difficult to choose the right
VPN for their specific needs. This gap has led Microsoft to come up with completely different program
which acts as an alternative to VPN. This is nothing but Microsoft DirectAccess and it seen to be used in
conjunction with Active Directory. The other important alternative to traditional VPNs based solely on SSL
and IPsec protocols is identified to be the SoftEther multi-protocol VPN program. The report suggests that
SoftEther is an open source free to use VPN which supports both IPsec and SSL protocols and offers a wide
range of features like VoIP, BYOD as also comprising a host of security features [7]. In the future scope the
report notes that the simplicity and ease of use of SSL based VPN will contribute the growing trend of SSL
VPN adoption among the masses while more serious users like the corporate world will choose between
Microsoft DirectAccess or multiprotocol VPNs like SoftEther and Cisco AnyConnect and because of which
the report suggests that VPNs based only on IPsec may be the sought after VPNs in future [8]. Afterwards
observations from the study are given in concluding notes.
Literature Review
VPN or virtual private network solutions have come a long way. The Cisco Systems VPN client, the
CITES Nortel VPN and Aventail SSL VPN were industry leading VPN solutions at one point of time but has
now become legacy VPNs and are being replaced by alternate solutions. These three legacy systems got
discontinued in 2014. Alternate VPN products like Microsoft DirectAccess, SoftEther VPN, SSL based Open
VPN as well as recent variants from Cisco and Netgear based on IPsec. The traditional VPN systems were
mostly built around Internet protocol security while the most of the newer ones use the SSL protocol.
However, it is not the IPsec that makes a VPN obsolete, many modern-day VPNs are built around IPsec and
expands the possibilities. The primary difference between the old and newer VPNs is that the old VPNs
needed client codes to be installed in the system whereas the newer VPNs make applications usable via the
web browser. Thus, installing VPNs have become more flexible and convenient for users across the world.
This is contributing to the growing popularity of VPNs, among the masses as well as small, medium and
large sized businesses.
Introduction
The following study tries identifying the disadvantages of traditional VPN solutions with respect to the
alternatives as in Microsoft DirectAccess, SoftEther multi-protocol VPN program among others. The
literature review begins by explaining how the VPN solutions have evolved over time and goes on to explain
what technologies are being employed by the recent implementations of IPsec and SSL VPNs. After which it
notes that neither the most advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred ones by the
corporate world. Instead, these businesses are mostly confused and finding it difficult to choose the right
VPN for their specific needs. This gap has led Microsoft to come up with completely different program
which acts as an alternative to VPN. This is nothing but Microsoft DirectAccess and it seen to be used in
conjunction with Active Directory. The other important alternative to traditional VPNs based solely on SSL
and IPsec protocols is identified to be the SoftEther multi-protocol VPN program. The report suggests that
SoftEther is an open source free to use VPN which supports both IPsec and SSL protocols and offers a wide
range of features like VoIP, BYOD as also comprising a host of security features [7]. In the future scope the
report notes that the simplicity and ease of use of SSL based VPN will contribute the growing trend of SSL
VPN adoption among the masses while more serious users like the corporate world will choose between
Microsoft DirectAccess or multiprotocol VPNs like SoftEther and Cisco AnyConnect and because of which
the report suggests that VPNs based only on IPsec may be the sought after VPNs in future [8]. Afterwards
observations from the study are given in concluding notes.
Literature Review
VPN or virtual private network solutions have come a long way. The Cisco Systems VPN client, the
CITES Nortel VPN and Aventail SSL VPN were industry leading VPN solutions at one point of time but has
now become legacy VPNs and are being replaced by alternate solutions. These three legacy systems got
discontinued in 2014. Alternate VPN products like Microsoft DirectAccess, SoftEther VPN, SSL based Open
VPN as well as recent variants from Cisco and Netgear based on IPsec. The traditional VPN systems were
mostly built around Internet protocol security while the most of the newer ones use the SSL protocol.
However, it is not the IPsec that makes a VPN obsolete, many modern-day VPNs are built around IPsec and
expands the possibilities. The primary difference between the old and newer VPNs is that the old VPNs
needed client codes to be installed in the system whereas the newer VPNs make applications usable via the
web browser. Thus, installing VPNs have become more flexible and convenient for users across the world.
This is contributing to the growing popularity of VPNs, among the masses as well as small, medium and
large sized businesses.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3VPN REPLACEMENT TECHNOLOGIES
The newer VPN alternatives based on IPsec are thus network based as opposed to being client
based [3]. These VPNs make two existing networks within an untrusted network connect with other
securely. One such popular solution is the IPsec based Wide Area Networks (WAN) where all the offices of a
particular business connect with one another over the Internet via an IPsec tunnel. Two common types of
these VPNs can be L3VPNs based on MPLS and dynamic multipoint VPNs. Dynamic multipoint VPNs expand
the idea of point to point VPN tunnels to networks connected in cloud, however it is a Cisco terminology
and only limited to Cisco routers [1]. MPLS (Multiprotocol Label Switched) networks are commonly noticed
among networks of service providers like Verizon, CenturyLink and AT&T [11]. MPLS allow these service
providers in virtualizing customer networks so that same the physical network can be shared but is isolated
logically.
SSL VPNs are rapidly emerging VPN technologies providing remote access VPN functionalities
through the SSL feature that is already incorporated in any modern date web browser [9]. The VPNs based
on SSL are typically more versatile than IPsec VPNs. SSL VPNs make use of the SSL (Secure Socket Layer)
protocol as also its successor TLS (Transport Layer Security) protocol and provide secure connections to the
user and the resources of the network. Here users do not require installation of a client software on the
machine for setting up the secure connection as these are clientless VPNs or Web VPNs. Easy of use is
another benefit that can be obtained from SSL VPNs as IPsec implementation varies with respect to the
vendor but in case of SSL, only a modern web browser is all that is needed which the users can choose
themselves without worrying about the operating system [15]. Other advantage of SSL VPNs is that it is free
from restrictions in outbound connections. In case of SSL the outbound secure traffic is HTTPS and it is not
blocked in other environments. In IPsec outbound sessions are often blocked by some local environments.
However, SSL VPNs come with significant share of risks also, the primary risk comes from the use of self-
signed certificates which cannot be trusted as also not staying updated with requisite patches for the
endpoint device. Additional security issues can arise from absence of host security solutions physical access
of attackers to shared machines, keystroke loggers, loss of information from endpoint devices, man in the
middle attacks and hardware limitations. As a result, the vulnerability list for SSL VPNs is also quite long
including the famous Heartbleed vulnerability.
The SoftEther VPN project like Cisco AnyConnect is a multiprotocol VPN solution that makes use of
both IPsec and SSL. Microsoft DirectAccess on the other hand presents a completely different alternative
addressing the same issues that are tackled by VPNs. Though advanced forms of user-friendly IPsec VPNs
are available, solutions like DirectAccess and multiprotocol VPNs are the way to go.
The newer VPN alternatives based on IPsec are thus network based as opposed to being client
based [3]. These VPNs make two existing networks within an untrusted network connect with other
securely. One such popular solution is the IPsec based Wide Area Networks (WAN) where all the offices of a
particular business connect with one another over the Internet via an IPsec tunnel. Two common types of
these VPNs can be L3VPNs based on MPLS and dynamic multipoint VPNs. Dynamic multipoint VPNs expand
the idea of point to point VPN tunnels to networks connected in cloud, however it is a Cisco terminology
and only limited to Cisco routers [1]. MPLS (Multiprotocol Label Switched) networks are commonly noticed
among networks of service providers like Verizon, CenturyLink and AT&T [11]. MPLS allow these service
providers in virtualizing customer networks so that same the physical network can be shared but is isolated
logically.
SSL VPNs are rapidly emerging VPN technologies providing remote access VPN functionalities
through the SSL feature that is already incorporated in any modern date web browser [9]. The VPNs based
on SSL are typically more versatile than IPsec VPNs. SSL VPNs make use of the SSL (Secure Socket Layer)
protocol as also its successor TLS (Transport Layer Security) protocol and provide secure connections to the
user and the resources of the network. Here users do not require installation of a client software on the
machine for setting up the secure connection as these are clientless VPNs or Web VPNs. Easy of use is
another benefit that can be obtained from SSL VPNs as IPsec implementation varies with respect to the
vendor but in case of SSL, only a modern web browser is all that is needed which the users can choose
themselves without worrying about the operating system [15]. Other advantage of SSL VPNs is that it is free
from restrictions in outbound connections. In case of SSL the outbound secure traffic is HTTPS and it is not
blocked in other environments. In IPsec outbound sessions are often blocked by some local environments.
However, SSL VPNs come with significant share of risks also, the primary risk comes from the use of self-
signed certificates which cannot be trusted as also not staying updated with requisite patches for the
endpoint device. Additional security issues can arise from absence of host security solutions physical access
of attackers to shared machines, keystroke loggers, loss of information from endpoint devices, man in the
middle attacks and hardware limitations. As a result, the vulnerability list for SSL VPNs is also quite long
including the famous Heartbleed vulnerability.
The SoftEther VPN project like Cisco AnyConnect is a multiprotocol VPN solution that makes use of
both IPsec and SSL. Microsoft DirectAccess on the other hand presents a completely different alternative
addressing the same issues that are tackled by VPNs. Though advanced forms of user-friendly IPsec VPNs
are available, solutions like DirectAccess and multiprotocol VPNs are the way to go.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4VPN REPLACEMENT TECHNOLOGIES
VPN Alternatives and benefits
Traditional VPNs and drawbacks
Today use of VPNs has become a standard for all medium and large sized businesses and serious
security networks. The older VPN products required a tedious process of setting them up. This includes the
various installation steps coupled with the confusing configuration that were needed from the end user.
One prime example can be Microsoft’s own VPN that comes default with most of the windows based
operating systems [2]. The security protocols, that these VPNs employed either turned them very effective
but difficult to manage and use and very resource hungry or very easy to use popular set ups with
significantly weaker encryption algorithms making them not suitable for corporate and secured networks
like the Point to Point Tunnel Protocol or PPTP. These requirements of support only for their own clients
and specific operating systems turned out to be a serious headache for most businesses. Furthermore,
access to corporate VPNs requires the custom configured ports to be open through the intermediary
firewall which only allows specific ports. Only the HTTP, HTTPS, SMTP and POP3 protocol-based networks
are made available by public networks, hotspots and hotels and custom ports generally get blocked.
Simpler VPN Solutions
SSL/TLS VPNs
The key advantage of SSL based VPNs is the simplicity with which they can be operated. They use
the SSL and TLS protocols that are implemented in all modern web browsers and thus alleviates the need
the additional client VPN software. The encryption methods employed by TLS ensures security for
comprehensive outbound connections as also making them more compatible than traditional VPNs [10].
The administrative workload and technical support requirements are significantly less as they depend
mostly on web enabled clients. As SSL VPNs run through the transport layer, it becomes easier to segment
the network into secured VPN tunnels. Here the VPN servers can even be configured for facilitating specific
access to particular resources instead of the whole network.
Alternatives
Microsoft DirectAccess
Microsoft DirectAccess and SoftEther are among the leading alternatives to traditional VPNs as
both propose a unique set of features in creating and securing private networks among two client devices
without having the same risks and drawbacks as traditional VPNs.
The drawbacks Microsoft identified in traditional VPNs and is trying to address with their
DirectAccess are many. IPsec VPNs involve complex processes to connect the corporate network and thus
the productivity as well as efficiency of employees get reduced. Security tokens get lost resulting in
disproportionate support work from IT on top of which the login procedures are very inconvenient.
VPN Alternatives and benefits
Traditional VPNs and drawbacks
Today use of VPNs has become a standard for all medium and large sized businesses and serious
security networks. The older VPN products required a tedious process of setting them up. This includes the
various installation steps coupled with the confusing configuration that were needed from the end user.
One prime example can be Microsoft’s own VPN that comes default with most of the windows based
operating systems [2]. The security protocols, that these VPNs employed either turned them very effective
but difficult to manage and use and very resource hungry or very easy to use popular set ups with
significantly weaker encryption algorithms making them not suitable for corporate and secured networks
like the Point to Point Tunnel Protocol or PPTP. These requirements of support only for their own clients
and specific operating systems turned out to be a serious headache for most businesses. Furthermore,
access to corporate VPNs requires the custom configured ports to be open through the intermediary
firewall which only allows specific ports. Only the HTTP, HTTPS, SMTP and POP3 protocol-based networks
are made available by public networks, hotspots and hotels and custom ports generally get blocked.
Simpler VPN Solutions
SSL/TLS VPNs
The key advantage of SSL based VPNs is the simplicity with which they can be operated. They use
the SSL and TLS protocols that are implemented in all modern web browsers and thus alleviates the need
the additional client VPN software. The encryption methods employed by TLS ensures security for
comprehensive outbound connections as also making them more compatible than traditional VPNs [10].
The administrative workload and technical support requirements are significantly less as they depend
mostly on web enabled clients. As SSL VPNs run through the transport layer, it becomes easier to segment
the network into secured VPN tunnels. Here the VPN servers can even be configured for facilitating specific
access to particular resources instead of the whole network.
Alternatives
Microsoft DirectAccess
Microsoft DirectAccess and SoftEther are among the leading alternatives to traditional VPNs as
both propose a unique set of features in creating and securing private networks among two client devices
without having the same risks and drawbacks as traditional VPNs.
The drawbacks Microsoft identified in traditional VPNs and is trying to address with their
DirectAccess are many. IPsec VPNs involve complex processes to connect the corporate network and thus
the productivity as well as efficiency of employees get reduced. Security tokens get lost resulting in
disproportionate support work from IT on top of which the login procedures are very inconvenient.

5VPN REPLACEMENT TECHNOLOGIES
Installation of additional VPN software and educating self is using the application is required in these VPNs.
Implementing VPN network channels in corporate WAN networks can get pretty expensive.
In Microsoft DirectAccess, clients have to be connected with the corporate domain as much of the
authentication happens using the Active Directory account. Additionally, the computers should have
certificates obtained from their private internal issuer - Public Key Infrastructure or PKI. The DirectAccess is
always kept on which allows administrators in exercising greater degrees of controls and management over
a particular remote device. As a result, regular updates on security are obtained by the computers thus
reducing vulnerabilities to malwares and problems relating to regulations and compliances [12]. This makes
the user experience in DirectAccess very neat with the remote access being set up in the machine level
when required to access specific corporate resources. This system thus reduces help desk tickets and
increases productivity. Onboarding of clients can simply be performed by adding a computer account to the
respective security group in the Active Directory.
SoftEther Multiprotocol VPN
SoftEther VPN is a very easy to use multi-protocol, cross platform VPN software. It is an open
source VPN that supports Windows, Linux, Mac, FreeBSD and Solaris based operating systems. Being open
source, this VPN is available to end users free of cost [14]. It offers the clone function of OpenVPN and
enables users to integrate between Open VPN and SoftEther seamlessly. Compared to Open VPN, SoftEther
is faster and additionally the Microsoft SSTP VPN for windows based operating systems from Vista onwards
is supported by SoftEther. This simply negates the requirement of getting licenses for windows server to
have VPN based remote access. By using SoftEther, the BYOD or bring your own device service can also be
enjoyed in businesses along with VoIP facilities [16]. Irrespective of whether the device is a PC, tablet,
laptop or even a smartphone, the IPsec/L2TP server function of SoftEther helps set up remote VPN access
from a local network. This L2TP VPN server is easily compatible with Android, Windows and iOS operating
systems making it compatible with android based phones, windows phones as well as iPhones. SoftEther
also comprises of the original SSL protocol for VPNs and is thus able to penetrate all firewalls by using port
443. Thus, the SoftEther VPN ensures fast throughput, no resistance from firewalls and reduced latencies.
How SoftEther works
SoftEther sets up both site to site and remote access specific VPN connections and ensures it with
ease. It uses SSL VPN tunnels on HTTPS for passing through firewalls and NATs and also uses advanced VPN
over DNS as well as VPN over ICMP features. For bridging over the ethernet, both L2TP and L3 IP routing is
used [6]. In order to eliminate the requirement of fixed or static IP addresses, NAT traversal and embedded
dynamic DNS is employed. The encryption algorithms used by SoftEther range from AES 256 bit to RSA
4096bit algorithms [13]. Features like user login and firewall for the internal VPNtunnel is also available.
SoftEther less resource hungry specifically in terms of the CPU and memory compared to other VPNs and
provides high speed performance of up to 1 Gbps.
Installation of additional VPN software and educating self is using the application is required in these VPNs.
Implementing VPN network channels in corporate WAN networks can get pretty expensive.
In Microsoft DirectAccess, clients have to be connected with the corporate domain as much of the
authentication happens using the Active Directory account. Additionally, the computers should have
certificates obtained from their private internal issuer - Public Key Infrastructure or PKI. The DirectAccess is
always kept on which allows administrators in exercising greater degrees of controls and management over
a particular remote device. As a result, regular updates on security are obtained by the computers thus
reducing vulnerabilities to malwares and problems relating to regulations and compliances [12]. This makes
the user experience in DirectAccess very neat with the remote access being set up in the machine level
when required to access specific corporate resources. This system thus reduces help desk tickets and
increases productivity. Onboarding of clients can simply be performed by adding a computer account to the
respective security group in the Active Directory.
SoftEther Multiprotocol VPN
SoftEther VPN is a very easy to use multi-protocol, cross platform VPN software. It is an open
source VPN that supports Windows, Linux, Mac, FreeBSD and Solaris based operating systems. Being open
source, this VPN is available to end users free of cost [14]. It offers the clone function of OpenVPN and
enables users to integrate between Open VPN and SoftEther seamlessly. Compared to Open VPN, SoftEther
is faster and additionally the Microsoft SSTP VPN for windows based operating systems from Vista onwards
is supported by SoftEther. This simply negates the requirement of getting licenses for windows server to
have VPN based remote access. By using SoftEther, the BYOD or bring your own device service can also be
enjoyed in businesses along with VoIP facilities [16]. Irrespective of whether the device is a PC, tablet,
laptop or even a smartphone, the IPsec/L2TP server function of SoftEther helps set up remote VPN access
from a local network. This L2TP VPN server is easily compatible with Android, Windows and iOS operating
systems making it compatible with android based phones, windows phones as well as iPhones. SoftEther
also comprises of the original SSL protocol for VPNs and is thus able to penetrate all firewalls by using port
443. Thus, the SoftEther VPN ensures fast throughput, no resistance from firewalls and reduced latencies.
How SoftEther works
SoftEther sets up both site to site and remote access specific VPN connections and ensures it with
ease. It uses SSL VPN tunnels on HTTPS for passing through firewalls and NATs and also uses advanced VPN
over DNS as well as VPN over ICMP features. For bridging over the ethernet, both L2TP and L3 IP routing is
used [6]. In order to eliminate the requirement of fixed or static IP addresses, NAT traversal and embedded
dynamic DNS is employed. The encryption algorithms used by SoftEther range from AES 256 bit to RSA
4096bit algorithms [13]. Features like user login and firewall for the internal VPNtunnel is also available.
SoftEther less resource hungry specifically in terms of the CPU and memory compared to other VPNs and
provides high speed performance of up to 1 Gbps.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6VPN REPLACEMENT TECHNOLOGIES
Future Scope
The future of VPN can be very interesting. Although Microsoft DirectAccess and SofEther are very
resource efficient compared to traditional VPNs and very easy to use for the end users, the simplest, most
lightweight VPN solution is none other than SSL/TSL based VPNs. As these VPNs can be run through the
web browsers only and the user only has to insert his credentials, this is destined to become the go to VPN
solution for the mainstream users across the globe. However, the moment the stakes of security is upped
by a tier where protection from malwares, zero-day attacks and intrusion prevention become an important
requirement for corporates, and secured networks, SSL/TLS based VPNs may not be the effective VPN
solution. In such situations, solutions like Direct Access from Microsoft and the SoftEther multiprotocol VPN
can play a big role. Both DirectAccess and SoftEther have their share of advantages and disadvantages
against one another. SoftEther may be preferred if an organization is using multiple families of operating
systems and using facilities like VoIP or BYOD [5]. However, business might also be tempted to use
Microsoft DirectAccess for the range of features it offers for the corporate world and its leading support
base. The benefit of getting VPN like services in tandem with Active Directory is admirable for almost all
business that can afford the premium services offered by Microsoft. SoftEther again being a free to use
utility will be preferred by smaller businesses to benefit from most of the services without spending a buck.
Thus, in the near future, these revolutionary VPN programs will almost totally replace traditional as well as
all VPN solutions based solely on IPsec.
Conclusion
In conclusion, this study successfully identifies the disadvantages of traditional VPN solutions with
respect to the alternatives as in Microsoft DirectAccess, SoftEther multi-protocol VPN program among
others. The literature review begins by explaining how the VPN solutions have evolved over time and goes
on to explain what technologies are being employed by the recent implementations of IPsec and SSL VPNs.
After which it notes that neither the most advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred
ones by the corporate world. Instead, these businesses are mostly confused and finding it difficult to
choose the right VPN for their specific needs. This gap has led Microsoft to come up with completely
different program which acts as an alternative to VPN. This is nothing but Microsoft DirectAccess and it
seen to be used in conjunction with Active Directory. The other important alternative to traditional VPNs
based solely on SSL and IPsec protocols is identified to be the SoftEther multi-protocol VPN program. The
report suggests that SoftEther is an open source free to use VPN which supports both IPsec and SSL
protocols and offers a wide range of features like VoIP, BYOD as also comprising a host of security features.
In the future scope the report notes that the simplicity and ease of use of SSL based VPN will contribute the
growing trend of SSL VPN adoption among the masses while more serious users like the corporate world
will choose between Microsoft DirectAccess or multiprotocol VPNs like SoftEther and Cisco AnyConnect and
Future Scope
The future of VPN can be very interesting. Although Microsoft DirectAccess and SofEther are very
resource efficient compared to traditional VPNs and very easy to use for the end users, the simplest, most
lightweight VPN solution is none other than SSL/TSL based VPNs. As these VPNs can be run through the
web browsers only and the user only has to insert his credentials, this is destined to become the go to VPN
solution for the mainstream users across the globe. However, the moment the stakes of security is upped
by a tier where protection from malwares, zero-day attacks and intrusion prevention become an important
requirement for corporates, and secured networks, SSL/TLS based VPNs may not be the effective VPN
solution. In such situations, solutions like Direct Access from Microsoft and the SoftEther multiprotocol VPN
can play a big role. Both DirectAccess and SoftEther have their share of advantages and disadvantages
against one another. SoftEther may be preferred if an organization is using multiple families of operating
systems and using facilities like VoIP or BYOD [5]. However, business might also be tempted to use
Microsoft DirectAccess for the range of features it offers for the corporate world and its leading support
base. The benefit of getting VPN like services in tandem with Active Directory is admirable for almost all
business that can afford the premium services offered by Microsoft. SoftEther again being a free to use
utility will be preferred by smaller businesses to benefit from most of the services without spending a buck.
Thus, in the near future, these revolutionary VPN programs will almost totally replace traditional as well as
all VPN solutions based solely on IPsec.
Conclusion
In conclusion, this study successfully identifies the disadvantages of traditional VPN solutions with
respect to the alternatives as in Microsoft DirectAccess, SoftEther multi-protocol VPN program among
others. The literature review begins by explaining how the VPN solutions have evolved over time and goes
on to explain what technologies are being employed by the recent implementations of IPsec and SSL VPNs.
After which it notes that neither the most advanced IPsec VPNs or SSL/TSL VPNs are seen as the preferred
ones by the corporate world. Instead, these businesses are mostly confused and finding it difficult to
choose the right VPN for their specific needs. This gap has led Microsoft to come up with completely
different program which acts as an alternative to VPN. This is nothing but Microsoft DirectAccess and it
seen to be used in conjunction with Active Directory. The other important alternative to traditional VPNs
based solely on SSL and IPsec protocols is identified to be the SoftEther multi-protocol VPN program. The
report suggests that SoftEther is an open source free to use VPN which supports both IPsec and SSL
protocols and offers a wide range of features like VoIP, BYOD as also comprising a host of security features.
In the future scope the report notes that the simplicity and ease of use of SSL based VPN will contribute the
growing trend of SSL VPN adoption among the masses while more serious users like the corporate world
will choose between Microsoft DirectAccess or multiprotocol VPNs like SoftEther and Cisco AnyConnect and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7VPN REPLACEMENT TECHNOLOGIES
because of which the report suggests that VPNs based only on IPsec may be the sought after VPNs in
future.
because of which the report suggests that VPNs based only on IPsec may be the sought after VPNs in
future.

8VPN REPLACEMENT TECHNOLOGIES
References
[1] A. Bahnasse, and N. El Kamoun, A policy based management of a smart adaptive QoS for the dynamic
and multipoint virtual private network. International Journal of Control and Automation, 9(5), pp.185-198.,
2016.
[2] A. Katuwal, Deploying and Testing IKEv2, Flex VPN and GET VPN., 2018.
[3] A.S.M. Hossain, Implementation considerations of IPsec VPN for small and medium-sized companies.,
2015.
[4] AI. Homoliak, L. Sulak, and P. Hanacek, Features for Behavioral Anomaly Detection of Connectionless
Network Buffer Overflow Attacks. In International Workshop on Information Security Applications (pp. 66-
78). Springer, Cham., 2016, August.
[5] C.H. Liu, and K.C. Huang, The Hard Decision of Mobile Operators: A Dumb Pipe or a Value-Added Service
Provider., 2017.
[6] F.A. Salman, Implementation of IPsec-VPN tunneling using GNS3. Indonesian Journal of Electrical
Engineering and Computer Science, 7(3), pp.855-860., 2017.
[7] J. Keyes, Bring your own devices (BYOD) survival guide. Auerbach Publications., 2016.
[8] L. Ibrahim, Virtual Private Network (VPN) Management and IPSec Tunneling Technology. Middle East, 1.,
2017.
[9] M. Zhang, Study on Remote Access for Library Based on SSL VPN. International Journal of Control and
Automation, 9(1), pp.111-122., 2016.
[10] P. Papadopoulos, N. Kourtellis, and E.P. Markatos, Exclusive: How the (synced) Cookie Monster
breached my encrypted VPN session. In Proceedings of the 11th European Workshop on Systems Security
(p. 6). ACM., 2018, April.
[11] R. Dangi, and A. Jain, A Study on Traffic Engineering Architecture for Multiprotocol Label Switching.,
2015.
[12] Ravichandran, K. Taylor, and P. Waterhouse, DevOps for Digital Leaders. CA., 2016.
[13] S. Barton, Tutorial for using the center for high performance computing at the University of Utah and
an example using random forest., 2016.
[14] T. Kuroda, A combination of Raspberry Pi and SoftEther VPN for controlling research devices via the
Internet. Journal of the experimental analysis of behavior, 108(3), pp.468-484., 2017.
[15] W. Stallings, and M.M. Manna, Operating systems: internals and design principles. Pearson., 2015.
[16] Z. Lin, Y. Huang and J. Wang, Rnn-sm: Fast steganalysis of voip streams using recurrent neural network.
IEEE Transactions on Information Forensics and Security, 13(7), pp.1854-1868., 2018.
References
[1] A. Bahnasse, and N. El Kamoun, A policy based management of a smart adaptive QoS for the dynamic
and multipoint virtual private network. International Journal of Control and Automation, 9(5), pp.185-198.,
2016.
[2] A. Katuwal, Deploying and Testing IKEv2, Flex VPN and GET VPN., 2018.
[3] A.S.M. Hossain, Implementation considerations of IPsec VPN for small and medium-sized companies.,
2015.
[4] AI. Homoliak, L. Sulak, and P. Hanacek, Features for Behavioral Anomaly Detection of Connectionless
Network Buffer Overflow Attacks. In International Workshop on Information Security Applications (pp. 66-
78). Springer, Cham., 2016, August.
[5] C.H. Liu, and K.C. Huang, The Hard Decision of Mobile Operators: A Dumb Pipe or a Value-Added Service
Provider., 2017.
[6] F.A. Salman, Implementation of IPsec-VPN tunneling using GNS3. Indonesian Journal of Electrical
Engineering and Computer Science, 7(3), pp.855-860., 2017.
[7] J. Keyes, Bring your own devices (BYOD) survival guide. Auerbach Publications., 2016.
[8] L. Ibrahim, Virtual Private Network (VPN) Management and IPSec Tunneling Technology. Middle East, 1.,
2017.
[9] M. Zhang, Study on Remote Access for Library Based on SSL VPN. International Journal of Control and
Automation, 9(1), pp.111-122., 2016.
[10] P. Papadopoulos, N. Kourtellis, and E.P. Markatos, Exclusive: How the (synced) Cookie Monster
breached my encrypted VPN session. In Proceedings of the 11th European Workshop on Systems Security
(p. 6). ACM., 2018, April.
[11] R. Dangi, and A. Jain, A Study on Traffic Engineering Architecture for Multiprotocol Label Switching.,
2015.
[12] Ravichandran, K. Taylor, and P. Waterhouse, DevOps for Digital Leaders. CA., 2016.
[13] S. Barton, Tutorial for using the center for high performance computing at the University of Utah and
an example using random forest., 2016.
[14] T. Kuroda, A combination of Raspberry Pi and SoftEther VPN for controlling research devices via the
Internet. Journal of the experimental analysis of behavior, 108(3), pp.468-484., 2017.
[15] W. Stallings, and M.M. Manna, Operating systems: internals and design principles. Pearson., 2015.
[16] Z. Lin, Y. Huang and J. Wang, Rnn-sm: Fast steganalysis of voip streams using recurrent neural network.
IEEE Transactions on Information Forensics and Security, 13(7), pp.1854-1868., 2018.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9VPN REPLACEMENT TECHNOLOGIES
1 out of 10
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.
