IntroductionThe VPN technology has adapted to access the Enterprises Intranet. Now VPN security is a big issue for almost every organization in order to provide protection for system infrastructure. The Truth is that no one assertions full evidence on security scheme since the internet usage is growing exponentially across the globe. Particularly, according toRama and Anup (2020), revealed that in COVID-19 Pandemic, Internet usage has been improved by up to 90% due to the culture Work from-home by nearly every business. VPN technology offers a fashion of protecting data information being carried over the Internet, by granting remote users to set up a secure virtual private 'tunnel' to get into an internal network, gain access to available resources, data information and communications through an unsafe network such as the Internet cyberspace (United States Patent Burns, 2018). The review Giris and Vishal (2021) stated that, many businesses protected themselves from the cyberspace by means of firewalls and VPN encryption techniques. VPN considered to be an effective and efficient mechanism to transport traffic on an unsafe network. It comprises a union of encrypting, authentication and tunnel. VPNs has been established and proved to be that effective to substitute previous system of lease lines to make private network in a business enterprise (Natalia, 2021 andMazlan et al., 2010). VPNs usually oppressed by business enterprises to link central office/Head-office with subdivision office, main office for distant employees or roaming users, business collaborator sites and remote network users of their join network. There are numerous unlike types of VPNs available. The most commonly types of VPN used in nowadays are as follows: (a) Point-to-Point Tunnelling Protocol VPN (PPTP VPN, PPTP VPN) is an easy method for VPN and can also be called as Dial-up VPN. It is software-built VPN that uses an existing internet network to create VPN connection. Using this existing connection, a remote client will be able to link to remote network because of secure VPN tunnel created by the software between these remote endpoints