Common protocols include PPTP, L2TP/IPsec, OpenVPN ... in which the outer header contains the attackers’ source IP with the vulnerable host’s IP as the destination. The inner header’s ...