Which of the following are examples of protocols used for VPN implementations?