The 5 Major VPN Protocols Explained
Whatsapp Pinterest

You’ve probably heard this: “you need to use a VPN to protect your privacy 6 Logless VPNs That Take Your Privacy Seriously 6 Logless VPNs That Take Your Privacy Seriously In an age where every online movement is tracked and logged, a VPN seems a logical choice. We've taken a look at six VPNs that take your anonymity seriously. Read More .” Now, you’re thinking: “Okay, but how does a VPN actually work?”

That’s understandable. While everyone suggests using one, not many take the time to explain some of the core VPN technologies. In this article, we’re going to explain what VPN protocols are, their differences, and what you should look out for.

What Is a VPN?

Before we look at specific VPN protocols, let’s quickly remind ourselves what a VPN is What's the Difference Between SSH vs. VPN and Which Is More Secure? What's the Difference Between SSH vs. VPN and Which Is More Secure? SSH and VPNs aren't competing technology. They solve different problems. But when should you use one over the other? Read More .

At its most basic, a VPN allows you to access the public internet using a private connection. When you click a link on the internet, your request passes to the correct server, usually returning the correct content. Your data essentially flows, unhindered, from A to B, and a website or service can see your IP address, among other identifying data.

When you use a VPN, all of your requests are first routed through a private server, owned by the VPN provider. Your request heads from A through C to B. You can still access all the data previously available to you (and more, in some cases). But the website or service only has the data of the VPN provider: their IP address, and so on.

There are many uses for a VPN 11 Reasons Why You Should Be Using a VPN 11 Reasons Why You Should Be Using a VPN Virtual private networks are affordable and easy to use. Here are some reasons why you should be using a VPN if you aren't yet. Read More , including protecting your data and identity, avoiding repressive censorship, and encrypting your communications How Does Encryption Work, and Is It Really Safe? How Does Encryption Work, and Is It Really Safe? Read More .

What Are VPN Protocols?

A VPN protocol determines exactly how your data routes between your computer and the VPN server. Protocols have different specifications, offering benefits to users in a range of circumstances. For instance, some prioritize speed, while others focus on privacy and security.

Let’s take a look at the most common VPN protocols.

1. OpenVPN

OpenVPN is an open source VPN protocol. This means users can scrutinize its source code for vulnerabilities, or use it in other projects. OpenVPN has become one of the most important VPN protocols. As well as being open source, OpenVPN is also one of the most secure protocols. OpenVPN allows users to protect their data using essentially unbreakable AES-256 bit key encryption (amongst others), with 2048-bit RSA authentication, and a 160-bit SHA1 hash algorithm.


In addition to providing strong encryption, OpenVPN is also available to almost every platform Connect Your Smartphone to Almost Any VPN Using OpenVPN Connect Connect Your Smartphone to Almost Any VPN Using OpenVPN Connect A VPN can help protect your data on the move. But what if your VPN provider doesn't offer an app? Here's how to setup almost any VPN on your smartphone using OpenVPN Connect. Read More : Windows, macOS, Linux, Android, iOS, routers, and more. Even Windows Phone and Blackberry can utilize it!

The OpenVPN protocol has faced criticism in the past due to low speeds. However, recent implementations have resulted in some boosts, and the focus on security and privacy is well worth considering.

2. L2TP/IPSec

Layer 2 Tunnel Protocol is a very popular VPN protocol. L2TP is the successor to the depreciated PPTP (for more details, see the PPTP section below), developed by Microsoft, and L2F, developed by Cisco. However, L2TP doesn’t actually provide any encryption or privacy itself.

Accordingly, services that use L2TP are frequently bundled with security protocol IPsec. Once implemented, L2TP/IPSec becomes one of the most secure VPN connections available. It uses AES-256 bit encryption, and has no known vulnerabilities (though IPSec has allegedly been compromised by the NSA Tomorrow's Surveillance: Four Technologies The NSA Will Use to Spy on You - Soon Tomorrow's Surveillance: Four Technologies The NSA Will Use to Spy on You - Soon Surveillance is always on the cutting edge of technology. Here are four technologies that will be used to violate your privacy over the next few years. Read More ).

That said, while L2TP/IPSec has no known vulnerabilities, it does have some slight flaws. For instance, the protocol defaults to use UDP on port 500. This makes traffic easier to spot and block.


Secure Socket Tunneling Protocol is another popular VPN protocol. SSTP comes with one notable benefit: it has been fully integrated with every Microsoft operating system since Windows Vista Service Pack 1. This means you can use SSTP with Winlogon, or for increased security, a smart chip. Furthermore, many VPN providers have specific integrated Windows SSTP instructions available. You can find these on your VPN provider’s website.

security vpn smartphone
Image Credit: Denys Prykhodov via Shutterstock

SSTP uses 2048-bit SSL/TLS certificates for authentication and 256-bit SSL keys for encryption. Overall, SSTP is quite secure.

SSTP is essentially a Microsoft-developed proprietary protocol. This means nobody can fully audit the underlying code. However, most still consider SSTP secure.

Finally, SSTP has native support for Windows, Linux, and BSD systems. Android, macOS, and iOS have support via third party clients.

4. IKEv2

internet Key Exchange version 2 is another VPN protocol developed by Microsoft and Cisco. IKEv2 on its own is just a tunneling protocol, providing a secure key exchange session. Therefore (and like its predecessor), IKEv2 is frequently paired with IPSec for encryption and authentication.

While IKEv2 isn’t as popular as other VPN protocols, it features in many mobile VPN solutions. This is because it is adept at reconnecting during moments of temporary internet connection loss, as well as during a network switch (from Wi-Fi to mobile data, for instance).

IKEv2 is a proprietary protocol, with native support for Windows, iOS, and Blackberry devices. Open source implementations are available for Linux, and Android support is available through third party apps.

Unfortunately, while IKEv2 is great for mobile connections, there’s strong evidence that the NSA is actively exploiting Your Interest in Privacy Will Ensure You're Targeted by the NSA Your Interest in Privacy Will Ensure You're Targeted by the NSA Yes, that's right. If you care about privacy, you may be added to a list. Read More IKE flaws to undermine IPSec traffic. Therefore, using an open source implementation is vital for security.


Point-to-Point Tunneling Protocol is one of the oldest VPN protocols. It is still in use in some places, but the majority of services have long upgraded to faster and more secure protocols.

PPTP was introduced way back in 1995. It was actually integrated with Windows 95, designed to work with dial-up connections. At the time, it was extremely useful.

But the VPN technology has progressed, and PPTP is no longer secure. Governments and criminals cracked PPTP encryption long ago, making any data sent using the protocol unsecure.

However, it isn’t quite dead… yet. You see, some people find PPTP gives the best connection speeds, precisely due to the lack of security features (when compared to modern protocols). As such, it still sees use for users simply wanting to watch Netflix from a different location Which VPNs Still Work With Netflix? Which VPNs Still Work With Netflix? Netflix is cracking down on VPNs, but there are a few that still work. Here are the best VPNs to use with Netflix. Read More .

Let’s Summarize the VPN Protocols

We’ve looked at the five major VPN protocols. Let’s quickly summarize their pros and cons.

  • OpenVPN: Open source, offers strongest encryption, suitable for all activities, if a little slow at times
  • L2TP/IPSec: Widely used protocol, good speeds, but easily blocked due to reliance on single port
  • SSTP: Good security, difficult to block and detect
  • IKEv2: Fast, mobile friendly, with several open source implementations (potentially undermined by NSA)
  • PPTP: Fast, widely supported, but full of security holes, only use for streaming and basic web browsing

For complete security and peace of mind, choose a VPN provider that offers you choice of protocol. Furthermore, MakeUseOf advise using a paid VPN solution, like ExpressVPN, rather than a free service. When you pay for a VPN, you’re buying a service. When you use a free VPN, you’ve got no idea what they might do 5 Reasons You Need to Stop Using Free VPNs Right Now 5 Reasons You Need to Stop Using Free VPNs Right Now Free VPNs are very tempting, but hold on. If you're thinking of signing up to one, you should read this article first. Here are the biggest risks with using a free VPN service. Read More with your data.

Unsure where to start? Check out our list of the best VPN services The Best VPN Services The Best VPN Services We've compiled a list of what we consider to be the best Virtual Private Network (VPN) service providers, grouped by premium, free, and torrent-friendly. Read More .

Which VPN protocol do you normally use? Does your VPN provider offer a choice? Tell us what you’re using down in the comments!

Explore more about: Online Privacy, Online Security, VPN.

Enjoyed this article? Stay informed by joining our newsletter!

Enter your Email

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Matt
    October 12, 2017 at 9:05 pm

    Is it a coincidence that ExpressVPN offers every one of these?