VPN protocols: 7 types and comparisons - Norton (2024)

Virtual private networks (VPNs) enable users to send and receive data securely using data packet encryption. This serves the dual purpose of keeping your online activity and the data you transmit private, while enabling you to access content freely at home and on the move. But VPNs wouldn’t be able to do all of that without the right protocols in place.

VPN providers typically use different combinations of protocols to deliver robust security over their networks. As a bonus, more flexible VPN apps even let you choose which protocol to use based on your preferences. That means you can decide whether to prioritize security, speed, customization, or usability.

Learn more about some of the top VPN protocols, how they work, and what makes them stand out:

What are VPN protocols?

VPN protocols are a set of rules that dictate how data is encrypted and transmitted between a virtual private network server and your device. VPNs use these protocols to help establish secure online connections, protecting in-transit data from interception, manipulation, surveillance, and unauthorized access.

How do VPN protocols work?

VPN protocols work by using predetermined rules to encrypt, transmit, and authenticate data, ensuring private communication between the device and VPN server. Once a connection is established, all in-transit data travels through a secure tunnel, protecting it from eavesdropping, tampering, and other cybersecurity threats.

Here’s a closer look at how VPN protocols protect your online privacy:

  1. Initiation: The user activates their VPN via the client on their device, which sends a connection request to the VPN server.
  2. Authentication: The VPN client software and server verify the other’s identity by exchanging passwords, encryption keys, or other credentials.
  3. Encryption: Once the secure connection is established, the cryptographic encryption algorithm encrypts the data, making it unreadable to those without a decryption key.
  4. Tunneling: The encrypted data is nested inside the protocol’s data packets, which contain routing information to help the secured data make its way through VPN tunnels across networks.
  5. Transmission: The encapsulated and encrypted data is transmitted across the internet to the VPN server.
  6. Decryption and routing: The VPN server strips off the outer layer to access the encrypted data inside using a decryption key.
  7. Response: When the response from the destination is ready to be returned, it’s encrypted, encapsulated, and sent back through the secure tunnel to the VPN client.

Now that you understand how VPN protocols work, let’s explore the types of VPN protocols you can use and when it makes sense to use them.

7 types of VPN protocols

There are several types of VPN protocols, including the Internet Key Exchange version 2 (IKEv2), Layer 2 Tunneling Protocol (L2TP), Lightway, Mimic, OpenVPN, Secure Socket Tunneling Protocol (SSTP), and WireGuard. The best VPN for you depends on which features it offers and how well it suits your needs

VPN typeOperating system compatibilitySecurity and encryptionSpeed
IKEv2Android, iOS, Linux, macOS, Windows, and routersHighHigh
L2TPAndroid, iOS, Linux, macOS, Windows, and routersModerateModerate
LightwayAndroid, iOS, Linux, macOS, Windows, and routersHighHigh
MimicAndroid, iOS, macOS, and WindowsHighHigh
OpenVPNAndroid, BSD, iOS, Linux, macOS, Solaris, and Windows (server must be installed on Linux OS)HighModerate
SSTPWindowsModerateModerate
WireGuardAndroid, BSD, iOS, macOS, and WindowsHighHigh

1. Internet Key Exchange version 2 (IKEv2)

IKEv2 is a VPN key exchange protocol that creates a tunnel between the VPN client and server to help guard data during transmission. However, it can’t perform encryption without a helper protocol like IPsec (Internet Protocol Security).

Using the protocol’s pre-determined settings, IKEv2 negotiates an encryption agreement, and IPsec scrambles the data, making it unreadable. Together, these protocols are referred to as IKEv2/IPsec and can create a secure tunnel.

VPN protocols: 7 types and comparisons - Norton (1)
  • Developer(s): IBM
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Secure connections, fast, reliable, and automatic reconnection
  • Cons: Limited customizability, sometimes restricted by firewalls, and slower than other protocols

2. Layer 2 Tunneling Protocol (L2TP)

L2TP is a VPN protocol often used with IPsec to deliver AES-256 encryption, which is used to create secure connections between devices and VPN servers over internet networks. On its own, L2TP doesn’t have encryption or authentication capabilities. However, when used with other protocols like IPsec, VPN providers can create secure tunnels allowing data to pass securely over public networks.

  • Developer(s): Cisco and Microsoft
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Straightforward setup and firewall-friendly
  • Cons: No built-in encryption, and an older protocol

3. Lightway

Lightway is a lightweight VPN protocol that delivers reliable internet security. Unlike some alternatives, Lightway can handle security negotiation and data encryption without sacrificing quality. This VPN protocol is often used for video streaming and gaming security, because its speed contributes to a smoother overall experience.

VPN protocols: 7 types and comparisons - Norton (3)
  • Developer(s): ExpressVPN
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Fast, secure encryption and authentication protocols, minimal battery consumption, automatic reconnection, and VPN traffic concealment
  • Cons: Only available through ExpressVPN and development is dependent on them

4. Mimic

Mimic is a newer VPN protocol that stands apart from other options by masking itself as an unassuming HTTPS connection that you might use to check your email, stream your favorite show, or look up a dinner recipe. Aside from its encryption capabilities, Mimic doesn’t require additional configuration, uses less power, is eco-friendly, and is capable of establishing high-speed connections and transfers.

Mimic also has an impressive resistance to quantum attacks, which can ultimately help protect users from emerging computing threats. This proprietary protocol is one of the types you can choose from within the Norton Secure VPN application, and it’s a strong option. With it, Norton can offer you core VPN capabilities like bank-grade encryption, anonymous browsing, and split tunneling.

VPN protocols: 7 types and comparisons - Norton (4)
  • Developer(s): Gen Digital Inc.
  • Compatible with: Android, iOS, and Windows
  • Pros: Establishes connections quickly, resists cryptographic attacks, and masks user location
  • Cons: Limited configurations

5. OpenVPN

OpenVPN supports both client and server applications, and allows peers to authenticate each other using various methods. It makes extensive use of the OpenSSL encryption library and the TLS protocol, offering many security and control features. Beyond that, this VPN protocol is highly customizable, allowing users to configure connection settings to their specifications.

VPN protocols: 7 types and comparisons - Norton (5)
  • Developer(s): OpenVPN, Inc.
  • Compatible with: Android, FreeBSD, iOS, Linux, macOS, NetBSD, OpenBSD, Solaris, and Windows (server must be installed on Linux OS)
  • Pros: Industry-standard encryption, high customizability, and open-source
  • Cons: Complex setup, slower connection speeds, and lacks native integration

6. Secure Socket Tunneling Protocol (SSTP)

SSTP is a VPN protocol that leverages SSL (Secure Sockets Layer) technology to remotely access Windows devices and help encrypt internet traffic. While less cutting-edge than some alternatives, this VPN protocol is convenient, as most new Windows devices come with it built-in.

But to access enhanced security features, enjoy faster speeds, choose from more server locations, and strengthen anonymous browsing on Windows PCs, you’ll still need to download a third-party VPN.

VPN protocols: 7 types and comparisons - Norton (6)
  • Developer(s): Microsoft
  • Compatible with: Windows
  • Pros: Easily accessible to Windows users and firewall-friendly
  • Cons: Not compatible with non-Windows devices; closed-source and less robust security protocols than other encryption methods

7. WireGuard

WireGuard is a cross-platform VPN protocol that uses cryptography to create secure tunnels, often for secure streaming and private browsing. This protocol hasn’t been around long but is already gaining popularity due to its speed and user-friendliness, and it’s now an option you can choose from in Norton Secure VPN.

However, it’s important to note that though WireGuard is well-regarded in the cybersecurity industry, it’s still under development. While WireGuard hasn’t confirmed what they’re working on, they say they are working toward creating a faster, leaner, and more useful VPN protocol.

VPN protocols: 7 types and comparisons - Norton (7)
  • Developer(s): WireGuard
  • Compatible with: Android, BSD, iOS, macOS, and Windows
  • Pros: Fast, easy configuration and state-of-the-art encryption
  • Cons: Newer protocol that lacks key features like dynamic IP address assignment; configuration errors may compromise security

How to choose the best VPN protocol

Consider factors like security, device and operating system compatibility, user-friendliness, reliability, and log policy when selecting a VPN protocol. Here are some tips to help you make your decision:

  • Security: Capabilities like encryption and authentication are important for scrambling your data, connecting to a trusted server, and enhancing online privacy.
  • Compatibility: Ensure the protocols your VPN uses work seamlessly with your devices and operating systems.
  • User-friendliness: Choose a personal VPN that is easy to set up and use. Or, at the very least, choose a solution that provides access to live customer support.
  • Reliability: Look for a VPN that uses reliable protocols to ensure you have consistent coverage to help safeguard your online activities and data.
  • Logging policy: Log policies directly impact your privacy and security by determining how your activity is recorded; use protocols that are compatible with no-log policy services to maximize privacy.

Keep your browsing private

The right combination of VPN protocols is at the heart of any good VPN. Norton Secure VPN lets you choose between VPN protocols like WireGuard, OpenVPN, Mimic (Norton’s proprietary VPN protocol), or an automatic option to help give you the VPN experience you want.

Use Norton’s VPN to help keep private information like passwords, financial details, and other sensitive data from being intercepted or manipulated during transmission—especially when you’re on the go and using public Wi-Fi to stay connected.

Get Norton Secure VPN

FAQs about VPN tunneling protocols

Still have questions about VPN protocols? Here’s what you need to know.

What is a VPN connection?

A VPN connection is a secure tunnel that encrypts your internet traffic and hides your online identity. It's essentially an ultra-secure pathway that enables data to travel safely over private and public Wi-Fi networks.

Which VPN is the oldest and least secure of the VPN protocols?

Point-to-point Tunneling Protocol (PPTP) is the oldest and least secure VPN protocol. Due to its weak encryption and known security vulnerabilities, PPTP is considered obsolete and isn’t typically used by reputable VPN providers.

What is the best protocol for a VPN?

The “best” VPN protocol depends on what you’re in the market for. For instance, Mimic is a leader in Security, WireGuard excels in speed, and OpenVPN is a leader in configuration flexibility.

VPN protocols: 7 types and comparisons - Norton (2024)

FAQs

What VPN protocol does Norton use? ›

Norton Ultra VPN Plus supports a number of connection protocols, depending on the platform. Overall, you can expect to see a mix of IKEv2, OpenVPN, WireGuard, and Norton's proprietary Mimic protocol, which is best for circumventing geo-blocked streaming services like Netflix.

What types of protocols are used in VPN? ›

The most common VPN protocols are OpenVPN, WireGuard, L2TP/IPsec, IKEv2/IPsec, PPTP and SSTP. These protocols offer different trade-offs between security, speed and compatibility, so the best option will depend on your specific needs.

Should I use IKEv2 or WireGuard? ›

Based on these findings, if you're looking for the fastest secure tunneling protocol, you should go with NordLynx (or WireGuard). The second fastest will be IKEv2, which can confidently hold its own even when connecting to the other side of the world.

Should I turn on Norton Auto VPN? ›

Enable or disable Kill Switch - You can enable this option to block your internet connection whenever VPN is disconnected. Auto Connect - We recommend you enable the Auto Connect mode that helps you turn on the VPN option automatically for the compromised networks.

Is there a problem with Norton VPN today? ›

No incidents have been reported.

How do I change the protocol on my Norton VPN? ›

On the Norton dashboard, under Overview, click the VPN Preferences tab. In the VPN Preferences tab, under VPN protocol settings, you can choose one of the following protocols: Automatic (recommended) WireGuard.

What is the best VPN protocol setting? ›

OpenVPN is the most secure VPN protocol and the safest choice thanks to its near-unbreakable encryption, which keeps users' data private even when using public Wi-Fi.

What is the hardest VPN protocol to block? ›

The VPN protocol that is hardest to block is SSTP because it can transmit over the same port as HTTPS traffic.

What protocol does always on VPN use? ›

Features and Capabilities of Always On VPN: A Tabular Representation
Common FeaturesDefined Capabilities
Industry-standard IKEv2 VPN protocol supportAlways On VPN uses the widely used IKEv2 protocol for secure and reliable VPN connections.
13 more rows
Mar 9, 2023

What is the most secure VPN? ›

The best secure VPN services in 2024
  1. ExpressVPN. An audited no-logs policy and sleek apps. ...
  2. NordVPN. The best all-in-one security suite. ...
  3. Private Internet Access (PIA) My top pick for Linux with a full stack of security tools. ...
  4. Proton VPN. A privacy-focused provider that you can try for free. ...
  5. Surfshark.
Jul 23, 2024

What protocol does NordVPN recommend? ›

If you are conscious about your security and are wondering what the most stable NordVPN protocol is, we recommend OpenVPN. WireGuard is the newest and fastest tunneling protocol, and the entire VPN industry is talking about it. It uses state-of-the-art cryptography that outshines the current leader, OpenVPN.

Is IKEv2 compromised? ›

Is IKEv2 Secure? IKEv2 is regarded as a secure VPN protocol. It incorporates methods like Diffie-Hellman key exchange to establish safe connections, ensuring that each session has unique encryption keys. Perfect Forward Secrecy (PFS) provides an additional layer of security by generating new keys for each session.

What is the downside to Norton VPN? ›

Streaming and torrenting.

Norton Secure VPN has an undisclosed number of servers in 28 countries, which isn't a lot compared to the top players in the market. Unfortunately, the VPN isn't optimal for streaming and torrenting as it doesn't offer specialized servers.

Should I leave my Norton VPN on all the time? ›

Should I leave my Norton VPN on all the time? We recommend keeping Norton Secure VPN active whenever you're online. It will encrypt your data so only relevant traffic passes through your internet service provider.

Why does Norton VPN slow down the internet? ›

A VPN encrypts your internet traffic and routes your connection through a remote server. Though this keeps your online activity private, it is this process that's primarily responsible for the speed loss.

Does Norton have its own VPN? ›

Norton Secure VPN encrypts your Internet connection on public hotspots to protect private data like your passwords when using your PC, Mac, or mobile device.

Is Norton VPN a true VPN? ›

Norton VPN is a decent VPN that offers basic yet essential security features, including a kill switch and split tunneling. It also adds Wi-Fi Security and the Ad Tracker Blocking feature to mobile devices.

What port does Norton Secure VPN use? ›

Allow access on ports 500 and 4500. If you do not find the option to allow access on ports 500 and 4500, you may also turn off the Firewall. Save and exit the router settings. Open your Norton device security product and turn on Secure VPN in the My Norton window.

What is the difference between NordVPN and Norton VPN? ›

NordVPN vs Norton Secure VPN

While both are even in categories like simultaneous connections and no logs policy, NordVPN stands out for its broader device compatibility, support for more streaming services, and stronger VPN protocols.

Top Articles
Oasis (ROSE) Staking FAQ | P2P Validator | Support Centre
What are the Pros and Cons of NFTs?
Pollen Count Los Altos
Washu Parking
Restored Republic January 20 2023
The UPS Store | Ship & Print Here > 400 West Broadway
Crossed Eyes (Strabismus): Symptoms, Causes, and Diagnosis
Vanadium Conan Exiles
Bubbles Hair Salon Woodbridge Va
Uc Santa Cruz Events
How do you like playing as an antagonist? - Goonstation Forums
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Elizabethtown Mesothelioma Legal Question
Alexander Funeral Home Gallatin Obituaries
使用 RHEL 8 时的注意事项 | Red Hat Product Documentation
Dark Chocolate Cherry Vegan Cinnamon Rolls
91 East Freeway Accident Today 2022
Amazing deals for DKoldies on Goodshop!
Amih Stocktwits
[Cheryll Glotfelty, Harold Fromm] The Ecocriticism(z-lib.org)
Halo Worth Animal Jam
Outlet For The Thames Crossword
Aerocareusa Hmebillpay Com
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Academy Sports Meridian Ms
Vernon Dursley To Harry Potter Nyt Crossword
Fleet Farm Brainerd Mn Hours
Kentuky Fried Chicken Near Me
Cb2 South Coast Plaza
Maine Racer Swap And Sell
The Fabelmans Showtimes Near Baton Rouge
Salemhex ticket show3
Primerica Shareholder Account
Poe T4 Aisling
100 Million Naira In Dollars
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Rocksteady Steakhouse Menu
Selfservice Bright Lending
Shoreone Insurance A.m. Best Rating
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Jewish Federation Of Greater Rochester
What Is Kik and Why Do Teenagers Love It?
Cygenoth
Bartow Qpublic
The best bagels in NYC, according to a New Yorker
All Characters in Omega Strikers
Nearest Wintrust Bank
Roller Znen ZN50QT-E
4015 Ballinger Rd Martinsville In 46151
Acellus Grading Scale
Ravenna Greataxe
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 5726

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.