VPN protocols: 7 types and comparisons - Norton (2024)

There are many types of VPN protocols—each with varying degrees of speed, security, reliability, and device compatibility. Read on to learn more about VPN protocols, how they work, and which of the several options available through the Norton Secure VPN app you should use.

Get Norton Secure VPN

Virtual private networks (VPNs) enable users to send and receive data securely using data packet encryption. This serves the dual purpose of keeping your online activity and the data you transmit private, while enabling you to access content freely at home and on the move. But VPNs wouldn’t be able to do all of that without the right protocols in place.

VPN providers typically use different combinations of protocols to deliver robust security over their networks. As a bonus, more flexible VPN apps even let you choose which protocol to use based on your preferences. That means you can decide whether to prioritize security, speed, customization, or usability.

Learn more about some of the top VPN protocols, how they work, and what makes them stand out:

What are VPN protocols?

VPN protocols are a set of rules that dictate how data is encrypted and transmitted between a virtual private network server and your device. VPNs use these protocols to help establish secure online connections, protecting in-transit data from interception, manipulation, surveillance, and unauthorized access.

How do VPN protocols work?

VPN protocols work by using predetermined rules to encrypt, transmit, and authenticate data, ensuring private communication between the device and VPN server. Once a connection is established, all in-transit data travels through a secure tunnel, protecting it from eavesdropping, tampering, and other cybersecurity threats.

Here’s a closer look at how VPN protocols protect your online privacy:

  1. Initiation: The user activates their VPN via the client on their device, which sends a connection request to the VPN server.
  2. Authentication: The VPN client software and server verify the other’s identity by exchanging passwords, encryption keys, or other credentials.
  3. Encryption: Once the secure connection is established, the cryptographic encryption algorithm encrypts the data, making it unreadable to those without a decryption key.
  4. Tunneling: The encrypted data is nested inside the protocol’s data packets, which contain routing information to help the secured data make its way through VPN tunnels across networks.
  5. Transmission: The encapsulated and encrypted data is transmitted across the internet to the VPN server.
  6. Decryption and routing: The VPN server strips off the outer layer to access the encrypted data inside using a decryption key.
  7. Response: When the response from the destination is ready to be returned, it’s encrypted, encapsulated, and sent back through the secure tunnel to the VPN client.

Now that you understand how VPN protocols work, let’s explore the types of VPN protocols you can use and when it makes sense to use them.

7 types of VPN protocols

There are several types of VPN protocols, including the Internet Key Exchange version 2 (IKEv2), Layer 2 Tunneling Protocol (L2TP), Lightway, Mimic, OpenVPN, Secure Socket Tunneling Protocol (SSTP), and WireGuard. The best VPN for you depends on which features it offers and how well it suits your needs

VPN typeOperating system compatibilitySecurity and encryptionSpeed
IKEv2Android, iOS, Linux, macOS, Windows, and routersHighHigh
L2TPAndroid, iOS, Linux, macOS, Windows, and routersModerateModerate
LightwayAndroid, iOS, Linux, macOS, Windows, and routersHighHigh
MimicAndroid, iOS, macOS, and WindowsHighHigh
OpenVPNAndroid, BSD, iOS, Linux, macOS, Solaris, and Windows (server must be installed on Linux OS)HighModerate
SSTPWindowsModerateModerate
WireGuardAndroid, BSD, iOS, macOS, and WindowsHighHigh

1. Internet Key Exchange version 2 (IKEv2)

IKEv2 is a VPN key exchange protocol that creates a tunnel between the VPN client and server to help guard data during transmission. However, it can’t perform encryption without a helper protocol like IPsec (Internet Protocol Security).

Using the protocol’s pre-determined settings, IKEv2 negotiates an encryption agreement, and IPsec scrambles the data, making it unreadable. Together, these protocols are referred to as IKEv2/IPsec and can create a secure tunnel.

  • Developer(s): IBM
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Secure connections, fast, reliable, and automatic reconnection
  • Cons: Limited customizability, sometimes restricted by firewalls, and slower than other protocols

2. Layer 2 Tunneling Protocol (L2TP)

L2TP is a VPN protocol often used with IPsec to deliver AES-256 encryption, which is used to create secure connections between devices and VPN servers over internet networks. On its own, L2TP doesn’t have encryption or authentication capabilities. However, when used with other protocols like IPsec, VPN providers can create secure tunnels allowing data to pass securely over public networks.

VPN protocols: 7 types and comparisons - Norton (2)
  • Developer(s): Cisco and Microsoft
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Straightforward setup and firewall-friendly
  • Cons: No built-in encryption, and an older protocol

3. Lightway

Lightway is a lightweight VPN protocol that delivers reliable internet security. Unlike some alternatives, Lightway can handle security negotiation and data encryption without sacrificing quality. This VPN protocol is often used for video streaming and gaming security, because its speed contributes to a smoother overall experience.

VPN protocols: 7 types and comparisons - Norton (3)
  • Developer(s): ExpressVPN
  • Compatible with: Android, iOS, Linux, macOS, Windows, and routers
  • Pros: Fast, secure encryption and authentication protocols, minimal battery consumption, automatic reconnection, and VPN traffic concealment
  • Cons: Only available through ExpressVPN and development is dependent on them

4. Mimic

Mimic is a newer VPN protocol that stands apart from other options by masking itself as an unassuming HTTPS connection that you might use to check your email, stream your favorite show, or look up a dinner recipe. Aside from its encryption capabilities, Mimic doesn’t require additional configuration, uses less power, is eco-friendly, and is capable of establishing high-speed connections and transfers.

Mimic also has an impressive resistance to quantum attacks, which can ultimately help protect users from emerging computing threats. This proprietary protocol is one of the types you can choose from within the Norton Secure VPN application, and it’s a strong option. With it, Norton can offer you core VPN capabilities like bank-grade encryption, anonymous browsing, and split tunneling.

VPN protocols: 7 types and comparisons - Norton (4)
  • Developer(s): Gen Digital Inc.
  • Compatible with: Android, iOS, and Windows
  • Pros: Establishes connections quickly, resists cryptographic attacks, and masks user location
  • Cons: Limited configurations

5. OpenVPN

OpenVPN supports both client and server applications, and allows peers to authenticate each other using various methods. It makes extensive use of the OpenSSL encryption library and the TLS protocol, offering many security and control features. Beyond that, this VPN protocol is highly customizable, allowing users to configure connection settings to their specifications.

VPN protocols: 7 types and comparisons - Norton (5)
  • Developer(s): OpenVPN, Inc.
  • Compatible with: Android, FreeBSD, iOS, Linux, macOS, NetBSD, OpenBSD, Solaris, and Windows (server must be installed on Linux OS)
  • Pros: Industry-standard encryption, high customizability, and open-source
  • Cons: Complex setup, slower connection speeds, and lacks native integration

6. Secure Socket Tunneling Protocol (SSTP)

SSTP is a VPN protocol that leverages SSL (Secure Sockets Layer) technology to remotely access Windows devices and help encrypt internet traffic. While less cutting-edge than some alternatives, this VPN protocol is convenient, as most new Windows devices come with it built-in.

But to access enhanced security features, enjoy faster speeds, choose from more server locations, and strengthen anonymous browsing on Windows PCs, you’ll still need to download a third-party VPN.

VPN protocols: 7 types and comparisons - Norton (6)
  • Developer(s): Microsoft
  • Compatible with: Windows
  • Pros: Easily accessible to Windows users and firewall-friendly
  • Cons: Not compatible with non-Windows devices; closed-source and less robust security protocols than other encryption methods

7. WireGuard

WireGuard is a cross-platform VPN protocol that uses cryptography to create secure tunnels, often for secure streaming and private browsing. This protocol hasn’t been around long but is already gaining popularity due to its speed and user-friendliness, and it’s now an option you can choose from in Norton Secure VPN.

However, it’s important to note that though WireGuard is well-regarded in the cybersecurity industry, it’s still under development. While WireGuard hasn’t confirmed what they’re working on, they say they are working toward creating a faster, leaner, and more useful VPN protocol.

VPN protocols: 7 types and comparisons - Norton (7)
  • Developer(s): WireGuard
  • Compatible with: Android, BSD, iOS, macOS, and Windows
  • Pros: Fast, easy configuration and state-of-the-art encryption
  • Cons: Newer protocol that lacks key features like dynamic IP address assignment; configuration errors may compromise security

How to choose the best VPN protocol

Consider factors like security, device and operating system compatibility, user-friendliness, reliability, and log policy when selecting a VPN protocol. Here are some tips to help you make your decision:

  • Security: Capabilities like encryption and authentication are important for scrambling your data, connecting to a trusted server, and enhancing online privacy.
  • Compatibility: Ensure the protocols your VPN uses work seamlessly with your devices and operating systems.
  • User-friendliness: Choose a personal VPN that is easy to set up and use. Or, at the very least, choose a solution that provides access to live customer support.
  • Reliability: Look for a VPN that uses reliable protocols to ensure you have consistent coverage to help safeguard your online activities and data.
  • Logging policy: Log policies directly impact your privacy and security by determining how your activity is recorded; use protocols that are compatible with no-log policy services to maximize privacy.

Keep your browsing private

The right combination of VPN protocols is at the heart of any good VPN. Norton Secure VPN lets you choose between VPN protocols like WireGuard, OpenVPN, Mimic (Norton’s proprietary VPN protocol), or an automatic option to help give you the VPN experience you want.

Use Norton’s VPN to help keep private information like passwords, financial details, and other sensitive data from being intercepted or manipulated during transmission—especially when you’re on the go and using public Wi-Fi to stay connected.

Get Norton Secure VPN

FAQs about VPN tunneling protocols

Still have questions about VPN protocols? Here’s what you need to know.

What is a VPN connection?

A VPN connection is a secure tunnel that encrypts your internet traffic and hides your online identity. It's essentially an ultra-secure pathway that enables data to travel safely over private and public Wi-Fi networks.

Which VPN is the oldest and least secure of the VPN protocols?

Point-to-point Tunneling Protocol (PPTP) is the oldest and least secure VPN protocol. Due to its weak encryption and known security vulnerabilities, PPTP is considered obsolete and isn’t typically used by reputable VPN providers.

What is the best protocol for a VPN?

The “best” VPN protocol depends on what you’re in the market for. For instance, Mimic is a leader in Security, WireGuard excels in speed, and OpenVPN is a leader in configuration flexibility.

VPN protocols: 7 types and comparisons - Norton (2024)

FAQs

VPN protocols: 7 types and comparisons - Norton? ›

Although the VPN only uses OpenVPN and L2TP/IPSec tunneling protocols, it manages to retain around 74% of the original internet connection speed. While not the fastest VPN on the market, Norton Secure VPN can offer decent performance.

What VPN protocol does Norton use? ›

Although the VPN only uses OpenVPN and L2TP/IPSec tunneling protocols, it manages to retain around 74% of the original internet connection speed. While not the fastest VPN on the market, Norton Secure VPN can offer decent performance.

Is Norton's VPN any good? ›

Is Norton Secure VPN Worth Trying Out in 2024? Norton Secure VPN is secure, fast, easy to use, and an overall good choice for browsing, streaming Netflix, and gaming. Norton Secure VPN has industry-standard security features like 256-bit AES encryption, a no-logs policy, a kill switch, and secure protocols.

Which VPN protocol is better WireGuard or OpenVPN vs IKEv2? ›

OpenVPN, IKEv2, and L2TP support AES encryption, considered the gold standard, while WireGuard uses ChaCha20, which is also secure. PPTP uses the least secure encryption standard, MPPE. Is WireGuard better than OpenVPN? WireGuard is newer, but it has already proven better than OpenVPN in terms of speed.

What VPN comes with Norton? ›

Norton Secure VPN is a security app that helps keep you safe while you surf the web. It prevents your online activity from being tracked by 3rd party trackers, including ISPs, or the websites that you visit, giving you private internet access.

Is NordVPN owned by Norton? ›

No, NordVPN is not a product of Norton. Norton is a security company that creates its own security products. Nord is a separate security company with its own set of security products. The two are not owned by the same parent company.

Why does Norton have a bad reputation? ›

Performance Impact: One of the primary criticisms of Norton Antivirus has been its impact on system performance. It's often argued that Norton uses a considerable amount of system resources when running scans, which can slow down a user's computer, affecting its overall performance.

Should I turn on VPN with Norton? ›

You might want to use a VPN if you're worried about your ISP tracking your online activity. If you connect to the internet through a VPN, the provider of your internet services won't be able to see what you're doing online.

Does Norton VPN slow down your internet? ›

Using a VPN can slow down your internet connection: While it might not be that noticeable most of the time, you may experience slower download and upload speeds, which can impact your streaming or gaming.

What is the most advanced VPN protocol? ›

IKEv2 – Internet Key Exchange

Based on the IPSec framework, IKEv2 is the most recent and advanced VPN protocol.

What protocol does always on VPN use? ›

It uses Windows 10's built-in VPN client and the Internet Key Exchange version 2 protocol. IKEv2 is a reliable and secure protocol that provides robust authentication and encryption standards, making it a viable choice for Always On VPN.

Which VPN protocol is hardest to block? ›

The VPN protocol that is hardest to block is SSTP because it can transmit over the same port as HTTPS traffic.

Which is the strongest VPN to use? ›

  • NordVPN.
  • Surfshark.
  • Private Internet Access VPN.
  • Hotspot Shield.
  • Norton Secure VPN.
  • IPVanish.
  • ExpressVPN.
  • CyberGhost.

What is the most secure VPN type? ›

OpenVPN is the most secure VPN protocol and the safest choice thanks to its near-unbreakable encryption, which keeps users' data private even when using public Wi-Fi. Because it's open source, users can check the source code for vulnerabilities and reassure themselves that there are no weaknesses in its security.

Should I use WireGuard or OpenVPN? ›

WireGuard is consistently faster than OpenVPN in our tests

On average, WireGuard was about 3.2 times faster than OpenVPN across all the locations we tested. WireGuard's performance advantage over OpenVPN is greater with nearby (low latency) servers in comparison to long-distance (high latency) server locations.

What port does Norton Secure VPN use? ›

Allow access on ports 500 and 4500. If you do not find the option to allow access on ports 500 and 4500, you may also turn off the Firewall. Save and exit the router settings. Open your Norton device security product and turn on Secure VPN in the My Norton window.

Does Norton VPN have UDP? ›

That's why for safety, we've awarded Norton Secure VPN a 6/10. Available protocols include OpenVPN (TCP & UDP) and L2TP/IPSec (not WireGuard). Norton's strong 256-bit AES encryption will protect your data.

What is my Norton VPN? ›

Norton Secure VPN encrypts your Internet connection on public hotspots to protect private data like your passwords when using your PC, Mac, or mobile device.

What is the Norton VPN policy? ›

VPNs give you a powerful layer of added security when you're online. Norton Secure VPN uses bank-grade encryption and has a no-log policy, which means it doesn't track, log, or save your browsing activity.

Top Articles
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6206

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.