VPN Protocols

This section introduces key VPN protocols responsible for secure and private communication over untrusted or public networks. VPN protocols encapsulate and encrypt traffic to maintain confidentiality, integrity, and access control.

Protocol

Description

Use Case

PPTP (Point-to-Point Tunneling Protocol)

Legacy VPN protocol using GRE tunneling and MS-CHAPv2. Fast but considered insecure.

Legacy Windows support

IPsec (Internet Protocol Security)

VPN protocol suite at Layer 3 supporting encryption, authentication, and key exchange. Supports tunnel and transport mode.

Site-to-site and remote-access VPNs

L2TP (Layer 2 Tunneling Protocol)

Layer 2 tunneling protocol usually paired with IPsec. Encapsulates PPP frames.

Remote VPN access with IPsec

OpenVPN 1.0

Open-source VPN using SSL/TLS. Highly configurable and widely adopted.

Cross-platform secure VPN deployment

SSL VPN

TLS-based VPN access via browser or lightweight clients. Clientless and easy to deploy.

Web-based access to internal apps

IKEv2 (Internet Key Exchange v2)

Protocol used with IPsec for key exchange and security associations. Fast reconnection and mobile-friendly.

Mobile VPNs with always-on behavior

WireGuard

Modern, lightweight VPN protocol using strong cryptography. Simple configuration, very fast.

Personal and enterprise secure VPN

Lightway

ExpressVPN’s proprietary protocol. Designed for speed and mobile optimization.

Consumer-grade fast VPN access

OpenVPN 2.5+

Enhanced OpenVPN with improved performance and TLS 1.3 support. Updated cipher suites and better threading.

Enterprise VPNs with open-source control