VPN, VPN Protocols, and Types of VPN Protocols

types of vpn protocols
By Tapas Pal Updated

In this article, we would discuss VPN, VPN protocols, and types of VPN protocols. I hope this article would provide you some interesting and new information about the topic. In this article, we would also discuss advantages and disadvantages of VPN and its type.

What is a Virtual Private network (VPN)?

VPN is a technology for creating a secure connection to and from a less secure network using encryption and authorization. The benefit of using VPN is that it provides an appropriate level of security to your system even when the underlying public network/ infrastructure is not much secure. VPN has been used for many years but in the recent years, I have become robust.

VPNs are very robust, cheap, affordable and much fast as well. It makes the data access more secure and restricted.

Principles on which VPN works

VPN works on the following 2 principles:

  1. Encryption
  2. Authentication


AS the data traverses from the sender to receiver, it is encrypted by the sender and when the data reaches to the receiver, it gets decrypted by the receiver. Data is encrypted between VPN Client and VPN server, so there is no need to use the data encryption on the communication link between a dial-up client and Internet service provider.


Windows and Remote Authentication Dial-in user Service are used as Authentication Provider. In Windows authentication mechanism users try to get connected to VPN by using credentials and then his connection attempt is checked by VPN client’s user account properties and local remote access policies.

Types of VPN Protocols

There are a variety of VPN protocols. Let us talk about most common of them:


This is the most widely used VPN protocol. Using existing internet connection, users log on to VPN by using username and password. Users don’t need any extra hardware and each feature is often available as an add-on feature in the software. Point to point tunneling Protocol.

Disadvantage: It does not provide encryption and depends on point to point for implementing security measures.

  • Site to Site VPN

Site to site VPN is somewhat similar to PPTP VPN except in PPTP dedicated line is used. In this different sites of the same organization make a connection with each other to make a VPN. Encryption and decryption are done at both the ends, can be hardware or software based.

  • L2TP VPN

L2TP is also known as Layer to Tunneling Protocol. Like PPTP protocol it also does not provide encryption and decryption. But it is far better than PPTP as along with data confidentiality it also provides Data integrity.

  • IPsec

IPsec is the most tried and trustworthy protocol. A tunnel is a setup between the remote site and the central site. IPsec needs expensive and time-consuming installations at the client side. Expensive installations at the client side are its biggest disadvantage.

  • SSL

SSL is also known as secure socket layer. It can be accessed by HTTP over a web browser. It creates a secure session between our system’s browser and the VPN server. It does not require any software or hardware, it uses the browser as VPN client.

At the end I would say that choosing VPN protocol solely depends on the requirement. There is a number of factors to decide what to use. Like – bandwidth, the number of users, cot etc.