A Glossary of VPN Terms


IPV4: It is the fourth version of Internet Protocol address (IP address), written in numeric address u0026amp; separated by a dot (.)

(e.g. 12.325.321..165)

IPV6: It is the most recent version of Internet Protocol (IP), written in alphanumeric address u0026amp; separated by a colon (:)

(e.g. 2001:0db8:62b4:0000:0000:7a3c:0572:6443)

Static IP: It is a permanent IP address assigned to a computer by an Internet Service Provider (ISP) that doesn’t change.

Dedicated IP: It is an IP address that is assigned to one single user of a VPN. It is used as your very own private and secure IP to access websites.

Shared IP: It is an IP address that is used by multiple VPN users simultaneously. The same IP is being shared by a large pool of users.


256 bit encryption: It uses 256-bit key to encrypt data files. It is the most strongest encryption method which requires 2256 combinations to break encryption which is virtually impossible.

2048 bit encryption: It uses RSA key pair to encrypt data. It is also the strongest encryption that requires 22047 combinations to decrypt data which takes about 6.4 quadrillion years.

128 bit encryption: It uses 128-bit key to encrypt data files. It is the most strongest encryption method which requires 2128 combinations to break encryption which is virtually impossible


PPTP: Point-to-Point Tunneling Protocol is pretty popular for faster streaming but barely offers any reliable security. PPTP was cracked by the NSA.

OpenVPN: Most popular VPN protocol that is extremely secure and uses the strongest encryption i.e. 256-bit. It can sometime slow down connection speed.

SoftEther: It is relatively new and a better version of OpenVPN. It is very much secure (uses 256-bit encryption) and surprisingly fast. It can also support a large no. of protocols.

L2TP/IPSec: An improvement over PPTP protocol in terms of security but not in speed. It uses double encapsulation that makes it slower.

WireGuard: A new VPN protocol but still in development stage. It is fast and lighter and uses a single cryptographic suite which leaves it with zero security holes.

IKEV1 u0026amp; IKEv2: Internet Key Exchange is a VPN protocol developed by Microsoft and Cisco. It is paired with IPSec for encryption and authentication.

SSTP: Secure Socket Tunneling Protocol is owned by Microsoft and was introduced with Windows Vista. It is often compared with OpenVPN, but mostly works on Windows platforms.

SOCKS5: An internet protocol that routes packets between a server and a client using a proxy server. It generates an arbitrary IP address before it reaches your destination.


Multi hop VPN: It adds an extra layer of encryption by adding an additional server to your normal VPN connection. It routes your traffic to two or more servers before reaching its destination.

Kill Switch: It prevents your data from leaking to the web. If VPN connection accidentally drops, this feature blocks your device from accessing the web.

Split Tunneling: Let you route some of the traffic through encrypted VPN tunnel while maintaining other traffic remains directly accessible to the internet.

Port Forwarding: A technique that allows external devices to access computer networks on private network. It is used to keep unwanted traffic off networks.


IP Leak: The leaking of the users’ real IP address while being connected to a VPN. A VPN is meant to keep your IP from leaking.

WebRTC Leak: When your real IP address leaks due to your browsers’ functionality. This leak could happen even if your VPN is working correctly.

DNS Leak: A security flaw in a VPN that reveals DNS request to ISPs.


Tor: The Onion Router disguises your online identity by moving your traffic through different Tor servers. NSA can easily track a Tor user.

Proxy: Proxy is used to surf the web anonymously. It only keeps your IP address hidden through a Proxy server but doesn’t keep your online traffic encrypted.