Editorial note: Forbes Advisor Australia may earn revenue from this story in the manner disclosed here. Read our advice disclaimer here.

The use of virtual private networks (VPNs) has evolved over the years. Today, Australians commonly access the web via VPNs to bypass geo-restrictions on video streaming content, found on platforms such as Netflix and HBO Max.

However, VPNs were first adopted by companies and the tech-savvy as a means of increasing their privacy, and securing their activity, while using the internet. This is done by VPN tunnelling, the process by which a VPN helps to block hackers and malicious attacks by creating a protected channel between a user’s device and the web. Many everyday internet users are also aware of these benefits and use VPNs for this very purpose.

According to a survey commissioned by NordVPN, around 27% of Australians use VPNs, which it found to be on par with the likes of the US, UK and Canada. Around 35% of Australians who use a VPN, do so to protect their privacy, while approximately 31% mainly want to secure their online accounts and devices. However, the survey also revealed that awareness of VPNs is average in Australia, and marginally behind the other aforementioned locations. It also found the average Australian using a VPN is often male and aged between 25 and 44.

This data suggests that those outside this demographic may be particularly unaware of how VPNs, and therefore VPN tunnelling, work. We explain all below, including the four main types of VPN protocols. These are the rules for how data is packaged and delivered via a VPN tunnel.

What Is A VPN Tunnel?

A VPN tunnel is a secure, encrypted connection between a user’s device and the internet through a virtual private network.

The VPN tunnel encrypts the user’s internet traffic and routes it to a remote VPN server. From there, the data is decrypted and delivered to its intended destination.

The encrypted connection enables a secure, private pathway for the user’s internet traffic. Consequently, the user’s online activities remain hidden from prying eyes and cyber threats. Also, the VPN tunnel helps to ensure all data’s confidentiality, integrity and authenticity as it travels across public networks.

What Is VPN Split Tunneling?

VPN split tunnelling allows users to direct some of their internet traffic through the VPN tunnel—while letting other device traffic bypass it and get direct access to the internet. Users can ensure more personal resources can pass through the VPN. At the same time, they can access public resources, such as streaming services or social media, directly through their local internet connection.

Not only can VPN split tunnelling improve network performance, but it can also reduce the amount of traffic passing through the network. Users can have faster access to resources outside the VPN as a result. It can also help conserve bandwidth and lower latency, especially for activities such as streaming that don’t require additional security.

However, it’s important to note that split tunnelling can also increase security risks. Traffic that bypasses the VPN may not be encrypted and may be vulnerable to interception or monitoring. As such, users should utilise split tunnelling with caution and only in situations where it is necessary and appropriate.

How Does VPN Tunneling Work?

VPN tunnelling creates a secure and encrypted connection between a user’s device and a remote VPN server.

Let’s take a look at how the VPN tunnelling process works:

  • Step 1: A user acquires a VPN service and connects to their desired server through their device.
  • Step 2: The VPN client or app establishes an encrypted tunnel for the user’s internet traffic. From there, traffic is routed to the remote VPN server through the user’s internet connection.
  • Step 3: The data that passes through the VPN tunnel is encrypted using a protocol. This way, no one can intercept or access the data. The data is also transformed into “ciphertext,” which makes it unreadable.
  • Step 4: The remote VPN server receives and decrypts the encrypted traffic, allowing the user’s internet traffic to pass through to its intended destination. The VPN client and server use keys or a string of numbers to decrypt the data.
  • Step 5: The user’s data is routed back from the encrypted tunnel to their device to be accessed.

Most VPNs have a kill switch that disconnects a user’s internet connection from the VPN tunnel. This feature prevents the user’s IP address from being exposed to third parties when the connection is interrupted.

Without a kill switch, the user’s device would automatically revert to their regular internet connection, potentially exposing their online activities to their ISP or other prying eyes. If the user is partaking in sensitive online activities (e.g., online banking), they may be unable to secure their confidential information.

4 Types Of VPN Tunneling Protocols

Not all VPNs are made equal. Several types of VPN tunnelling protocols offer varying levels of security and performance. Let’s explore some of the most common VPN tunnelling protocols, including their strengths and weaknesses, to help you make an informed decision.

1. Point-To-Point Tunneling Protocol (PPTP)

Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used during the 1990s. Developed by Microsoft, PPTP creates a secure and encrypted tunnel between a user’s device and a remote VPN server, which allows users to access the internet.

PPTP is relatively easy to configure because it only needs a username, password and server address. However, one of its primary weaknesses is its relatively weak encryption algorithm, which can be easily compromised.

In addition, PPTP has a vulnerable authentication protocol. MSCHAP-v2 can be intercepted without a strong or long password. The NSA has also been able to bypass the protocol’s encryption.

While PPTP is a popular and widely used VPN protocol, it has significant security weaknesses that make it less secure than other options. As such, it’s best to evaluate your security needs and consider alternative options when choosing this protocol.

2. L2TP/IPSec

L2TP/IPSec is a virtual private network (VPN) protocol that combines Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPSec).

The protocol creates a secure and encrypted tunnel between a user’s device and a remote VPN server. L2TP encapsulates and provides the tunnelling mechanism for the data, then IPSec offers two layers of encryption and authentication features to safeguard the user’s data.

One of the protocol’s key benefits is its broad support across multiple VPN providers and platforms, such as Windows, macOS, iOS and Android. However, it can be slower than other VPN protocols because of its resource-intensiveness and additional layers of security.

3. SSTP

Secure Socket Tunneling Protocol (SSTP) is a protocol that Microsoft developed. SSTP transports internet data in a Secure Sockets Layer (SSL) 3.0 tunnel, then transmits it over the internet to the remote VPN server. SSL provides strong encryption and authentication features, helping to ensure the privacy and security of the user’s data.

One of the main advantages of SSTP is it provides industry-standard encryption. More importantly, it also supports the AES-256 cipher, making it difficult for attackers to intercept and decipher user data.

Since SSTP is a native protocol developed by Microsoft, it is the ideal option for users with Windows devices. However, people with other operating systems may find better options with other open-source VPN protocols, such as OpenVPN.

4. OpenVPN

OpenVPN is an open-source virtual private network (VPN) protocol developed by James Yonan in 2001. It has decent speed and utilises AES 256-bit encryption to protect data. In addition, OpenVPN can use a variety of encryption ciphers—such as AES, Blowfish and 3DES—to provide the highest levels of security.

True to its name, OpenVPN is an open-source protocol. A community of programmers can access, review and audit the code to ensure it is trustworthy. Plus, it can work with most operating systems, such as Windows, macOS, Linux, Android and iOS.

Not only is it flexible, but it is also highly customizable. For example, users can configure OpenVPN to use specific encryption procedures, ciphers, authentication methods and other settings.

Unfortunately, one of the main drawbacks of OpenVPN is that it’s more challenging to set up and configure manually. On the bright side, there are native apps that make it faster to set up and install OpenVPN without manual complications.

Overall, OpenVPN is a highly secure and flexible VPN protocol that can be a good option for users needing an open-source, widely supported and highly configurable VPN. While it may not be the most straightforward VPN protocol to set up and configure, its robust security features and flexibility make it a popular choice for many users.

Conclusion

A VPN tunnel is a secure and encrypted connection that can improve user security, privacy and access. By routing all internet traffic through the VPN tunnel, users can enjoy a more private and secure online experience while also being able to access content that may be blocked or restricted in their region.

While many different types of VPN tunnels are available, their main goal has always been to provide a secure and private connection between the user’s device and the internet.

Frequently Asked Questions (FAQs)

What is a VPN tunnel?

A VPN tunnel is a secure and encrypted connection between a user’s device and a remote VPN server. By routing internet traffic through the VPN tunnel, the user’s IP address and location are masked, and all data remains encrypted.

What is the difference between a VPN and a VPN tunnel?

A virtual private network (VPN) is a service that provides a secure connection between a device and a remote server. Its goal is to encrypt all internet traffic and route it through the VPN server.

A VPN tunnel, on the other hand, is the encrypted connection between a user’s device and the remote VPN server. It is how encrypted data packets move to their destination.

You can read our dedicated guide for more information on exactly what a VPN is.

What are examples of VPN tunnels?

Some of the most common types of VPN tunnels are Point-to-Point Tunneling Protocol (PPTP), SSTP and OpenVPN. These are just a few examples of the many types of VPN tunnels. The ideal protocol for each user will largely depend on various factors, including the level of security required, the variety of devices used and the specific use case for the VPN.

Does a paid VPN offer the same functionality as a free one?

It’s usually worth paying for a VPN subscription rather than opting for a free VPN, if you want the full scope of protection a provider can offer.

Often, the benefits associated with free VPNs are limited in comparison. There may be a cap on data usage and you may experience slower speeds and only have access to a limited number of the provider’s servers. Providers may also monitor your online activity through a free VPN, and sell it on to third parties.

According to NordVPN’s survey, around 60% of Australian VPN users choose to pay for a plan. While Gen Z are most likely to use the free variety of VPNs, Gen Y often opt to pay to gain more online privacy.

What is a proprietary VPN protocol?

A proprietary VPN protocol is one a provider has created itself. It typically can offer a speedy, secure connection, and circumvent firewalls. Examples are Hotspot Shield’s Catapult Hydra and NordVPN’s NordLynx.

A downside to proprietary VPN protocols is many are not open-source, which means those who wish, cannot inspect them to ensure they are secure.

However, certain protocols are modified versions of open-source protocols. This is the case for NordLynx, for example, which was built around the WireGuard open-source protocol, and Catapult Hydra, which is based on OpenVPN.

How can I change my VPN protocol?

It’s typical for VPNs to offer several protocols. Where supported, you can change the one used by clicking on the settings menu in the VPN app, and selecting your preferred.

Information provided on Forbes Advisor is for educational purposes only. Your financial situation is unique and the products and services we review may not be right for your circumstances. We do not offer financial advice, advisory or brokerage services, nor do we recommend or advise individuals or to buy or sell particular stocks or securities. Performance information may have changed since the time of publication. Past performance is not indicative of future results.

Forbes Advisor adheres to strict editorial integrity standards. To the best of our knowledge, all content is accurate as of the date posted, though offers contained herein may no longer be available. The opinions expressed are the author’s alone and have not been provided, approved, or otherwise endorsed by our partners.