faqvpn.io
Reference Updated: May 2026 70+ terms

VPN Glossary

70+ VPN terms explained simply. No jargon, just clear definitions for beginners and experts alike.

Jump to: A B C D E F G H I K L M N O P R S T U V W Z

A

AES-256
Advanced Encryption Standard with 256-bit keys — the gold standard for encryption. Used by governments, banks, and militaries worldwide. Currently unbreakable with existing technology.
Always-on VPN
An Android feature that keeps your VPN connected at all times. If the VPN disconnects, it automatically reconnects to prevent IP leaks.
Authentication
The process of verifying your identity when connecting to a VPN server — using certificates, pre-shared keys, or username/password.

B

Bandwidth
The amount of data that can be transferred over a connection. Free VPNs often limit bandwidth; premium VPNs offer unlimited bandwidth.
Bypass censorship
Using a VPN to access websites and content blocked by governments, ISPs, or network administrators in restrictive countries.

C

ChaCha20
A modern stream cipher used by WireGuard for encryption. Provides strong security with excellent performance on mobile devices.
Ciphertext
Encrypted, unreadable data. When your internet traffic is encrypted, it becomes ciphertext that only the VPN server can decrypt.
Connect on Demand
An iOS feature that automatically reconnects your VPN if it drops. The closest iOS gets to a kill switch.

D

DNS Leak
When DNS queries bypass the VPN tunnel and go to your ISP's DNS servers, exposing your browsing activity. Good VPNs have DNS leak protection.
Double VPN
Multi-hop VPN that routes traffic through two VPN servers instead of one, adding an extra layer of encryption. Also known as multi-hop or cascading VPN.
DDoS Protection
A VPN hides your real IP address, preventing attackers from launching Distributed Denial of Service attacks against your home network.

E

Encapsulation
The process of wrapping encrypted data inside another packet addressed to the VPN server. This creates the VPN "tunnel."
Encryption
The process of scrambling data into unreadable code. VPNs use encryption to protect your internet traffic from hackers, ISPs, and government surveillance.
ExpressVPN
A premium VPN service known for blazing fast speeds, ease of use, strong security, and a verified no-logs policy (audited by PwC).

F

Five Eyes
An intelligence alliance between the US, UK, Canada, Australia, and New Zealand. VPNs based in these countries may be subject to government surveillance demands.
Full tunnel
When all your device's internet traffic is routed through the VPN. Provides maximum security but may be slower than split tunneling.

G

Geo-blocking
The practice of restricting access to content based on geographic location. VPNs help bypass geo-blocking by making you appear in another country.

H

Handshake
The initial process where your device and the VPN server agree on encryption keys and establish a secure connection.

I

IKEv2/IPsec
A VPN protocol that's excellent for mobile devices. Handles network switching well (Wi-Fi to cellular) and is built into iOS and macOS.
IP Address
Internet Protocol address — a unique identifier for your device on the internet. A VPN hides your real IP and replaces it with the VPN server's IP.
IP Leak
When your real IP address is exposed even though your VPN says it's connected. Can happen through DNS leaks, WebRTC leaks, or VPN connection drops.
ISP
Internet Service Provider — the company that provides your internet connection (Comcast, Verizon, AT&T). ISPs can see your browsing without a VPN.

K

Kill Switch
A security feature that automatically blocks your internet access if the VPN connection drops, preventing your real IP from being exposed.
Key Exchange
The secure process where your device and the VPN server agree on encryption keys without exposing them to eavesdroppers (using algorithms like Diffie-Hellman).

L

L2TP/IPsec
Older VPN protocol that provides decent security but is slower than modern protocols. Still used for legacy device compatibility.
Latency
The time delay between sending and receiving data. VPNs can increase latency due to encryption and routing through remote servers.
Lightway
ExpressVPN's proprietary VPN protocol. Open-source, fast, and secure. Designed to be lightweight and bypass restrictive networks.

M

Man-in-the-Middle Attack
A cyberattack where a hacker intercepts communication between your device and a website. A VPN prevents MITM attacks on public Wi-Fi.
Multi-hop
Another term for Double VPN — routing traffic through multiple VPN servers for extra privacy.
Mullvad
A privacy-focused VPN service known for accepting cash payments, no email requirements, and a proven no-logs policy.

N

No-Logs Policy
A promise that the VPN provider does not record your browsing activity, IP addresses, or connection timestamps. The best VPNs have this independently audited.
NordLynx
NordVPN's implementation of the WireGuard protocol. Provides fast speeds with strong security and privacy enhancements.
NordVPN
A leading premium VPN service offering strong security, verified no-logs policy (audited by Deloitte), and advanced features like Double VPN.
NAT
Network Address Translation — allows multiple devices on a local network to share a single public IP address.

O

Obfuscated Servers
Servers that disguise VPN traffic as regular HTTPS traffic, helping bypass VPN blocks in restrictive countries like China and Iran.
Onion Over VPN
A feature that routes traffic through a VPN server first, then through the Tor network, combining VPN privacy with Tor anonymity.
OpenVPN
An open-source VPN protocol that provides strong security and wide compatibility. The industry standard for VPNs.

P

Perfect Forward Secrecy
An encryption feature ensuring that even if your encryption key is compromised, past sessions remain secure and cannot be decrypted.
PPTP
Point-to-Point Tunneling Protocol — an outdated VPN protocol developed in 1995. Has broken security and should never be used.
ProtonVPN
A privacy-focused VPN from the makers of ProtonMail. Offers a trustworthy free tier with unlimited data and a verified no-logs policy.
P2P
Peer-to-Peer file sharing (torrenting). A VPN hides your IP address from others in the swarm, protecting your privacy.

R

RAM-Only Servers
VPN servers that run entirely on RAM (no hard drives). Every reboot wipes all data, ensuring no logs can be stored.

S

Secure Core
ProtonVPN's multi-hop feature that routes traffic through privacy-friendly countries (Switzerland, Iceland, Sweden) before exiting to the internet.
Split Tunneling
A feature that lets you choose which apps use the VPN and which use your regular internet connection. Useful for banking apps while streaming foreign content.
Stealth Mode
A feature that disguises VPN traffic as regular HTTPS traffic to bypass deep packet inspection and VPN blocks.
Surfshark
A budget-friendly VPN offering unlimited simultaneous device connections, strong security, and a verified no-logs policy (audited by Deloitte).

T

Threat Protection
NordVPN's built-in ad blocker, malware protection, and tracker blocker that works even when the VPN is off.
Tor
The Onion Router — a network that provides anonymous communication by routing traffic through multiple volunteer nodes.
Tunneling
The process of encapsulating encrypted data inside packets that travel through a secure "tunnel" to the VPN server.

U

UDP vs TCP
Transport protocols. UDP is faster (good for streaming), TCP is more reliable on restrictive networks (use OpenVPN TCP on port 443).

V

VPN
Virtual Private Network — a service that encrypts your internet connection, hides your IP address, and protects your online privacy.
VPN Concentrator
Specialized hardware that handles hundreds of simultaneous VPN connections, typically used by enterprises.
VPN Passthrough
A router feature that allows older VPN protocols (PPTP, L2TP) to work through NAT. Not needed for modern VPNs like WireGuard.

W

WebRTC Leak
A browser vulnerability that can expose your real IP address even when using a VPN. Can be prevented with browser extensions or disabling WebRTC.
WireGuard
A modern, fast, and secure VPN protocol. Uses state-of-the-art cryptography (ChaCha20, Poly1305) and has a lean codebase (~4,000 lines).

Z

Zero-Logs Policy
A strict no-logs policy verified by independent third-party audits. The gold standard for VPN privacy.
ZTNA
Zero Trust Network Access — a security framework used by enterprise VPN alternatives like Zscaler, replacing traditional VPNs for corporate access.