18 terms
VPN Terms
VPN terms refer to virtual private network services that encrypt your traffic and send it through a remote server, limiting what your ISP or public networks can see and protecting sensitive data. Knowing VPN terminology helps you choose the best protocols, avoid DNS/IP leaks, and browse safer.
A virtual private dial-up network
A virtual private dial-up network (VPDN) is a way for remote users to securely connect to a company's private network over the internet.
Wireguard
Wireguard is a next-generation VPN protocol that emphasizes security and performance.
VPNaaS
VPNaaS stands for Virtual Private Network as a Service.
VPN token
A VPN token is a one-time password (OTP) generated by a security device for accessing a VPN.
VPN hardware
VPN hardware refers to dedicated devices that are specifically designed to build a secure and encrypted connection.
VPN gateway
A VPN gateway is a networking device that connects other devices and networks into a single VPN infrastructure.
VPN concentrator
A VPN concentrator is a networking device specifically designed to handle and manage numerous VPN connections simultaneously.
VPN Authentication
VPN authentication is the verification of a user or a device that is attempting to establish a connection to a virtual private network (VPN).
Stealth VPN
Stealth VPN refers to a service that hides the fact that the user has connected to the internet via a VPN.
SSL VPN (Secure socket layer virtual private network)
SSL VPN (Secure socket layer virtual private network) is a unique type of VPN.
Response time
Response time is the duration required for a server to accept, process, and reply to a request originating from a client, like a user's device or another server.
Private internet access
Private internet access refers to a secure and private way people can connect to the internet using various means such as virtual private network (VPN) services.
Personal VPN
Personal VPN is a VPN connection or service intended for non-commercial or individual use.
MAST
Multi-authority steered targets (MAST) is a method used in VPN protocols to facilitate enhanced privacy and security.
Internet key exchange
The internet key exchange, frequently shortened to IKE, represents a protocol crucial in setting up a secure exchange of cryptographic keys.
Dynamic virtual private network
A dynamic virtual private network (VPN) is a type of VPN that can recognize added nodes without them first being identified by hardware or a router.
Cloud VPN
A cloud VPN is a virtual private network solution that operates within the context of a cloud computing framework.
The importance of VPN terminology
A VPN creates a private, encrypted tunnel between your device and the internet so others can’t easily see what you’re doing. Learning the key terms makes it easier to set it up correctly, stay protected on public Wi‑Fi, and keep your connection fast and reliable.
Know what to do
This glossary includes advice on how to choose a reliable VPN provider, how to install and configure a VPN on different devices, and what to do if you suspect your VPN is not working correctly.
Understand how VPNs work
Learning how VPNs encrypt your data and hide your IP address will help you appreciate the value of online privacy and identify potential security risks.
Protect your privacy
Learn about VPNs and know how to enable a kill switch, choose the right protocol, use obfuscation when needed, and keep your browsing safe.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.