iOS

These VPN tutorials offer useful guidelines for getting started using a VPN service on an iOS device.

 

 

You can find setup tutorials for other platforms and devices (Windows, macOS, Android and other) here.

 

Automatic Configuration

NordVPN’s app for iOS is the fastest and most straightforward way to configure the VPN service on your device. This guide explains how you can download, install and sign in to the app. It also shows different ways how you can choose the most suitable server and connect to it. In addition, it explains various settings, such as Kill Switch, Smart Reconnect and more.

By default, the NordVPN app for iOS uses the IKEv2/IPsec protocol. This robust protocol remarkably increases security and privacy by employing very strong cryptographic algorithms and keys. NordVPN uses NGE (Next Generation Encryption) in IKEv2/IPsec. The ciphers used to generate Phase1 keys are AES-256-GCM for encryption, coupled with SHA2-384 to ensure integrity, combined with PFS (Perfect Forward Secrecy) using 3072-bit Diffie Hellmann keys. IPsec then secures the tunnel between the client and server with the strong AES256.

The app has all the necessary configurations set by default, so you can install and run it right away. It also gives plenty of freedom to adjust the settings for your particular requirements.

 

Manual Configuration

If you like to be in charge of the entire VPN setup process, you can configure the chosen security protocol manually by following these tutorials. However, please note that some of the protocols are not recommended for general use.

 

OpenVPN

OpenVPN is a mature, secure and robust open-source protocol, which works with a wide variety of cryptographic algorithms. We use OpenVPN in NordVPN apps for other operating systems by default as it is considered to be one of the best protocols in the industry.

 

IKEv2/IPsec

If you want to set up the IKEv2/IPsec protocol manually instead of relying on the NordVPN app, this guide will walk you through the required steps.

 

L2TP/IPsec

This tutorial explains how you can set up L2TP/IPsec, a Layer-2 tunneling protocol encapsulated within IPsec. However, we only recommend to use it if your hardware does not support OpenVPN. Another case when it can be used is when you are based in a country where this is the only protocol that can penetrate governmental/ISP firewalls.

 

PPTP

PPTP is one of the oldest encryption protocols, which is compatible with multiple operating systems and quite easy to set up. However, we can recommend using it only when security is not very important or where legacy support is needed.