We receive advertising fees from the brands we review that affect the ranking and scoring of such brands.

VPN Terms Explained: The Complete Glossary for Beginners

VPN Glossary

0 terms
🔑 Core Concepts
Core VPN (Virtual Private Network)

A technology that creates a secure, encrypted tunnel between your device and the internet. It hides your IP address and protects your data from ISPs, hackers, and surveillance.

Core IP Address

A unique number assigned to your device on the internet; websites use it to infer your location and identity. VPNs mask this with the server’s IP.

Core Encryption

Converts readable data into unreadable code so only authorized parties can access it. VPNs rely on strong encryption to secure traffic.

Core Tunnel / VPN Tunnel

The secure pathway through which encrypted data travels between your device and the VPN server.

Core Protocol

The rule set that governs how a VPN connection is created, authenticated, and maintained. Different protocols trade off speed, stability, and security.

⚙️ VPN Protocols
Proto OpenVPN

Open-source, battle-tested protocol supporting UDP (faster) and TCP (more reliable). Known for strong security and wide compatibility.

Proto WireGuard

Modern, lean protocol designed for speed and simplicity with state-of-the-art cryptography. Often delivers faster connections than OpenVPN.

Proto IKEv2/IPSec

Stable and secure; excellent for mobile devices that switch between Wi-Fi and cellular. Quickly re-establishes dropped connections.

Proto L2TP/IPSec

Older, generally secure but slower due to double encapsulation. Largely superseded by WireGuard and OpenVPN.

Proto SSTP

Microsoft-developed protocol that uses SSL/TLS over TCP 443, blending in with HTTPS traffic. Handy on restrictive networks.

Proto PPTP

One of the earliest VPN protocols; now considered insecure. Avoid for privacy-critical uses.

Proto SSL/TLS VPN

Uses the same encryption as HTTPS websites; can be browser-based. Good for remote access portals.

🔒 Security & Privacy
Sec AES-256

Industry-standard symmetric cipher used by banks and governments. Considered computationally infeasible to crack with current tech.

Sec Kill Switch

Automatically blocks internet access if the VPN drops, preventing IP/DNS leaks. Essential for torrenting and strict privacy.

Sec DNS Leak

When domain lookups bypass the VPN, exposing visited sites to your ISP. Good VPNs route DNS through their own resolvers.

Sec IPv6 Leak

Occurs when IPv6 traffic is not tunneled and reveals your real address. Some VPNs disable IPv6 or fully tunnel it.

Sec No-logs Policy

Provider’s commitment not to store activity or connection logs. Look for third-party audits or legal test cases for proof.

Sec Multi-hop / Double VPN

Routes traffic through two VPN servers, adding an extra layer of separation between you and the destination.

Sec Obfuscation

Disguises VPN packets as regular HTTPS traffic to evade DPI and firewalls. Useful in censorship-heavy regions.

Sec Split Tunneling

Select which apps/sites use the VPN while others go through your normal connection. Balances privacy and speed.

🌍 Usage Scenarios
Use Geo-blocking

Content is restricted based on your location; VPNs can change your apparent country to access other catalogs.

Use Bypassing Censorship

Use VPNs to reach blocked news, social media, or apps. Obfuscation helps avoid detection.

Use Torrenting / P2P

Peer-to-peer sharing with your IP hidden and traffic encrypted. Choose VPNs that explicitly allow P2P.

Use Streaming VPN

VPNs tuned to unblock major platforms and maintain high speeds for HD/4K playback.

Use Remote Access VPN

Lets employees securely access a company’s internal network from anywhere.

Use Site-to-Site VPN

Securely links entire networks (e.g., branch offices) across the internet as if they’re one network.

🖥️ Technical Infrastructure
Infra Server Location

Where the VPN server physically sits; affects latency, speed, and the country that websites think you’re in.

Infra Dedicated IP

A static IP address reserved for one user; helps with banking, remote access, and fewer CAPTCHAs.

Infra Shared IP

Many users share the same exit IP, improving anonymity but sometimes triggering anti-abuse systems.

Infra NAT (Network Address Translation)

Allows multiple devices to share one public IP while keeping internal addresses private.

Infra Latency / Ping

Round-trip delay; crucial for gaming and live calls. Closer servers usually mean lower latency.

Infra Bandwidth / Speed

How much data can move per second. VPN performance depends on protocol, server load, and distance.

📱 Devices & Integration
Device VPN Client

The app/software you install to connect to a VPN server. Available for desktop, mobile, TV, and more.

Device VPN Router

Runs VPN at the network edge so every connected device is protected—no individual apps needed.

Device Browser VPN Extension

Lightweight proxy-style VPN inside the browser; only protects browser traffic and may lack full features.

Device Smart DNS

Reroutes DNS to unblock websites without encrypting your traffic. Useful when you only need unblocking and full speed.

⚖️ Legal & Regulatory
Legal 5 Eyes / 9 Eyes / 14 Eyes

Intelligence-sharing alliances. A VPN’s home country may affect exposure to data requests and gag orders.

Legal Jurisdiction

The legal domain governing a provider; impacts data retention, warrants, and corporate obligations.

Legal Data Retention Laws

Local rules that require keeping user records for a time. Many privacy-focused VPNs avoid such jurisdictions.

Legal Censorship Laws

Government rules that block or throttle content/services. VPN legality and usage conditions vary by country.

💡 Advanced Features
Adv Port Forwarding

Allows inbound connections through the VPN to your device. Useful for self-hosting, seedboxes, and certain games.

Adv Stealth VPN

Another name for obfuscated servers designed to blend into normal HTTPS traffic and bypass DPI.

Adv RAM-only Servers

Store runtime data only in volatile memory; everything is wiped on reboot. Reduces persistence of logs/configs.

Adv VPN Accelerator

Techniques (e.g., congestion control, path optimization) to improve throughput and reduce jitter on VPN links.

Adv Zero-knowledge Proof

Cryptographic method to prove something (like you’re authorized) without revealing the secret itself.


🔒 Privacy • ⚡ Speed • 🎬 Streaming

Join the TechRobot Newsletter

Actionable tips on online security, the best VPNs, unblocking guides, and special offers — straight to your inbox.

📅Weekly security tips & VPN insights
📝How-tos for Netflix, BBC iPlayer, xHamster & more
🔍Tested picks & honest reviews
💶Exclusive deals & limited-time offers
✅ Double opt-in & GDPR-friendly • 🔒 We never sell your data • 🔁 Unsubscribe in one click

Related Posts