VPN Terms Explained: The Complete Glossary for Beginners
VPN Glossary
🔑 Core Concepts
Core VPN (Virtual Private Network)
A technology that creates a secure, encrypted tunnel between your device and the internet. It hides your IP address and protects your data from ISPs, hackers, and surveillance.
Core IP Address
A unique number assigned to your device on the internet; websites use it to infer your location and identity. VPNs mask this with the server’s IP.
Core Encryption
Converts readable data into unreadable code so only authorized parties can access it. VPNs rely on strong encryption to secure traffic.
Core Tunnel / VPN Tunnel
The secure pathway through which encrypted data travels between your device and the VPN server.
Core Protocol
The rule set that governs how a VPN connection is created, authenticated, and maintained. Different protocols trade off speed, stability, and security.
⚙️ VPN Protocols
Proto OpenVPN
Open-source, battle-tested protocol supporting UDP (faster) and TCP (more reliable). Known for strong security and wide compatibility.
Proto WireGuard
Modern, lean protocol designed for speed and simplicity with state-of-the-art cryptography. Often delivers faster connections than OpenVPN.
Proto IKEv2/IPSec
Stable and secure; excellent for mobile devices that switch between Wi-Fi and cellular. Quickly re-establishes dropped connections.
Proto L2TP/IPSec
Older, generally secure but slower due to double encapsulation. Largely superseded by WireGuard and OpenVPN.
Proto SSTP
Microsoft-developed protocol that uses SSL/TLS over TCP 443, blending in with HTTPS traffic. Handy on restrictive networks.
Proto PPTP
One of the earliest VPN protocols; now considered insecure. Avoid for privacy-critical uses.
Proto SSL/TLS VPN
Uses the same encryption as HTTPS websites; can be browser-based. Good for remote access portals.
🔒 Security & Privacy
Sec AES-256
Industry-standard symmetric cipher used by banks and governments. Considered computationally infeasible to crack with current tech.
Sec Kill Switch
Automatically blocks internet access if the VPN drops, preventing IP/DNS leaks. Essential for torrenting and strict privacy.
Sec DNS Leak
When domain lookups bypass the VPN, exposing visited sites to your ISP. Good VPNs route DNS through their own resolvers.
Sec IPv6 Leak
Occurs when IPv6 traffic is not tunneled and reveals your real address. Some VPNs disable IPv6 or fully tunnel it.
Sec No-logs Policy
Provider’s commitment not to store activity or connection logs. Look for third-party audits or legal test cases for proof.
Sec Multi-hop / Double VPN
Routes traffic through two VPN servers, adding an extra layer of separation between you and the destination.
Sec Obfuscation
Disguises VPN packets as regular HTTPS traffic to evade DPI and firewalls. Useful in censorship-heavy regions.
Sec Split Tunneling
Select which apps/sites use the VPN while others go through your normal connection. Balances privacy and speed.
🌍 Usage Scenarios
Use Geo-blocking
Content is restricted based on your location; VPNs can change your apparent country to access other catalogs.
Use Bypassing Censorship
Use VPNs to reach blocked news, social media, or apps. Obfuscation helps avoid detection.
Use Torrenting / P2P
Peer-to-peer sharing with your IP hidden and traffic encrypted. Choose VPNs that explicitly allow P2P.
Use Streaming VPN
VPNs tuned to unblock major platforms and maintain high speeds for HD/4K playback.
Use Remote Access VPN
Lets employees securely access a company’s internal network from anywhere.
Use Site-to-Site VPN
Securely links entire networks (e.g., branch offices) across the internet as if they’re one network.
🖥️ Technical Infrastructure
Infra Server Location
Where the VPN server physically sits; affects latency, speed, and the country that websites think you’re in.
Infra Dedicated IP
A static IP address reserved for one user; helps with banking, remote access, and fewer CAPTCHAs.
Infra Shared IP
Many users share the same exit IP, improving anonymity but sometimes triggering anti-abuse systems.
Infra NAT (Network Address Translation)
Allows multiple devices to share one public IP while keeping internal addresses private.
Infra Latency / Ping
Round-trip delay; crucial for gaming and live calls. Closer servers usually mean lower latency.
Infra Bandwidth / Speed
How much data can move per second. VPN performance depends on protocol, server load, and distance.
📱 Devices & Integration
Device VPN Client
The app/software you install to connect to a VPN server. Available for desktop, mobile, TV, and more.
Device VPN Router
Runs VPN at the network edge so every connected device is protected—no individual apps needed.
Device Browser VPN Extension
Lightweight proxy-style VPN inside the browser; only protects browser traffic and may lack full features.
Device Smart DNS
Reroutes DNS to unblock websites without encrypting your traffic. Useful when you only need unblocking and full speed.
⚖️ Legal & Regulatory
Legal 5 Eyes / 9 Eyes / 14 Eyes
Intelligence-sharing alliances. A VPN’s home country may affect exposure to data requests and gag orders.
Legal Jurisdiction
The legal domain governing a provider; impacts data retention, warrants, and corporate obligations.
Legal Data Retention Laws
Local rules that require keeping user records for a time. Many privacy-focused VPNs avoid such jurisdictions.
Legal Censorship Laws
Government rules that block or throttle content/services. VPN legality and usage conditions vary by country.
💡 Advanced Features
Adv Port Forwarding
Allows inbound connections through the VPN to your device. Useful for self-hosting, seedboxes, and certain games.
Adv Stealth VPN
Another name for obfuscated servers designed to blend into normal HTTPS traffic and bypass DPI.
Adv RAM-only Servers
Store runtime data only in volatile memory; everything is wiped on reboot. Reduces persistence of logs/configs.
Adv VPN Accelerator
Techniques (e.g., congestion control, path optimization) to improve throughput and reduce jitter on VPN links.
Adv Zero-knowledge Proof
Cryptographic method to prove something (like you’re authorized) without revealing the secret itself.
Join the TechRobot Newsletter
Actionable tips on online security, the best VPNs, unblocking guides, and special offers — straight to your inbox.