CINXE.COM
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" data-next-head=""/><title data-next-head="">The 4 Different Types of VPN Explained (and When to Use Them)</title><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" data-next-head=""/><meta http-equiv="x-ua-compatible" content="ie=edge" data-next-head=""/><link href="https://googleads.g.doubleclick.net" rel="preconnect" data-next-head=""/><link href="https://www.googletagmanager.com" rel="preconnect" data-next-head=""/><link href="https://www.google-analytics.com" rel="preconnect" data-next-head=""/><link href="https://stats.g.doubleclick.net" rel="dns-prefetch" crossorigin="anonymous" data-next-head=""/><link href="https://googleads.g.doubleclick.net" rel="preconnect" data-next-head=""/><link href="https://www.google.com" rel="preconnect" data-next-head=""/><link rel="alternate" hrefLang="en" href="https://www.top10vpn.com/what-is-a-vpn/vpn-types/" data-next-head=""/><link rel="alternate" hrefLang="x-default" href="https://www.top10vpn.com/what-is-a-vpn/vpn-types/" data-next-head=""/><link rel="alternate" hrefLang="es" href="https://www.top10vpn.com/es/que-es-una-vpn/tipos-de-vpn/" data-next-head=""/><link rel="alternate" hrefLang="nl" href="https://www.top10vpn.com/nl/wat-is-een-vpn/vpn-typen/" data-next-head=""/><link rel="alternate" hrefLang="it" href="https://www.top10vpn.com/it/cosa-e-una-vpn/tipi-di-vpn/" data-next-head=""/><link rel="alternate" hrefLang="pl" href="https://www.top10vpn.com/pl/vpn-co-to-jest/rodzaje-vpn/" data-next-head=""/><link rel="alternate" hrefLang="sv" href="https://www.top10vpn.com/sv/vad-ar-en-vpn/typer-av-vpn/" data-next-head=""/><link rel="alternate" hrefLang="fr" href="https://www.top10vpn.com/fr/cest-quoi-un-vpn/type-de-vpn/" data-next-head=""/><link rel="alternate" hrefLang="pt" href="https://www.top10vpn.com/pt/o-que-e-uma-vpn/tipos-de-vpn/" data-next-head=""/><link rel="alternate" hrefLang="de" href="https://www.top10vpn.com/de/was-ist-ein-vpn/vpn-typen/" data-next-head=""/><link rel="alternate" hrefLang="ko" href="https://www.top10vpn.com/ko/what-is-a-vpn/vpn-types/" data-next-head=""/><meta name="description" content="VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them." data-next-head=""/><meta property="og:description" content="VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them." data-next-head=""/><meta property="og:image" content="https://www.top10vpn.com/images/2024/10/VPN-Types-fb.jpg" data-next-head=""/><meta property="og:title" content="The 4 Different Types of VPN Explained (and When to Use Them)" data-next-head=""/><meta property="og:type" content="website" data-next-head=""/><meta property="og:url" content="https://www.top10vpn.com/what-is-a-vpn/vpn-types/" data-next-head=""/><meta name="robots" content="index,follow" data-next-head=""/><meta name="twitter:card" content="summary" data-next-head=""/><meta name="twitter:site" content="@top10vpn" data-next-head=""/><meta name="twitter:title" content="The 4 Different Types of VPN Explained (and When to Use Them)" data-next-head=""/><meta name="twitter:description" content="VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them." data-next-head=""/><meta name="twitter:image" content="https://www.top10vpn.com/images/2024/10/VPN-Types-tw.jpg" data-next-head=""/><link rel="canonical" href="https://www.top10vpn.com/what-is-a-vpn/vpn-types/" data-next-head=""/><link rel="preload" as="image" imageSrcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2022%2F12%2Fexpertbio-JP-small-opt.jpeg&w=32&q=75 1x, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2022%2F12%2Fexpertbio-JP-small-opt.jpeg&w=64&q=75 2x" data-next-head=""/><link rel="icon" type="image/x-icon" href="/static/images/favicon/site-icon.png"/><link rel="icon" type="image/svg+xml" href="/static/images/favicon/favicon.svg"/><link rel="apple-touch-icon" sizes="180x180" href="/static/images/favicon/apple-touch-icon.png"/><link rel="icon" type="image/png" sizes="32x32" href="/static/images/favicon/favicon-32x32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/static/images/favicon/favicon-16x16.png"/><link rel="manifest" href="/static/images/favicon/manifest.json?v072020"/><link rel="mask-icon" href="/static/images/favicon/safari-pinned-tab.svg" color="#5bbad5"/><meta name="msapplication-TileColor" content="#2b5797"/><meta name="theme-color" content="#ffffff"/><script data-description="gtag-ref"></script><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-af3e0668f3d4fef9.js" defer=""></script><script src="/_next/static/chunks/framework-c2373564c69ff406.js" defer=""></script><script src="/_next/static/chunks/main-0cfefd9e8ccfd873.js" defer=""></script><script src="/_next/static/chunks/pages/_app-7f94596ba82f0c96.js" defer=""></script><script src="/_next/static/chunks/2922-b8598e76b68d9311.js" defer=""></script><script src="/_next/static/chunks/2984-c6d08eb8498a417c.js" defer=""></script><script src="/_next/static/chunks/5627-66140329a263e49c.js" defer=""></script><script src="/_next/static/chunks/4568-35eb771f76fd9ccc.js" defer=""></script><script src="/_next/static/chunks/6489-ee455908d41fd8d2.js" defer=""></script><script src="/_next/static/chunks/3324-e8838ab9ab17e500.js" defer=""></script><script src="/_next/static/chunks/pages/what-is-a-vpn/%5Bslug%5D-96cc9dbed3874d24.js" defer=""></script><script src="/_next/static/eba613bb9ce2136c91543a121112b4bfd932a7f4/_buildManifest.js" defer=""></script><script src="/_next/static/eba613bb9ce2136c91543a121112b4bfd932a7f4/_ssgManifest.js" defer=""></script><style id="__jsx-3861640846">*{box-sizing:border-box;}html,body,div,span,object,iframe,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,address,code,del,em,img,small,strong,sub,sup,tt,var,b,u,i,center,dl,dt,dd,ol,ul,li,fieldset,form,label,legend,table,caption,tbody,tfoot,thead,tr,th,td,article,aside,canvas,details,embed,figure,figcaption,footer,header,menu,nav,output,section,summary,time,video{margin:0;padding:0;border:0;font:inherit;vertical-align:baseline;}article,aside,details,figcaption,figure,footer,header,menu,nav,section{display:block;}html{font-size:100%;text-rendering:optimizeLegibility;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;}body{line-height:1;}ol,ul{list-style:none;}a{-webkit-text-decoration:none;text-decoration:none;}blockquote,q{quotes:none;}blockquote:before,blockquote:after,q:before,q:after{content:none;}table{border-collapse:collapse;border-spacing:0;}input,textarea{-webkit-appearance:none;}sup{vertical-align:super;font-size:smaller;}sub{vertical-align:sub;font-size:smaller;}</style><style id="__jsx-1508742310">:root{--spacing:10px;--spacing-xl:calc(var(--spacing) * 4);--spacing-lg:calc(var(--spacing) * 3.2);--spacing-md:calc(var(--spacing) * 2.4);--spacing-sm:calc(var(--spacing) * 1.6);--spacing-xs:calc(var(--spacing) * 0.8);--base-unit:4px;--blue-10:#ebf2fc;--blue-20:#d4dffc;--blue-30:#b8c6fc;--blue-40:#97aaf7;--blue-50:#7787f2;--blue-60:#5d66eb;--blue-70:#414bd9;--blue-80:#2c35bf;--blue-90:#1e2694;--blue-100:#1c2057;--green-10:#e4f5f4;--green-20:#b8e6e6;--green-30:#66d9d1;--green-40:#3ac2b9;--green-50:#1aa198;--green-60:#0d8078;--green-70:#096962;--green-80:#0b524d;--green-90:#083d3a;--green-100:#072b29;--orange-10:#faf0ed;--orange-20:#fad6cd;--orange-30:#fbb8a7;--orange-40:#fa9075;--orange-50:#eb603d;--orange-60:#d4360f;--orange-70:#ad2807;--orange-80:#85250d;--orange-90:#5e2314;--orange-100:#361f1a;--pink-10:#faf0f2;--pink-20:#fad4dc;--pink-30:#fab4c2;--pink-40:#f78ba0;--pink-50:#ed5a78;--pink-60:#d62b4d;--pink-70:#b31433;--pink-80:#8c0e27;--pink-90:#6b0e21;--pink-100:#4d0f1b;--yellow-10:#fcf2e3;--yellow-20:#fcd8a2;--yellow-30:#faba5a;--yellow-40:#ed9b1f;--yellow-50:#cc7c04;--yellow-60:#a36303;--yellow-70:#824f03;--yellow-80:#663f06;--yellow-90:#4a300a;--yellow-100:#33240e;--white:#fff;--grey-05:#f9f9f9;--grey-10:#f5f1f0;--grey-20:#e3dddc;--grey-30:#c7c4c3;--grey-40:#b0acab;--grey-50:#918e8d;--grey-60:#737378;--grey-70:#5b5b63;--grey-80:#474852;--grey-90:#353642;--grey-100:#232434;--black:#000;--font-circular:CircularPro, Arial CircularPro Fallback, sans-serif;--font-calibre:Calibre, Arial Calibre Fallback, sans-serif;--basefont:0.625rem;}</style><style id="__jsx-2356626725">@font-face{font-family:"CircularPro";src: url("/static/fonts/lineto-circular-pro-book.woff2") format("woff2"), url("/static/fonts/lineto-circular-pro-book.woff") format("woff");font-weight:400;font-style:normal;font-display:swap;}@font-face{font-family:"Calibre";src: url("/static/fonts/calibre-medium-full.woff2") format("woff2"), url("/static/fonts/calibre-medium-full.woff") format("woff");font-weight:600;font-style:normal;font-display:swap;}@font-face{font-family:"Calibre";src: url("/static/fonts/calibre-regular-full.woff2") format("woff2"), url("/static/fonts/calibre-regular-full.woff") format("woff");font-weight:400;font-style:normal;font-display:swap;}@font-face{font-family:"Arial Calibre Fallback";src:local("Arial");size-adjust:86%;-webkit-descent-override:0%;descent-override:0%;}@font-face{font-family:"Arial CircularPro Fallback";src:local("Arial");size-adjust:102%;}@font-face{font-family:"CircularPro";src: url("/static/fonts/lineto-circular-pro-bold.woff2") format("woff2"), url("/static/fonts/lineto-circular-pro-bold.woff") format("woff");font-weight:600;font-style:normal;font-display:swap;}@font-face{font-family:"Calibre";src: url("/static/fonts/calibre-light-full.woff2") format("woff2"), url("/static/fonts/calibre-light-full.woff") format("woff");font-weight:200;font-style:normal;font-display:swap;}</style><style id="__jsx-433997633">.heading-1,.heading-2,.heading-3,.heading-4,.heading-5,.heading-6,.app .block-text h2,.app .block-text h3,.app .block-text h5,.app .block-text h4{font-family:var(--font-circular);line-height:1.25;font-weight:600;color:var(--grey-100);}.heading-1{font-size:2.16rem;}@media screen and (min-width:1024px){.heading-1{font-size:2.592rem;}}.heading-2,.app .block-text h2:not([class*="heading-"]){font-size:1.8rem;}@media screen and (min-width:1024px){.heading-2,.app .block-text h2:not([class*="heading-"]){font-size:2.16rem;}}.heading-3{font-size:1.5rem;}@media screen and (min-width:1024px){.heading-3{font-size:1.8rem;}}.heading-4{font-size:1.25rem;}@media screen and (min-width:1024px){.heading-4{font-size:1.5rem;}}.heading-5,.app .block-text h5:not([class*="heading-"]){font-size:1.125rem;}@media screen and (min-width:1024px){.heading-5,.app .block-text h5:not([class*="heading-"]){font-size:1.25rem;}}.heading-6,.app .block-text h6:not([class*="heading-"]){font-size:1.125rem;}p,main a,p a{font-family:var(--font-calibre);}p{font-size:1.25rem;line-height:1.5;color:var(--grey-100);margin-bottom:calc(var(--base-unit) * 4);overflow-wrap:anywhere;}p.teaser{line-height:1.25;color:var(--grey-80);font-size:1.125rem;}a{color:var(--blue-80);border-radius:4px;outline-color:var(--orange-40);}a:hover{color:var(--blue-90);}main a:hover{-webkit-text-decoration:underline;text-decoration:underline;}p a:visited{color:var(--blue-90);}.subhead,.intro-text,.intro-text p{color:var(--grey-80);line-height:1.5;font-family:var(--font-circular);font-size:1.125rem;}@media screen and (min-width:1024px){.intro-text,.intro-text p{font-size:1.25rem;}}.caption{font-family:var(--font-calibre);font-size:1rem;line-height:20px;}h1:not([class*="heading-"]),h2:not([class*="heading-"]),h3:not([class*="heading-"]),h4:not([class*="heading-"]){font-family:var(--font-circular);font-weight:600;color:var(--grey-100);}h1:not([class*="heading-"]){font-size:2.125rem;line-height:1.2;}@media only screen and (min-width:768px){h1:not([class*="heading-"]){font-size:2.375rem;line-height:1.4;}}@media only screen and (min-width:1024px){h1:not([class*="heading-"]){font-size:2.625rem;line-height:1.4;}}h2:not([class*="heading-"]){font-size:1.875rem;line-height:1.2;}@media only screen and (min-width:768px){h2:not([class*="heading-"]){font-size:2rem;line-height:1.4;}}@media only screen and (min-width:1024px){h2:not([class*="heading-"]){font-size:2.25rem;line-height:1.4;}}h3:not([class*="heading-"]){font-size:1.5rem;line-height:1.3;}@media only screen and (min-width:768px){h3:not([class*="heading-"]){line-height:1.4;}}@media only screen and (min-width:1024px){h3:not([class*="heading-"]){font-size:1.75rem;line-height:1.4;}}h4:not([class*="heading-"]){font-family:var(--font-circular);font-weight:600;font-size:1.375rem;line-height:1.4;}@media only screen and (min-width:1024px){h4:not([class*="heading-"]){font-size:1.5rem;}}</style><style id="__jsx-1443451971">.container{margin-right:auto;margin-left:auto;}.root{min-width:320px;width:100%;padding:0;}.container{display:block;margin:0 auto;padding-left:12px;padding-right:12px;width:100%;max-width:1024px;}@media (max-width:767px){.container.mobile-full-width{width:100%;padding:0;}}.row{box-sizing:border-box;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex:0 1 auto;-ms-flex:0 1 auto;flex:0 1 auto;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;margin-right:-5px;margin-left:-5px;}.row--no-pad{margin-right:0;margin-left:0;}.col-xs-12{box-sizing:border-box;-webkit-flex:0 0 auto;-ms-flex:0 0 auto;flex:0 0 auto;padding-right:5px;padding-left:5px;-webkit-flex-basis:100%;-ms-flex-preferred-size:100%;flex-basis:100%;max-width:100%;}@media only screen and (min-width:460px){.container{width:460px;}}@media only screen and (min-width:768px){.container{width:748px;padding-left:18px;padding-right:18px;}}@media only screen and (min-width:1024px){.container{width:890px;padding-left:0;padding-right:0;}}@media screen and (max-width:767px){.container-mobile-only{margin:0 auto;padding-left:12px;padding-right:12px;width:100%;max-width:460px;}}@media screen and (min-width:768px){.container-tablet-desktop-only{margin:0 auto;width:748px;padding-left:18px;padding-right:18px;max-width:1024px;}}@media only screen and (min-width:1024px){.container-tablet-desktop-only{width:890px;padding-left:0;padding-right:0;}}.container-row{margin:0 auto;padding-right:12px;padding-left:12px;width:100%;}@media screen and (min-width:768px){.container-row{padding-right:40px;padding-left:40px;max-width:calc(40px + 1160px + 40px);}}.ut-wrapper{position:relative;}@media screen and (min-width:834px){.ut-row{width:calc(554 * (100% + 40px + 40px) / 834);max-width:760px;}}</style><style id="__jsx-3647504613">.table__heading{font-family:var(--font-circular);font-weight:600;font-size:1.625rem;line-height:1.25;text-align:left;color:var(--grey-100);display:block;margin-bottom:24px;}table:not([class]),.table-default{width:100%;border-collapse:collapse;border-spacing:0;border:none;border-top:2px solid var(--blue-60);table-layout:fixed;}table:not([class]) th,.table-default th{font-family:var(--font-calibre);font-weight:600;font-size:1.25rem;line-height:1.25;color:var(--grey-80);min-height:52px;text-align:left;background-color:#f9f9f980;padding:14px 12px;}table:not([class]) td,.table-default td{padding:12px 12px 16px;background:white;font-family:var(--font-calibre);font-size:1.25rem;line-height:1.25;color:var(--grey-100);}table:not([class]) tbody tr,.table-default tbody tr:not(.ppc__table-row){border-bottom:1px solid var(--grey-05);}@media screen and (min-width:768px){table:not([class]) tbody tr:hover td,.table-default tbody tr:hover td{background:var(--grey-05);}}@media screen and (max-width:767px){.table__heading{margin-bottom:16px;font-size:1.5rem;}table:not([class]) th,.table-default th{font-size:1.125rem;line-height:1.25;padding:10px 8px 12px 8px;}table:not([class]) th,.table-default td{font-size:1.125rem;line-height:1.25;padding:12px 8px 11px 8px;}table:not([class]) tbody tr:first-child td,.table-default tbody tr:first-child td{padding-top:16px;}}.table-not-stacked{margin-bottom:calc(var(--base-unit) * 6);display:block;overflow:auto;overflow-y:hidden;}.table-not-stacked td,.table-not-stacked th{min-width:100px;}.table-not-stacked th,.table-stacked th{font-family:var(--font-circular);font-weight:600;font-size:1rem;color:var(--grey-100);}@media screen and (max-width:767px){.table-stacked th{display:none;}.table-stacked tr{border-top:2px solid var(--blue-60);border-bottom:none;}.table-stacked td{display:block;}.table-stacked td:first-child{padding-top:16px;}.table-stacked td:last-of-type{margin-bottom:calc(var(--base-unit) * 6);}.table-stacked td:before{content:attr(data-header);display:block;font-family:var(--font-circular);font-weight:600;font-size:0.875rem;color:var(--grey-100);text-align:left;text-transform:uppercase;padding-bottom:calc(var(--base-unit) * 2);}}.table-default.table-all-centre td,.table-default.table-all-centre th{text-align:center;}.table-default.table-1col_left-rest_centre td:not(:first-of-type),.table-default.table-1col_left-rest_centre th:not(:first-of-type){text-align:center;}.table-default.table-2col_left-rest_centre td:nth-of-type(n + 3),.table-default.table-2col_left-rest_centre th:nth-of-type(n + 3){text-align:center;}.table-caption,.app .block-text .table-caption{font-size:1.125rem;color:var(--grey-60);line-height:1.25;margin-top:calc(var(--base-unit) * 4);margin-bottom:calc(var(--base-unit) * 8);}@media screen and (min-width:768px){.table-caption,.app .block-text .table-caption{margin-bottom:calc(var(--base-unit) * 12);}}table code,.app .block-text table code{font-family:monospace;font-size:0.875rem;background:none;padding:0;color:initial;}table:not([class])::-webkit-scrollbar,.table-default::-webkit-scrollbar{-webkit-appearance:none;width:calc(var(--base-unit) * 2);height:calc(var(--base-unit) * 2);}table:not([class])::-webkit-scrollbar-thumb,.table-default::-webkit-scrollbar-thumb{border-radius:4px;background-color:rgba(0,0,0,0.25);}.table-default a{font-family:inherit;font-size:inherit;font-weight:inherit;}</style><style id="__jsx-2318686448">.button-primary{display:inline-block;text-align:center;padding:calc(var(--base-unit) * 2) calc(var(--base-unit) * 3);font-family:var(--font-circular);font-size:1.125rem;font-weight:normal;line-height:1;color:white;background-color:#5d66eb;border-radius:5px;border:none;outline-color:var(--orange-40);cursor:pointer;-webkit-tap-highlight-color:rgba( 0, 0, 0, 0 );background-position:center;-webkit-transition:background 800ms;transition:background 800ms;}.button-primary:hover{color:white;-webkit-text-decoration:none;text-decoration:none;background:var(--blue-90) radial-gradient(circle,transparent 2%,var(--blue-90) 2%) center/10000%;}.button-primary:active{-webkit-transition:background 0s;transition:background 0s;background-size:100%;background-color:var(--blue-80);}.button-primary.mod-dark-bg:hover{color:var(--grey-100);-webkit-text-decoration:none;text-decoration:none;background:var(--blue-40) radial-gradient(circle,transparent 2%,var(--blue-40) 2%) center/10000%;}.button-primary.mod-dark-b:active{-webkit-transition:background 0s;transition:background 0s;background-size:100%;background-color:var(--blue-80);}.button-secondary{display:inline-block;text-align:center;padding:calc(var(--base-unit) * 2) calc(var(--base-unit) * 3);font-family:var(--font-circular);font-size:1.125rem;font-weight:normal;line-height:1;color:var(--grey-100);background-color:white;border-radius:5px;border:1px solid var(--grey-30);outline-color:var(--orange-40);cursor:pointer;-webkit-tap-highlight-color:rgba( 0, 0, 0, 0 );background-position:center;-webkit-transition:background 800ms;transition:background 800ms;}.button-secondary:hover{color:var(--grey-100);-webkit-text-decoration:none;text-decoration:none;background:var(--grey-05) radial-gradient(circle,transparent 2%,white 2%) center/10000%;}.button-secondary:active{-webkit-transition:background 0s;transition:background 0s;background-size:100%;background-color:var(--grey-05);}.button-secondary:disabled,.button-primary:disabled{background:var(--grey-40);cursor:not-allowed;}.button-text{color:var(--blue-80);cursor:pointer;border:none;background-color:transparent;padding:0;font-family:var(--font-circular);font-size:1rem;font-weight:normal;line-height:1.25;}.button-text:hover{-webkit-text-decoration:none;text-decoration:none;color:var(--blue-90);}.mod-thick{font-size:1.25rem;line-height:1.2;}.mod-slim{font-size:0.875rem;line-height:1.2;padding:calc(var(--base-unit) * 1) calc(var(--base-unit) * 2);}@media screen and (min-width:768px){.mod-slim-tablet-up{font-size:0.875rem;line-height:1.2;padding:calc(var(--base-unit) * 1) calc(var(--base-unit) * 2);}}.mod-rounded{border-radius:30px;padding:calc(var(--base-unit) * 2) calc(var(--base-unit) * 4);}</style><style id="__jsx-490617698">.link-loading{cursor:progress;}.ellipsis{overflow:hidden;text-overflow:ellipsis;white-space:nowrap;}.flex{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}.flex-align-items-center{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}.flex-pills{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}@media screen and (max-width:767px){.flex-pills{-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;text-align:center;}}@media screen and (max-width:767px){.flex-pills *:first-child{-webkit-flex-basis:100%;-ms-flex-preferred-size:100%;flex-basis:100%;}}.visually-hidden{position:absolute;left:-9999px;top:-9999px;color:transparent;}.icon-chevron-left{-webkit-transform:rotate(180deg);-ms-transform:rotate(180deg);transform:rotate(180deg);}.icon-chevron-down{-webkit-transform:rotate(90deg);-ms-transform:rotate(90deg);transform:rotate(90deg);}.icon-chevron-up{-webkit-transform:rotate(270deg);-ms-transform:rotate(270deg);transform:rotate(270deg);}.ml-1{margin-left:calc(var(--base-unit) * 1);}.ml-2{margin-left:calc(var(--base-unit) * 2);}.mr-1{margin-right:calc(var(--base-unit) * 1);}.mr-2{margin-right:calc(var(--base-unit) * 2);}.custom-scrollbar::-webkit-scrollbar{background-color:#fff;width:16px;}.custom-scrollbar::-webkit-scrollbar-track{background-color:#fff;}.custom-scrollbar::-webkit-scrollbar-track:hover{background-color:#f4f4f4;}.custom-scrollbar::-webkit-scrollbar-thumb{background-color:#babac0;border-radius:16px;border:5px solid #fff;}.custom-scrollbar::-webkit-scrollbar-thumb:hover{background-color:#a0a0a5;border:4px solid #f4f4f4;}.custom-scrollbar::-webkit-scrollbar-button{display:none;}</style><style id="__jsx-3040803073">@media screen and (max-width:768px){html::-webkit-scrollbar{width:0;background:transparent;}}body{background-color:white;font-family:var(--font-calibre);overflow-x:hidden;}body.lock{overflow:hidden;}</style><style id="__jsx-3589725216">[data-dollar-value]{border-bottom:1px dashed var(--grey-70);cursor:pointer;}</style><style id="__jsx-1164853676">.skip-nav{position:absolute;top:-999px;}.skip-nav:focus{top:0;}.btn-search{background:none;border:none;width:44px;padding:0;position:absolute;right:calc(var(--base-unit) * 2 + 44px);z-index:4;height:48px;font-size:1.5rem;margin-top:calc(var(--base-unit) * 2);cursor:pointer;}@media screen and (min-width:768px){.btn-search{margin-top:0;}}@media screen and (min-width:1024px){.btn-search{right:calc(var(--base-unit) * 2);}}.btn-search svg{-webkit-transform:translateY(2px);-ms-transform:translateY(2px);transform:translateY(2px);}.hamburger{background:none;border:none;width:44px;padding:0;position:absolute;right:calc(var(--base-unit) * 2);z-index:100;height:48px;font-size:1.5rem;margin-top:calc(var(--base-unit) * 2);cursor:pointer;}@media screen and (min-width:768px){.hamburger{margin-top:0;}}@media screen and (min-width:1024px){.hamburger{display:none;}}@media screen and (max-width:1023px){.main-header__nav{background:white;position:fixed;z-index:5;right:-400px;top:0;height:100%;width:320px;-webkit-transition:all 0.3s ease-in-out;transition:all 0.3s ease-in-out;overflow-y:scroll;-webkit-overflow-scrolling:touch;}}@media screen and (min-width:1024px){.hidden-lg-menu,.main-header__nav>ul>li.submenuOpen>ul.hidden-lg-menu,.main-header__nav>ul>li:hover>ul.hidden-lg-menu{display:none;}.main-header__nav{display:inline-block;float:left;}.main-header__nav a{color:var(--grey-100);}.main-header__nav>ul{line-height:0.9;}.main-header__nav>ul>li{float:left;position:relative;height:48px;margin-top:-16px;padding-top:16px;margin-left:26px;}.main-header__nav>ul>li>a,.main-header__nav>ul>li>span.main-menu{cursor:pointer;display:inline-block;line-height:1;text-transform:uppercase;font-family:var(--font-circular);font-size:1rem;padding:16px 0;width:auto;}.main-header__nav>ul>li>ul{display:none;}.main-header__nav>ul>li.active>span.main-menu,.main-header__nav>ul>li.active>a{font-weight:bold;}}</style><style id="__jsx-1793027758">@media screen and (min-width:1024px){.main-header__nav>ul.ppc>li:first-child{margin-left:62px;}.main-header__nav>ul.ppc>li{margin-left:40px;}}@media screen and (max-width:1023px){.main-header__overlay{background-color:var(--blue-100);width:100%;position:fixed;overflow:hidden;height:0;left:0;top:-100px;z-index:-2;-webkit-transition:opacity 0.25s ease;transition:opacity 0.25s ease;opacity:0;}.main-header__wrapper.active .main-header__overlay{z-index:2;opacity:0.5;height:122%;}}</style><style id="__jsx-2034782048">.main-header{display:block;background:white;height:58px;padding:0 12px;position:relative;box-shadow:2px 2px 4px 0 rgba(114,114,157,0.15);z-index:2;}.main-header>.container{width:100%;}@media screen and (min-width:1024px){.main-header>.container{max-width:none;padding-left:18px;padding-right:18px;}}.main-header__logo{height:20px;display:block;float:left;margin:18px 0;cursor:pointer;}@media screen and (min-width:768px){.main-header{height:calc(var(--base-unit) * 12);padding:0 18px;}.main-header__logo{margin:14px 0;}}@media screen and (max-width:1023px){.main-header{padding:0;}}@media screen and (min-width:1024px){.main-header{padding:0;}.main-header__nav>ul>li:first-child{margin-left:48px;}}</style><style id="__jsx-3130565390">.date-wtu-container.jsx-3130565390{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;margin-bottom:calc(var(--base-unit) * 5);}@media screen and (min-width:834px){.date-wtu-container.jsx-3130565390{-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-column-gap:calc(var(--base-unit) * 3);column-gap:calc(var(--base-unit) * 3);margin-bottom:calc(var(--base-unit) * 8);}}@media screen and (min-width:1024px){.date-wtu-container.jsx-3130565390{margin-bottom:calc(var(--base-unit) * 10);}}.author-updated.jsx-3130565390{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;font-family:var(--font-circular);font-size:0.875rem;color:var(--grey-100);-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;margin-bottom:calc(var(--base-unit) * 3);-webkit-flex:1 0 auto;-ms-flex:1 0 auto;flex:1 0 auto;}@media screen and (min-width:834px){.author-updated.jsx-3130565390{-webkit-box-flex:0;-webkit-flex-grow:0;-ms-flex-positive:0;flex-grow:0;margin-bottom:0;}}.icon-tick.jsx-3130565390{background-color:var(--grey-100);fill:white;display:inline-block;width:14px;height:14px;border-radius:50%;text-align:center;margin-right:4px;padding:1px;}.wtu-button.jsx-3130565390{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;padding:calc(var(--base-unit) * 1) calc(var(--base-unit) * 2);-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;gap:4px;border-radius:10px;background:var(--blue-20);border:none;cursor:pointer;pointer-events:none;}.wtu-button.jsx-3130565390 span.jsx-3130565390{color:var(--grey-100);font-family:var(--font-circular);font-size:0.875rem;line-height:1rem;}.authors-grid.jsx-3130565390{padding-bottom:calc(var(--base-unit) * 5);border-bottom:1px solid var(--grey-30);}@media screen and (min-width:834px){.authors-grid.jsx-3130565390{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;padding-bottom:calc(var(--base-unit) * 4);}}@media screen and (min-width:1024px){.authors-grid.jsx-3130565390{padding-bottom:calc(var(--base-unit) * 5);}}.main-author.jsx-3130565390{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;margin-bottom:calc(var(--base-unit) * 1);}@media screen and (min-width:834px){.main-author.jsx-3130565390{-webkit-order:1;-ms-flex-order:1;order:1;margin-bottom:0;}}.amp.jsx-3130565390{margin:0 calc(var(--base-unit) * 2);}.author-photo.jsx-3130565390{-webkit-flex:0 0 auto;-ms-flex:0 0 auto;flex:0 0 auto;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin-right:calc(var(--base-unit) * 2);}.author-photo.jsx-3130565390 img{background:white;border-radius:50%;width:32px;height:32px;overflow:hidden;}.author-photo.jsx-3130565390 :nth-child(n + 2){margin-left:-6px !important;}.author-name.jsx-3130565390 strong.jsx-3130565390,.amp.jsx-3130565390{font-family:var(--font-circular);font-size:0.875rem;font-weight:bold;color:var(--grey-100);}.author-name.jsx-3130565390:hover strong.jsx-3130565390{cursor:pointer;}.author-toggle.jsx-3130565390{background:none;border:none;cursor:pointer;padding:0;margin:0;width:40px;height:40px;}@media screen and (min-width:768px){.author-toggle.jsx-3130565390{width:32px;height:32px;}}.author-toggle.jsx-3130565390:focus{outline:none;}.author-toggle.jsx-3130565390:focus.jsx-3130565390:hover{color:var(--grey-100);}.author-toggle.jsx-3130565390 svg.jsx-3130565390{margin-top:4px;}.author-bio.jsx-3130565390:not(.opened){display:none;}@media screen and (min-width:834px){.author-bio.jsx-3130565390{-webkit-flex:1 0 100%;-ms-flex:1 0 100%;flex:1 0 100%;-webkit-order:3;-ms-flex-order:3;order:3;margin-top:calc(var(--base-unit) * 3);}}.bio-authors.jsx-3130565390{font-family:var(--font-calibre);font-size:1rem;line-height:1.25rem;margin-bottom:calc(var(--base-unit) * 6);}@media screen and (min-width:834px){.bio-authors.jsx-3130565390{margin-bottom:calc(var(--base-unit) * 3);}}.bio-authors.jsx-3130565390 a{font-weight:bold;}.supporting-authors.jsx-3130565390{margin-bottom:0;}@media screen and (min-width:834px){.supporting-authors.jsx-3130565390{-webkit-flex:1 1 auto;-ms-flex:1 1 auto;flex:1 1 auto;-webkit-order:2;-ms-flex-order:2;order:2;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:end;-webkit-justify-content:flex-end;-ms-flex-pack:end;justify-content:flex-end;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}}.supporting-authors.jsx-3130565390 span.jsx-3130565390{display:block;}@media screen and (max-width:833px){.supporting-authors.jsx-3130565390 span.jsx-3130565390:not(:last-child){margin-bottom:calc(var(--base-unit) * 2);}}@media screen and (min-width:834px){.supporting-authors.jsx-3130565390 span.jsx-3130565390+span.jsx-3130565390:before{content:"|";color:var(--grey-40);padding:0 calc(var(--base-unit) * 1);}}.supporting-authors.jsx-3130565390 span.jsx-3130565390,.supporting-authors.jsx-3130565390 a{font-family:var(--font-circular);font-size:0.875rem;line-height:1.25;}.supporting-authors.jsx-3130565390 a{color:var(--grey-100);font-weight:bold;position:relative;z-index:2;}.translated.jsx-3130565390{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;border-radius:10px;padding:calc(var(--base-unit) * 2);margin:calc(var(--base-unit) * 3) 0 0;-webkit-column-gap:calc(var(--base-unit) * 1);column-gap:calc(var(--base-unit) * 1);}.translated.jsx-3130565390:not(.opened){display:none;}@media screen and (min-width:834px){.translated.jsx-3130565390{width:auto;-webkit-order:4;-ms-flex-order:4;order:4;margin-top:0;}}.translated.jsx-3130565390 svg.jsx-3130565390{-webkit-flex:0 0 calc(var(--base-unit) * 7);-ms-flex:0 0 calc(var(--base-unit) * 7);flex:0 0 calc(var(--base-unit) * 7);}.translated.jsx-3130565390 p.jsx-3130565390{-webkit-flex:1 1 auto;-ms-flex:1 1 auto;flex:1 1 auto;font-family:var(--font-calibre);font-size:1rem;line-height:1.25rem;margin:0;padding-right:calc(var(--base-unit) * 2);}@media screen and (min-width:834px){.translated.jsx-3130565390 p.jsx-3130565390{-webkit-flex:1 0 auto;-ms-flex:1 0 auto;flex:1 0 auto;}}.blue .translated.jsx-3130565390{background-color:var(--blue-20);}.green .translated.jsx-3130565390{background-color:var(--green-20);}.orange .translated.jsx-3130565390{background-color:var(--orange-20);}</style><style id="__jsx-1557524140">.ut-header.jsx-1557524140:before{content:"";display:block;position:absolute;top:-80px;left:0;width:100%;height:567px;z-index:-1;}.ut-header.blue.jsx-1557524140:before{background-image:linear-gradient( 178deg, #e9ebfa 31.09%, rgba(235,242,252,0) 75.32% );}.ut-header.green.jsx-1557524140:before{background-image:linear-gradient( 178deg, #e4f5f5 12.27%, rgba(235,242,252,0) 76.71% );}.ut-header.orange.jsx-1557524140:before{background-image:linear-gradient( 178deg, #faf0ed 12.27%, rgba(235,242,252,0) 76.71% );}.ut-header.jsx-1557524140 h1.jsx-1557524140{margin-bottom:calc(var(--base-unit) * 4);padding-top:calc(var(--base-unit) * 5);}@media screen and (min-width:834px){.ut-header.jsx-1557524140 h1.jsx-1557524140{padding-top:calc(var(--base-unit) * 8);}}@media screen and (min-width:1024px){.ut-header.jsx-1557524140 h1.jsx-1557524140{padding-top:calc(var(--base-unit) * 10);}}.ut-header.jsx-1557524140 .disclosure.jsx-1557524140{font-family:var(—font-circular);font-size:0.875rem;color:var(--grey-80);padding-top:calc(var(--base-unit) * 3);margin-bottom:0;}.ut-header.jsx-1557524140 .disclosure.jsx-1557524140 b{font-weight:bold;}.ut-header.jsx-1557524140 .disclosure.jsx-1557524140 a{font-family:var(--font-circular);white-space:nowrap;}.main-header{box-shadow:none;}.main-header{background-color:transparent;}@media screen and (max-width:767px){.ut-header.jsx-1557524140 .container-mobile-only{max-width:none;padding-left:0;padding-right:0;}}</style><style id="__jsx-912259115">.breadcrumbs.jsx-912259115{padding:calc(var(--base-unit) * 3) 0 calc(var(--base-unit) * 7);}@media screen and (min-width:768px){.breadcrumbs.jsx-912259115{padding-top:calc(var(--base-unit) * 5);}}@media screen and (min-width:1024px){.breadcrumbs.jsx-912259115{padding-bottom:calc(var(--base-unit) * 10);}}.breadcrumbs.jsx-912259115 ol.jsx-912259115{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}.breadcrumbs.jsx-912259115 li.jsx-912259115{font-size:1rem;line-height:20px;}.breadcrumbs.jsx-912259115 li.jsx-912259115:last-of-type{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}.breadcrumbs.jsx-912259115 li.jsx-912259115:last-of-type a,.breadcrumbs.jsx-912259115 li.jsx-912259115:last-of-type a:hover{-webkit-text-decoration:none;text-decoration:none;cursor:default;}.breadcrumbs.jsx-912259115 .trigger.jsx-912259115{display:none;cursor:pointer;}@media screen and (max-width:767px){.breadcrumbs.jsx-912259115 .long.jsx-912259115 .trigger.jsx-912259115{display:block;}}@media screen and (max-width:767px){.breadcrumbs.jsx-912259115 .long.jsx-912259115 .inner-slice.jsx-912259115{display:block;width:0;height:0;opacity:0;overflow:hidden;}}.breadcrumbs.jsx-912259115 li.jsx-912259115:not(:last-of-type):after{content:"/";padding:0 calc(var(--base-unit) * 1);}.breadcrumbs.jsx-912259115 li.jsx-912259115,.breadcrumbs.jsx-912259115 a{color:var(--grey-70);}.breadcrumbs.jsx-912259115 a{font-family:var(--font-calibre);}.breadcrumbs.jsx-912259115 img{-webkit-transform:translateY(3px);-ms-transform:translateY(3px);transform:translateY(3px);}.bc-logo.jsx-912259115{display:inline-block;width:16px;height:16px;}</style><style id="__jsx-2580530280">.app section.block-text{margin-bottom:calc(var(--base-unit) * 10);}@media screen and (min-width:768px){.app section.block-text{margin-bottom:calc(var(--base-unit) * 14);}}.app .block-text a{word-break:break-word;}.app .block-text .block-highlighted{border-radius:5px;padding:calc(var(--base-unit) * 3);margin:calc(var(--base-unit) * 4) 0;background-color:var(--grey-10);}.app .block-text .block-highlighted.block-highlighted--light{background-color:var(--grey-05);}.app .block-text .block-highlighted.block-highlighted--blue{background-color:var(--blue-10);}.app .block-text .block-highlighted.block-highlighted--orange{background-color:var(--orange-10);}.app .block-text .block-highlighted.block-highlighted--green{background-color:var(--green-10);}.app .block-text .block-highlighted.block-highlighted--yellow{background-color:var(--yellow-10);}.app .block-text .block-highlighted.block-highlighted--pink{background-color:var(--pink-10);}.app .block-text .block-highlighted.flex>*:first-child{margin-right:calc(var(--base-unit) * 2);}@media screen and (min-width:1024px){.app .block-text .block-highlighted{padding:calc(var(--base-unit) * 4);}}.app .block-text .block-highlighted p>ol,.app .block-text .block-highlighted p>ul,.app .block-text .block-highlighted ul li>ol,.app .block-text .block-highlighted ul li>ul,.app .block-text .block-highlighted ol li>ol,.app .block-text .block-highlighted ol li>ul{margin-left:calc(var(--base-unit) * 5);}.app .block-text .block-highlighted *:first-child{margin-top:0;}.app .block-text .block-highlighted *:last-child li:last-of-type,.app .block-text .block-highlighted *:last-child{margin-bottom:0;}.app .block-text .iframe-wrapper{max-width:710px;margin:0 auto;}.app .block-text .iframe-wrapper div{position:relative;overflow:hidden;padding-top:56.25%;}.app .block-text .iframe-wrapper iframe{position:absolute;top:0;left:0;width:100%;height:100%;border:0;}.app .block-text .wp-caption{max-width:100%;width:100% !important;text-align:center;margin:calc(var(--base-unit) * 8) auto;}.app .block-text .wp-caption img{margin-bottom:0;}.app .block-text .wp-caption.aligncenter{margin-left:auto;margin-right:auto;}.app .block-text .wp-caption .wp-caption-text{text-align:center;font-family:var(--font-calibre);font-size:calc(var(--basefont) * 1.6);line-height:1.12;-webkit-letter-spacing:0.3px;-moz-letter-spacing:0.3px;-ms-letter-spacing:0.3px;letter-spacing:0.3px;color:var(--grey-60);margin-top:calc(var(--base-unit) * 2);}.app .block-text h2{margin-bottom:calc(var(--base-unit) * 5);}@media screen and (min-width:768px){.app .block-text h2{margin-bottom:calc(var(--base-unit) * 8);}}.app .block-text.article-body--single-chapter h2{margin:calc(var(--base-unit) * 10) 0 calc(var(--base-unit) * 5);}@media screen and (min-width:768px){.app .block-text.article-body--single-chapter h2{margin:calc(var(--base-unit) * 12) 0 calc(var(--base-unit) * 8);}}@media screen and (min-width:1024px){.app .block-text.article-body--single-chapter h2{margin:calc(var(--base-unit) * 14) 0 calc(var(--base-unit) * 8);}}.app .block-text h3,.app .block-text h4{margin:calc(var(--base-unit) * 8) auto calc(var(--base-unit) * 4);}@media screen and (min-width:768px){.app .block-text h3,.app .block-text h4{margin:calc(var(--base-unit) * 10) auto calc(var(--base-unit) * 6);}}.app .block-text h5{margin-bottom:calc(var(--base-unit) * 5);}.app .block-text .img-wrapper{margin-bottom:calc(var(--base-unit) * 6);display:block;margin-left:auto;margin-right:auto;text-align:center;}.app .block-text img{height:auto;max-width:100%;margin-bottom:calc(var(--base-unit) * 6);}.app .block-text img.aligncenter{display:block;margin-left:auto;margin-right:auto;}.app .block-text figure{margin-bottom:var(--spacing-md);}.app .block-text figure figcaption{font-family:var(--font-calibre);font-size:1rem;line-height:1.25;color:var(--grey-40);padding-top:calc(var(--base-unit) * 2);}@media screen and (max-width:767px){.app .block-text figure{margin-bottom:calc(var(--base-unit) * 4);}}.app .block-text b,.app .block-text strong{font-weight:bold;}.app .block-text i,.app .block-text em{font-style:italic;}.app .block-text ul{list-style-type:disc;}.app .block-text ol{list-style-type:decimal;}.app .block-text ul,.app .block-text ol{list-style-position:outside;margin-left:19px;font-family:var(--font-calibre);padding:0;margin-bottom:calc(var(--base-unit) * 5);}@media screen and (min-width:768px){.app .block-text ul,.app .block-text ol{margin-bottom:calc(var(--base-unit) * 7);}}.app .block-text ul:not([class]),.app .block-text ol:not([class]){margin-left:28px;}.app .block-text ul.columns-2,.app .block-text ol.columns-2{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;}.app .block-text ul.columns-2>li,.app .block-text ol.columns-2>li{width:100%;}@media screen and (min-width:768px){.app .block-text ul.columns-2>li,.app .block-text ol.columns-2>li{width:calc(50% - 10px);}}.app .block-text ul.columns-2>li,.app .block-text ol.columns-2>li{-webkit-flex:1 0 auto;-ms-flex:1 0 auto;flex:1 0 auto;}@media screen and (min-width:768px){.app .block-text ul.columns-2>li:nth-child(odd),.app .block-text ol.columns-2>li:nth-child(odd){margin-right:10px;}}@media screen and (min-width:768px){.app .block-text ul.columns-2>li:nth-child(even),.app .block-text ol.columns-2>li:nth-child(even){margin-left:10px;}}@media screen and (min-width:768px){.app .block-text ul.columns-two,.app .block-text ol.columns-two{-webkit-column-count:2;column-count:2;}}.app .block-text ul.alpha-lower,.app .block-text ol.alpha-lower{list-style:inside lower-latin;}.app .block-text ul ol,.app .block-text ol ol{list-style-type:decimal;}.app .block-text ul ul,.app .block-text ol ul{list-style-type:circle;}.app .block-text ul li,.app .block-text ol li{color:var(--grey-100);line-height:1.5;font-size:1.25rem;margin-bottom:var(--spacing-sm);}.app .block-text ul li>ul,.app .block-text ul li>ol,.app .block-text ol li>ul,.app .block-text ol li>ol{margin:calc(var(--base-unit) * 4) 0 0 calc(var(--base-unit) * 4);}.app .block-text ul li>ul.columns-2,.app .block-text ul li>ol.columns-2,.app .block-text ol li>ul.columns-2,.app .block-text ol li>ol.columns-2{padding:var(--spacing-md) 0 0 0;}@media screen and (max-width:1023px){.app .block-text ul li,.app .block-text ol li{margin-bottom:var(--spacing-sm);}}@media screen and (max-width:767px){.app .block-text ul li,.app .block-text ol li{margin-bottom:var(--spacing-sm);}}.app .block-text ul li img:last-child,.app .block-text ol li img:last-child{margin-top:calc(var(--base-unit) * 3);margin-bottom:calc(var(--base-unit) * 6);}.app .block-text iframe{max-width:100%;}.app .block-text .icon-list{list-style-type:none;margin-left:0;}.app .block-text .icon-list li{background-repeat:no-repeat;background-size:20px 20px;background-position:0 6px;padding-left:28px;}.app .block-text .icon-list-tick li{background-image:url("data:image/svg+xml,%0A%3Csvg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 24 24'%3E%3Cpath fill='none' d='M0 0h24v24H0z'/%3E%3Cpath fill='%230d8078' d='M9.2 16.2l-3.5-3.5a1 1 0 0 0-1.4 0 1 1 0 0 0 0 1.4l4.2 4.2c.4.4 1 .4 1.4 0L20.5 7.7c.4-.4.4-1 0-1.4a1 1 0 0 0-1.4 0l-9.9 9.9z'/%3E%3C/svg%3E");}.app .block-text .icon-list-cross li{background-image:url("data:image/svg+xml,%0A%3Csvg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 24 24'%3E%3Cpath fill='%23d62b4d' fill-rule='evenodd' d='M18.3 5.7a1 1 0 0 0-1.4 0L12 10.6 7.1 5.7a1 1 0 0 0-1.4 0 1 1 0 0 0 0 1.4l4.9 4.9-4.9 4.9a1 1 0 0 0 0 1.4c.4.4 1 .4 1.4 0l4.9-4.9 4.9 4.9c.4.4 1 .4 1.4 0 .4-.4.4-1 0-1.4L13.4 12l4.9-4.9c.4-.4.4-1 0-1.4z' clip-rule='evenodd'/%3E%3C/svg%3E");}.app .block-text span.circle{font-family:var(--font-circular);font-size:1.375rem;border:3px solid var(--grey-100);color:var(--grey-100);font-weight:bold;text-align:center;width:35px;height:35px;border-radius:50px;line-height:28px;float:left;margin:-1px 8px 0 0;-webkit-flex-shrink:0;-ms-flex-negative:0;flex-shrink:0;}.app .block-text blockquote{border-left:2px solid var(--green-40);margin:calc(var(--base-unit) * 8) 0;}.app .block-text blockquote p{font-family:var(--font-circular);line-height:1.5;font-size:1.25rem;color:var(--grey-100);padding-left:calc(var(--base-unit) * 4);-webkit-letter-spacing:unset;-moz-letter-spacing:unset;-ms-letter-spacing:unset;letter-spacing:unset;}@media screen and (min-width:768px){.app .block-text blockquote p{font-size:1.375rem;}}.app .block-text blockquote a{font-family:var(--font-circular);}.app .block-text code{background:var(--grey-05);padding:var(--base-unit) calc(var(--base-unit) * 3);border-radius:3px;font-family:monospace;font-size:1rem;color:var(--grey-100);}.app .block-text .spacer{height:calc(var(--base-unit) * 4);}.app .block-text .green-cta{background-color:var(--green-10);border-radius:5px;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;overflow:hidden;margin-bottom:calc(var(--base-unit) * 4);color:var(--green-100);padding:0;text-align:left;}.app .block-text .green-cta:hover{-webkit-text-decoration:none;text-decoration:none;background:var(--green-20) radial-gradient(circle,transparent 2%,var(--green-20) 2%) center/10000%;}.app .block-text .green-cta:hover svg{-webkit-transform:translateX(2px);-ms-transform:translateX(2px);transform:translateX(2px);}.app .block-text .green-cta:active{background-size:100%;background-color:var(--green-30);}.app .block-text .green-cta .green-cta--contents{-webkit-flex:1 1 auto;-ms-flex:1 1 auto;flex:1 1 auto;margin:calc(var(--base-unit) * 3);line-height:1.25;font-weight:bold;font-family:var(--font-calibre);font-size:1.25rem;}.app .block-text .green-cta .green-cta--icon-area{background-color:var(--green-50);min-width:30px;min-height:calc(var(--base-unit) * 13);display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}.app .block-text .green-cta .green-cta--icon-area:before{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}.app .block-text .green-cta svg{fill:white;}</style><style id="__jsx-3768225127">.toc-mobile-placeholder.jsx-3768225127{height:calc(var(--base-unit) * 13);}@media screen and (min-width:834px){.toc-mobile-placeholder.jsx-3768225127{display:none;}}.toc-mobile.jsx-3768225127{display:none;}@media screen and (max-width:833px){.toc-mobile.jsx-3768225127{display:block;background-color:var(--grey-90);padding:calc(var(--base-unit) * 1);}}.toc-mobile.sticky.jsx-3768225127{margin:0;width:100vw;position:fixed;top:0;left:0;z-index:100;}.toc-mobile.jsx-3768225127 button.jsx-3768225127{background:white;border:none;border-radius:5px;color:var(--grey-100);font-family:var(--font-circular);font-weight:bold;font-size:1rem;line-height:1.25;text-transform:uppercase;padding:calc(var(--base-unit) * 3);text-align:left;width:100%;outline:none;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}.toc-mobile.jsx-3768225127 span.jsx-3768225127{-webkit-flex:1 1 auto;-ms-flex:1 1 auto;flex:1 1 auto;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;}.toc-mobile.jsx-3768225127 svg.jsx-3768225127{margin-left:calc(var(--base-unit) * 2);-webkit-flex:0 0 calc(var(--base-unit) * 5);-ms-flex:0 0 calc(var(--base-unit) * 5);flex:0 0 calc(var(--base-unit) * 5);}@media (min-width:834px){aside.jsx-3768225127{position:-webkit-sticky;position:sticky;z-index:10;top:calc(var(--base-unit) * 4);}}.main-list.jsx-3768225127{list-style:none;}@media screen and (max-width:833px){.main-list.jsx-3768225127{display:none;}}.main-list.jsx-3768225127 li.jsx-3768225127{color:var(--grey-70);margin:1px 0;}.main-list.jsx-3768225127 li.jsx-3768225127 ol.jsx-3768225127 li.jsx-3768225127 a.jsx-3768225127{margin-left:calc(var(--base-unit) * 5);}.main-list.jsx-3768225127 li.jsx-3768225127 .inner-list-wrapper.jsx-3768225127{display:grid;grid-template-rows:0fr;-webkit-transition:250ms grid-template-rows ease;transition:250ms grid-template-rows ease;}.main-list.jsx-3768225127 li.open.jsx-3768225127 .inner-list-wrapper.jsx-3768225127{grid-template-rows:1fr;}.main-list.jsx-3768225127 li.jsx-3768225127 .inner-list-wrapper.jsx-3768225127 ol.jsx-3768225127{overflow:hidden;}li.jsx-3768225127 a.jsx-3768225127{-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;display:block;font-family:var(--font-circular);font-size:1rem;line-height:1.125rem;padding:calc(var(--base-unit) * 2);background-color:transparent;border-radius:5px;-webkit-transition:background-color 250ms;transition:background-color 250ms;}@media screen and (min-width:834px){li.jsx-3768225127 a.jsx-3768225127{font-size:0.875rem;}}li.jsx-3768225127 a.active.jsx-3768225127,li.jsx-3768225127 a.jsx-3768225127:hover{-webkit-text-decoration:none;text-decoration:none;}@media screen and (min-width:834px){li.jsx-3768225127 a.active.jsx-3768225127,li.jsx-3768225127 a.jsx-3768225127:hover{background-color:var(--grey-10);}}li.jsx-3768225127 a.active.jsx-3768225127{font-weight:bold;color:var(--grey-100);}li.jsx-3768225127 a.jsx-3768225127:not(.active):link,li.jsx-3768225127 a.jsx-3768225127:not(.active):visited{color:var(--grey-100);}li.jsx-3768225127 a.has-list.jsx-3768225127{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;padding-right:calc(var(--base-unit) * 1);}@media screen and (min-width:834px){.has-list.jsx-3768225127 svg.jsx-3768225127{display:none;}}li.open.jsx-3768225127 a.has-list.jsx-3768225127 svg.jsx-3768225127{-webkit-transform:rotate(270deg);-ms-transform:rotate(270deg);transform:rotate(270deg);}body[data-overlays*="mobile-jumplinks"]{overflow:hidden;}@media (max-width:833px){.jumplinks.fullscreen.jsx-3768225127{overflow-y:scroll;height:100vh;height:100dvh;width:100vw;background:rgba(28,32,87,0.7);margin:0;position:fixed;top:0;left:0;z-index:100;}}@media (max-width:833px){.jumplinks.fullscreen.jsx-3768225127 .main-list.jsx-3768225127{display:block;height:auto;margin:0;width:100%;border:calc(var(--base-unit) * 1) solid var(--grey-90);border-top:none;padding:calc(var(--base-unit) * 2);background:white;border-radius:0 0 10px 10px;}}@media (max-width:833px){.jumplinks.fullscreen.jsx-3768225127 .inner-list-wrapper.jsx-3768225127 ol.jsx-3768225127{margin-left:calc(var(--base-unit) * -2);background:var(--grey-10);width:calc(100% + var(--base-unit) * 4);}}@media (max-width:833px){.jumplinks.fullscreen.jsx-3768225127 .inner-list-wrapper.jsx-3768225127 li.jsx-3768225127:hover{background:inherit;}}@media (max-width:833px){body[data-overlays*="mobile-jumplinks"] #footer #back-to-top-btn,body[data-overlays*="mobile-jumplinks"] .main-header{z-index:-1;}}</style><style id="__jsx-1808564872">.video-wrapper.jsx-1808564872{position:relative;overflow:hidden;margin:0 auto calc(var(--base-unit) * 4);}.news-article .video-wrapper.jsx-1808564872{max-width:590px;}.video-wrapper.yt-shorts.jsx-1808564872 .aspect-ratio-wrapper.jsx-1808564872{height:100%;aspect-ratio:676 / 1201;max-height:80vh;max-width:450px;margin:0 auto;}.video-wrapper.yt-widescreen.jsx-1808564872 .aspect-ratio-wrapper.jsx-1808564872{padding-top:56.25%;}.video-wrapper.yt-widescreen.jsx-1808564872 iframe.jsx-1808564872,.video-wrapper.yt-widescreen.jsx-1808564872 .img.jsx-1808564872{position:absolute;top:0;left:0;width:100%;height:100%;border:0;}.video-wrapper.ut-wrapper.jsx-1808564872{border:4px solid black;}.video-wrapper.jsx-1808564872 iframe.jsx-1808564872{z-index:1;}.video-wrapper.jsx-1808564872 .img.jsx-1808564872{z-index:2;height:100%;top:0;position:relative;overflow:hidden;}.video-wrapper.jsx-1808564872 .img.jsx-1808564872:after{display:block;content:"";width:120%;height:100%;position:absolute;left:-10%;box-shadow:0 30px 40px 11px rgba(0,0,0,0.5) inset;}.video-wrapper.jsx-1808564872 .img.jsx-1808564872>img{object-fit:cover;}.video-wrapper.jsx-1808564872 .play.jsx-1808564872{width:68px;height:48px;position:absolute;-webkit-transform:translate3d(-50%,-50%,0);-ms-transform:translate3d(-50%,-50%,0);transform:translate3d(-50%,-50%,0);top:50%;left:50%;z-index:3;cursor:pointer;text-indent:-999px;overflow:hidden;border:none;background-color:transparent;background-image:url('data:image/svg+xml;utf8,<svg xmlns="http://www.w3.org/2000/svg" version="1.1" viewBox="0 0 68 48"><path fill="%23f00" fill-opacity="0.8" d="M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z"></path><path d="M 45,24 27,14 27,34" fill="%23fff"></path></svg>');-webkit-filter:grayscale(100%);filter:grayscale(100%);-webkit-transition:filter 0.1s cubic-bezier(0,0,0.2,1);transition:filter 0.1s cubic-bezier(0,0,0.2,1);}.video-wrapper.jsx-1808564872:hover>.play.jsx-1808564872{-webkit-filter:none;filter:none;}.caption.jsx-1808564872{text-align:center;}.caption-ut.jsx-1808564872{z-index:10;position:relative;background:black;color:white;font-weight:bold;line-height:1;font-size:1.125rem;font-family:var(--font-circular);padding:calc(var(--base-unit) * 2) 0;margin-bottom:0;border-radius:16px 16px 0 0;text-align:center;}.yt-shorts.jsx-1808564872 iframe.jsx-1808564872{height:100%;aspect-ratio:676 / 1201;display:block;}</style><style id="__jsx-3376757649">@media screen and (min-width:1024px){.collapsible-content-group.jsx-3376757649{margin:calc(var(--base-unit) * 6) 0 0;}}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649{margin-bottom:calc(var(--base-unit) * 8);}.collapsible-content-group.jsx-3376757649 details[style].jsx-3376757649{padding:calc(var(--base-unit) * 3);border-radius:10px;margin-bottom:calc(var(--base-unit) * 4);}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649{list-style-image:none;list-style-type:none;position:relative;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649:before{display:none;content:"";position:absolute;top:-4px;left:-8px;right:-8px;bottom:-4px;background-color:var(--grey-05);border-radius:10px;z-index:-1;padding:calc(var(--base-unit) * 2);}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649:hover.jsx-3376757649:before{display:block;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649::marker,.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649::-webkit-details-marker{display:none;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 summary.jsx-3376757649:focus{outline:none;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-heading-custom > *:first-child{margin:0;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-heading-custom,.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-heading{margin:0 auto 0 0;display:inline-block;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-body{padding-top:calc(var(--base-unit) * 5);}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-body div *:last-child *:last-child,.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-body div *:last-child{margin-bottom:0;}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-body .manual-speed-test-chart,.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .collapsible-content-group-body div .scroll-table-v2{margin-top:calc(var(--base-unit) * 5);margin-bottom:calc(var(--base-unit) * 5);}.collapsible-content-group.jsx-3376757649 details.jsx-3376757649 .icon-chevron-down.jsx-3376757649{pointer-events:none;-webkit-transform:rotate(90deg) translateX(3px);-ms-transform:rotate(90deg) translateX(3px);transform:rotate(90deg) translateX(3px);}.collapsible-content-group.jsx-3376757649 details[open].jsx-3376757649 .icon-chevron-down.jsx-3376757649{-webkit-transform:rotate(270deg);-ms-transform:rotate(270deg);transform:rotate(270deg);}.collapsible-content-group.jsx-3376757649 summary.jsx-3376757649:not(.standard){cursor:pointer;}.collapsible-content-group.jsx-3376757649 summary.jsx-3376757649{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:start;-webkit-box-align:start;-ms-flex-align:start;align-items:start;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}.collapsible-content-group.jsx-3376757649 summary.jsx-3376757649 svg.jsx-3376757649{-webkit-flex:0 0 24px;-ms-flex:0 0 24px;flex:0 0 24px;margin-left:calc(var(--base-unit) * 3);}.collapsible-content-group.jsx-3376757649 summary.standard.jsx-3376757649{pointer-events:none;}.collapsible-content-group.jsx-3376757649 summary.standard.jsx-3376757649 svg.jsx-3376757649{display:none;}</style><style id="__jsx-3313091859">.tooltip-toast-group.jsx-3313091859{position:absolute;z-index:5000;}.icon-cross.jsx-3313091859{fill:white;}@media screen and (max-width:7674px){.tooltip-toast-wrapper.jsx-3313091859{width:100%;}}.tooltip-toast-content.jsx-3313091859{display:block;-webkit-order:3;-ms-flex-order:3;order:3;}.tooltip-toast-content.jsx-3313091859,.tooltip-toast-content.jsx-3313091859 p,.tooltip-toast-content.jsx-3313091859 ul li,.tooltip-toast-content.jsx-3313091859 a,.tooltip-toast-content.jsx-3313091859 a:link,.tooltip-toast-content.jsx-3313091859 a:visited{font-family:var(--font-calibre);color:white;line-height:1.25;font-size:1rem;}.tooltip-toast-content.jsx-3313091859 a,.tooltip-toast-content.jsx-3313091859 a:link,.tooltip-toast-content.jsx-3313091859 a:visited{color:var(--blue-40);}.tooltip-toast-content.jsx-3313091859 *:last-child{margin-bottom:0;}.tooltip-toast-content.jsx-3313091859 ul,.tooltip-toast-content.jsx-3313091859 ol{margin:0 0 calc(var(--base-unit) * 3) calc(var(--base-unit) * 5);}.tooltip-toast-content.jsx-3313091859 ul{list-style:disc;}.tooltip-toast-content.jsx-3313091859 ol li,.tooltip-toast-content.jsx-3313091859 ul li{margin-bottom:calc(var(--base-unit) * 1);}.tooltip-toast-content.jsx-3313091859 ol{list-style:decimal;}.tooltip-toast.jsx-3313091859{padding:12px;background:var(--grey-100);display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}.tooltip-toast.jsx-3313091859:not(.active){display:none;}@media screen and (max-width:767px){.tooltip-toast.jsx-3313091859{-webkit-transition: -webkit-transform 0.5s ease-in-out, opacity 0.5s ease-in-out;-webkit-transition: transform 0.5s ease-in-out, opacity 0.5s ease-in-out;transition: transform 0.5s ease-in-out, opacity 0.5s ease-in-out;position:fixed;top:100%;left:0;right:0;padding-bottom:22px;-webkit-animation:bounce-jsx-3313091859 0.5s ease-in-out forwards;animation:bounce-jsx-3313091859 0.5s ease-in-out forwards;}}@-webkit-keyframes bounce-jsx-3313091859{0%{-webkit-transform:translateY(0%);-ms-transform:translateY(0%);transform:translateY(0%);}50%{-webkit-transform:translateY(-100%);-ms-transform:translateY(-100%);transform:translateY(-100%);}100%{-webkit-transform:translateY(calc(-100% + 10px));-ms-transform:translateY(calc(-100% + 10px));transform:translateY(calc(-100% + 10px));}}@keyframes bounce-jsx-3313091859{0%{-webkit-transform:translateY(0%);-ms-transform:translateY(0%);transform:translateY(0%);}50%{-webkit-transform:translateY(-100%);-ms-transform:translateY(-100%);transform:translateY(-100%);}100%{-webkit-transform:translateY(calc(-100% + 10px));-ms-transform:translateY(calc(-100% + 10px));transform:translateY(calc(-100% + 10px));}}@media screen and (min-width:768px){.tooltip-toast.jsx-3313091859{border-radius:16px;visibility:hidden;}}@media screen and (min-width:768px){.tooltip-toast.medium.jsx-3313091859{width:230px;}}@media screen and (min-width:768px){.tooltip-toast.large.jsx-3313091859{width:375px;}}.arrow.jsx-3313091859{display:none;}@media screen and (min-width:768px){.arrow.active.jsx-3313091859{position:absolute;display:block;width:0;left:0;height:0;border-style:solid;border-width:10px;border-color:transparent;}}.arrow.active.bottom.jsx-3313091859{bottom:100%;border-top-width:0;border-bottom-color:var(--grey-100);}.arrow.active.top.jsx-3313091859{bottom:100%;border-bottom-width:0;border-top-color:var(--grey-100);}.arrow.active.right.jsx-3313091859{top:calc(50% - 5px);-webkit-transform:translateY(-25%);-ms-transform:translateY(-25%);transform:translateY(-25%);left:-10px;right:auto;border-left-width:0;border-right-color:var(--grey-100);}.tooltip-toast-header.jsx-3313091859{line-height:1.25;font-size:1rem;color:white;font-weight:bold;-webkit-order:1;-ms-flex-order:1;order:1;}.tooltip-toast-header.jsx-3313091859,.tooltip-toast-content.jsx-3313091859{-webkit-flex:1 1 calc(100% - 24px - calc(var(--base-unit) * 2));-ms-flex:1 1 calc(100% - 24px - calc(var(--base-unit) * 2));flex:1 1 calc(100% - 24px - calc(var(--base-unit) * 2));max-width:calc(100% - 24px - calc(var(--base-unit) * 2));}.flex.jsx-3313091859{-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;}.flex.jsx-3313091859 button.jsx-3313091859{-webkit-order:2;-ms-flex-order:2;order:2;-webkit-flex:0 0 24px;-ms-flex:0 0 24px;flex:0 0 24px;width:24px;height:24px;margin-left:calc(var(--base-unit) * 2);}.flex.no-header.jsx-3313091859 button.jsx-3313091859{-webkit-order:3;-ms-flex-order:3;order:3;}@media screen and (max-width:767px){#back-to-top-btn{margin-bottom:null;}}</style><style id="__jsx-2378246354">@media screen and (max-width:767px){[data-overlays*="comparison-tool"][data-overlays*="tooltip-toast-remote"] .comparison-preview{z-index:-1;}}</style><style id="__jsx-3150998698">.ut-content-jumplink-wrapper.jsx-3150998698{position:relative;}.btf.jsx-3150998698{content-visibility:auto;}.highlighted-chapter.jsx-3150998698{background-color:var(--grey-05);padding:calc(var(--base-unit) * 10) 0 calc(var(--base-unit) * 5);margin-bottom:calc(var(--base-unit) * 10);}@media screen and (min-width:1024px){.highlighted-chapter.jsx-3150998698{padding-top:calc(var(--base-unit) * 12);padding-bottom:calc(var(--base-unit) * 12);}}.highlighted-chapter.jsx-3150998698 section.block-text{margin-bottom:0;}.ut-tldr.jsx-3150998698 .block-text > div:last-of-type > *:last-child,.ut-tldr.jsx-3150998698 .block-text > div:last-of-type > * > *:last-child{margin-bottom:0;}.ut-tldr.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 6);}@media (min-width:834px){.ut-tldr.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 10);}}.ut-tldr.jsx-3150998698 .block-text *{font-family:var(--font-circular);font-size:1.125rem;}.ut-tldr-header.jsx-3150998698{display:inline-block;}.ut-tldr-header.jsx-3150998698 svg.jsx-3150998698{width:100%;height:10px;margin:calc(var(--base-unit) * 0.5) 0 calc(var(--base-unit) * 3);}@media (min-width:834px){.ut-tldr-header.jsx-3150998698 svg.jsx-3150998698{margin-top:calc(var(--base-unit) * 2);max-width:210px;}}.main-image{width:100vw;height:auto;margin-bottom:calc(var(--base-unit) * 1);margin-left:calc(var(--base-unit) * -3);}@media screen and (min-width:768px){.main-image{margin-left:calc(var(--base-unit) * -10);}}@media (min-width:834px){.main-image{margin-bottom:calc(var(--base-unit) * 5);margin-left:initial;width:100%;}}.ut-jumplink.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 3);}@media (min-width:834px){.ut-jumplink.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 6);position:absolute;z-index:10;top:0;right:40px;width:calc(160 * 100% / 834);max-width:260px;height:100%;}}@media (min-width:994px){.ut-jumplink.jsx-3150998698{width:calc(214 * 100% / 994);}}@media screen and (min-width:1240px){.ut-jumplink.jsx-3150998698{right:calc(((100vw - 1240px) / 2) + (1280px - 100vw));}}@media screen and (min-width:1280px){.ut-jumplink.jsx-3150998698{right:calc(((100vw - 1240px) / 2));}}.container-row.jsx-3150998698 .breadcrumbs{padding:calc(var(--base-unit) * 5) 0 calc(var(--base-unit) * 8);}@media (min-width:834px){.container-row.jsx-3150998698 .breadcrumbs{padding:calc(var(--base-unit) * 8) 0 calc(var(--base-unit) * 14);}}hr.jsx-3150998698{border:none;height:1px;background-color:var(--grey-20);margin:calc(var(--base-unit) * 25) 0 calc(var(--base-unit) * 8);}.related-articles.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 20);content-visibility:auto;}.related-articles.jsx-3150998698 ul.jsx-3150998698{margin-top:calc(var(--base-unit) * 5);display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:20px;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}@media screen and (min-width:768px){.related-articles.jsx-3150998698 ul.jsx-3150998698{-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:24px;}}@media screen and (min-width:1024px){.related-articles.jsx-3150998698 ul.jsx-3150998698{gap:40px;}}.related-articles.jsx-3150998698 li.jsx-3150998698{cursor:pointer;background:white;border-radius:12px;box-shadow:0 1px 5px rgba(0,0,0,0.2);max-width:400px;}@media screen and (min-width:768px){.related-articles.jsx-3150998698 li.jsx-3150998698{-webkit-flex:1 1 calc(100% / 3);-ms-flex:1 1 calc(100% / 3);flex:1 1 calc(100% / 3);}}.related-articles.jsx-3150998698 a.jsx-3150998698:link,.related-articles.jsx-3150998698 a.jsx-3150998698:visited{color:var(--grey-100);}.related-articles.jsx-3150998698 p.jsx-3150998698{padding:calc(var(--base-unit) * 3) calc(var(--base-unit) * 5) calc(var(--base-unit) * 5);margin-bottom:0;}.related-articles.jsx-3150998698 img{width:100%;height:auto;}.editorial-cards.jsx-3150998698 li.jsx-3150998698{margin-bottom:calc(var(--base-unit) * 14);}h2[id],h3[id],h5[id],h4[id]{-webkit-scroll-margin-top:calc(var(--base-unit) * 5);-moz-scroll-margin-top:calc(var(--base-unit) * 5);-ms-scroll-margin-top:calc(var(--base-unit) * 5);scroll-margin-top:calc(var(--base-unit) * 5);}</style><style id="__jsx-4062602538">.footer{height:1170.5px;}@media screen and (min-width:768px){.footer{height:779px;}}@media screen and (min-width:1024px){.footer{height:761.5px;}}#footer{overflow:hidden;background:linear-gradient(164deg,#fff 17.85%,#d4dffc 68.02%);padding:calc(var(--base-unit) * 43) 0 calc(var(--base-unit) * 25);}@media screen and (min-width:768px){#footer{background:linear-gradient(180deg,#fff 25.87%,#d4dffc 100%);padding:calc(var(--base-unit) * 70) 0 calc(var(--base-unit) * 25);}}.footer li{font-size:1.125rem;line-height:1.25;}.footer-about ul li{margin-bottom:calc(var(--base-unit) * 4);}.footer-social svg{max-width:40px;max-height:40px;}.language-selector-toggle{min-width:50%;padding:calc((var(--base-unit) * 2) - 2px) calc(var(--base-unit) * 2);color:var(--grey-100);}.language-popup{display:none;}.footer-small-print>div{font-size:1.125rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}@media screen and (min-width:768px){.footer-small-print>div a:not(:last-of-type):after{content:"|";display:inline-block;}}</style><style id="__jsx-4097244431">.app{z-index:1;position:relative;}</style></head><body><svg style="display:none"><defs><symbol id="svg-chevron"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M15 11.6L10.4 7A1 1 0 0 0 9 7a1 1 0 0 0 0 1.4l3.9 3.9L9 16.2a1 1 0 0 0 0 1.4c.4.4 1 .4 1.4 0L15 13c.4-.4.4-1 0-1.4z"></path></svg></symbol><symbol id="svg-tick"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="none" d="M0 0h24v24H0z"></path><path d="M9.2 16.2l-3.5-3.5a1 1 0 0 0-1.4 0 1 1 0 0 0 0 1.4l4.2 4.2c.4.4 1 .4 1.4 0L20.5 7.7c.4-.4.4-1 0-1.4a1 1 0 0 0-1.4 0l-9.9 9.9z"></path></svg></symbol><symbol id="svg-cross"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill-rule="evenodd" d="M18.3 5.7a1 1 0 0 0-1.4 0L12 10.6 7.1 5.7a1 1 0 0 0-1.4 0 1 1 0 0 0 0 1.4l4.9 4.9-4.9 4.9a1 1 0 0 0 0 1.4c.4.4 1 .4 1.4 0l4.9-4.9 4.9 4.9c.4.4 1 .4 1.4 0 .4-.4.4-1 0-1.4L13.4 12l4.9-4.9c.4-.4.4-1 0-1.4z" clip-rule="evenodd"></path></svg></symbol><symbol id="svg-question"><svg width="18" height="18" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M.667 9C.667 4.4 4.4.667 9 .667S17.333 4.4 17.333 9 13.6 17.333 9 17.333A8.336 8.336 0 01.667 9zm1.666 0A6.676 6.676 0 009 15.667 6.676 6.676 0 0015.666 9 6.676 6.676 0 009 2.333 6.676 6.676 0 002.333 9zm7.5 3.333V14H8.166v-1.667h1.667zM5.816 6.358a3.335 3.335 0 013.692-2.325c1.45.217 2.592 1.442 2.792 2.892.19 1.345-.554 1.993-1.272 2.62-.131.115-.262.229-.386.347-.1.091-.192.183-.275.283-.005.004-.009.01-.013.017l-.012.016a2.3 2.3 0 00-.234.325c-.008.013-.014.025-.02.038a1.77 1.77 0 00-.254.93H8.165c0-.418.067-.76.167-1.043.004-.01.006-.02.008-.028a.122.122 0 01.009-.03c.004-.013.01-.023.017-.033.006-.01.012-.021.016-.034.059-.15.134-.291.209-.416l.012-.021.013-.021c0-.004.002-.006.004-.008s.004-.005.004-.009c.284-.427.664-.72 1.02-.994.512-.393.972-.747 1.021-1.406.067-.808-.516-1.583-1.308-1.75a1.668 1.668 0 00-1.917 1.067c-.116.317-.391.558-.733.558h-.167a.756.756 0 01-.725-.975z"></path></svg></symbol></defs></svg><div id="__next"><script>!function(t){function e(){var e=this||self;e.globalThis=e,delete t.prototype._T_}"object"!=typeof globalThis&&(this?e():(t.defineProperty(t.prototype,"_T_",{configurable:!0,get:e}),_T_))}(Object);</script><div class="jsx-4097244431 root"><header id="top" data-swiftype-index="false" class="jsx-2034782048 main-header"><div class="jsx-2034782048 container"><a href="/"><img src="/static/images/logo.svg" alt="Top10VPN" width="135" height="20" class="jsx-2034782048 main-header__logo"/></a><div class="jsx-3798940715 main-header__wrapper"><a href="#maincontent" class="jsx-3798940715 skip-nav">Skip to main content</a><div class="jsx-3798940715 main-header__overlay"></div><nav class="jsx-3798940715 main-header__nav"><ul class="jsx-3798940715"><li class="jsx-3798940715 megamenu"><a href="/best-vpn/" class="jsx-3798940715 main-menu">BEST VPN</a></li><li class="jsx-3798940715 megamenu megamenu-reviews"><a href="/reviews/" class="jsx-3798940715 main-menu">VPN REVIEWS</a></li><li class="jsx-3798940715 megamenu-tools active"><a href="/vpn-explained/#seeallguides" class="jsx-3798940715 main-menu"><span class="jsx-3798940715 attr"></span> <!-- -->WHAT IS A VPN</a></li><li class="jsx-3798940715 megamenu-tools"><a href="/tools/" class="jsx-3798940715 main-menu"><span class="jsx-3798940715 attr"></span> <!-- -->TOOLS</a></li><li class="jsx-3798940715 megamenu-tools"><a href="/guides/" class="jsx-3798940715 main-menu">GUIDES</a></li><li class="jsx-3798940715 megamenu-tools"><a href="/research/" class="jsx-3798940715 main-menu">RESEARCH</a></li><li class="jsx-3798940715 megamenu-tools megamenu-right-edge"><a href="/about/" class="jsx-3798940715 main-menu">ABOUT</a></li></ul></nav><button type="button" aria-label="Search" class="jsx-3798940715 btn-search"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3798940715"><path d="M15.5 14h-.79l-.28-.27a6.5 6.5 0 001.48-5.34c-.47-2.78-2.79-5-5.59-5.34a6.505 6.505 0 00-7.27 7.27c.34 2.8 2.56 5.12 5.34 5.59a6.5 6.5 0 005.34-1.48l.27.28v.79l4.25 4.25c.41.41 1.08.41 1.49 0 .41-.41.41-1.08 0-1.49L15.5 14zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z" class="jsx-3798940715"></path></svg></button><button type="button" aria-label="Menu" class="jsx-3798940715 hamburger icon-hamburger"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" class="jsx-3798940715"><path d="M4 18h16c.5 0 1-.5 1-1s-.5-1-1-1H4a1 1 0 0 0-1 1c0 .5.5 1 1 1zm0-5h16c.5 0 1-.4 1-1s-.5-1-1-1H4a1 1 0 0 0-1 1c0 .6.5 1 1 1zM3 7c0 .6.5 1 1 1h16c.5 0 1-.4 1-1s-.5-1-1-1H4a1 1 0 0 0-1 1z" class="jsx-3798940715"></path></svg></button></div></div></header><main id="maincontent" class="jsx-4097244431 app"><div class="jsx-1557524140 ut-header blue"><div class="jsx-1557524140 container-row"><p data-swiftype-index="false" class="jsx-1557524140 disclosure">Top10VPN is editorially independent. We may <a href="/about/how-we-make-money/">earn commissions</a> if you buy a VPN via our links.</p></div><div class="jsx-1557524140 container-row"><h1 class="jsx-1557524140 heading-1">The Different Types of VPN & When to Use Them</h1><div class="jsx-3130565390 author-header"><div class="jsx-3130565390 date-wtu-container"><time dateTime="2024-10-25T13:58:00.000Z" class="jsx-3130565390 author-updated"><svg xmlns="http://www.w3.org/2000/svg" class="jsx-3130565390 icon-tick"><use xlink:href="#svg-tick" class="jsx-3130565390"></use></svg><span class="jsx-3130565390">Updated Oct 25, 2024</span></time></div><div class="jsx-3130565390 authors-grid"><div class="jsx-3130565390 main-author"><div class="jsx-3130565390 author-photo"><img alt="JP Jone's profile image" data-slug="jpjones" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" srcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2022%2F12%2Fexpertbio-JP-small-opt.jpeg&w=32&q=75 1x, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2022%2F12%2Fexpertbio-JP-small-opt.jpeg&w=64&q=75 2x" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2022%2F12%2Fexpertbio-JP-small-opt.jpeg&w=64&q=75"/></div><div class="jsx-3130565390 author-name"><strong class="jsx-3130565390">JP Jones</strong></div><button aria-label="About authors" class="jsx-3130565390 author-toggle"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3130565390 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3130565390"></use></svg></button></div><div class="jsx-3130565390 author-bio"><p class="jsx-3130565390 bio-authors">JP Jones is our CTO. He has over 25 years of software engineering and networking experience, and oversees all technical aspects of our VPN testing process. <a href="/about/vpn-experts/jpjones/">Read full bio</a></p></div><p class="jsx-3130565390 supporting-authors"><span class="jsx-3130565390">Fact-checked by <a href="/about/vpn-experts/simonmigliano/">Simon Migliano</a></span></p></div></div></div></div><div class="jsx-3150998698 container-row"><div class="jsx-912259115 breadcrumbs"><ol itemscope="" itemType="https://schema.org/BreadcrumbList" class="jsx-912259115 "><li itemProp="itemListElement" itemscope="" itemType="https://schema.org/ListItem" class="jsx-912259115"><meta itemProp="position" content="1" class="jsx-912259115"/><a itemProp="item" class="bc-logo" href="https://www.top10vpn.com/"><meta itemProp="name" content="Home" class="jsx-912259115"/><img src="/static/images/logo-simplified-dark-1x1_ratio.svg" width="16" height="16" alt="Top10VPN" class="jsx-912259115"/></a></li><li itemProp="itemListElement" itemscope="" itemType="https://schema.org/ListItem" class="jsx-912259115 inner-slice"><meta itemProp="position" content="2" class="jsx-912259115"/><a href="https://www.top10vpn.com/vpn-explained/" itemProp="item" class="jsx-912259115"><span itemProp="name" class="jsx-912259115">What Is a VPN?</span></a></li><li itemProp="itemListElement" itemscope="" itemType="https://schema.org/ListItem" class="jsx-912259115"><a href="https://www.top10vpn.com/what-is-a-vpn/vpn-types/" itemProp="item" class="jsx-912259115"><span itemProp="name" class="jsx-912259115">Types Of VPN</span></a><meta itemProp="position" content="3" class="jsx-912259115"/></li></ol></div></div><div class="jsx-3150998698 ut-content-jumplink-wrapper"><div class="jsx-3150998698 container-row ut-wrapper"><div class="jsx-3150998698 ut-tldr ut-row"><div class="jsx-3150998698 ut-tldr-header"><h2 class="heading-4">Overview</h2><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 136 10" width="130" preserveAspectRatio="none" fill="none" class="jsx-3150998698"><path fill-rule="evenodd" clip-rule="evenodd" d="M25.2 7.9c-1 .9-1.7-.3-2.6.1h-1c-1-.3-1.4 0-4.4.4l-.7-.1-6.7.2c-.8.4-1.1 0-3 .4-.8.1-1.6.4-2.4.2-.3-.1-2.3.3-2.9.7C.2 10.8.6 7.3.1 5c-.3-1.1.2-2 1-1.8 1.4.3 33.2-1.8 65.5-2.5C82.7.4 99 .2 111.4.2 124 .2 132.7.2 134 0c.3 0 1.2 0 1.7.8 1 2-.2 3.6-.2 4.1-.2 1.3-1 1-4.2.9-.4 0-1 .3-1.2-.2-.3-.6-12.4-.2-13-.2-1.6.1-2-.3-4.3-.2-2.6.3-.8.5-2.2.2-1.4-.2-.3-.3-1.7-.2l-7 .5c-7 .4-3.9.4-7 .3-3 0-3.2.2-8 0-.3 0-.2-.5-1-.2-.6.3-1.3.2-2.5.2-3 .1-2.8-.6-3.5 0h-.6c-3.2 0-3.4 0-3.8-.4-.6-.7-.6.8-2 .5h-.2c-1.8.8-7.4-.2-11.2.4-.3 0-.5.1-.8 0-1-.1-1.9.1-2.8.2-1.2 0-1-.6-2-.2-1.1.4-.8-.1-1.5 0-1.6.4-.8 0-1.7.2a7 7 0 0 1-3 0l-1.9.3c-1.9-.1-1.2-.5-2.4 0h-.5l-1.5.2h-1l-.4.1c-.8.3-1.4.1-1.7.2-1.2.3-2-.6-3-.2-1 .5-1 0-3.4.3-2.2.3-1.3-.2-3.3-.1-1 0-1.8-.1-2.7.2-1.2.5-1.6.1-2 .3-.7.2-.7.2-1.2-.1Z" fill="var(--blue-50)" class="jsx-3150998698"></path></svg></div><div class="jsx-2580530280 block-text"><div><p>The four main VPN types are: <b>Personal</b> (encrypts traffic to mask IP and bypass restrictions), <b>Remote Access</b> (connects to private networks remotely), <b>Mobile</b> (maintains connections when switching networks), and <b>Site-to-Site</b> (combines separate networks).</p> </div></div></div></div><div class="jsx-3150998698 ut-jumplink"><aside class="jsx-3768225127"><div class="jsx-3768225127 jumplinks"><div class="jsx-3768225127 toc-mobile"><button class="jsx-3768225127"><span class="jsx-3768225127">Table of Contents</span><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3768225127 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3768225127"></use></svg></button></div><ol class="jsx-3768225127 main-list"><li class="jsx-3768225127 "><a href="#different-types-of-vpns" class="jsx-3768225127 ">Different Types of VPNs</a></li><li class="jsx-3768225127 "><a href="#remote-access" class="jsx-3768225127 has-list"><span class="jsx-3768225127">1. Remote Access VPNs</span><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3768225127 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3768225127"></use></svg></a><div class="jsx-3768225127 inner-list-wrapper"><ol class="jsx-3768225127"><li class="jsx-3768225127"><a href="#remote-access-what" class="jsx-3768225127 ">What Is It?</a></li><li class="jsx-3768225127"><a href="#remote-access-when" class="jsx-3768225127 ">When To Use It</a></li><li class="jsx-3768225127"><a href="#remote-access-how" class="jsx-3768225127 ">How It Works</a></li><li class="jsx-3768225127"><a href="#remote-access-examples" class="jsx-3768225127 ">VPN Examples</a></li></ol></div></li><li class="jsx-3768225127 "><a href="#mobile-vpn" class="jsx-3768225127 has-list"><span class="jsx-3768225127">2. Mobile VPNs</span><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3768225127 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3768225127"></use></svg></a><div class="jsx-3768225127 inner-list-wrapper"><ol class="jsx-3768225127"><li class="jsx-3768225127"><a href="#what-is-a-mobile-vpn" class="jsx-3768225127 ">What Is It?</a></li><li class="jsx-3768225127"><a href="#when-to-use-a-mobile-vpn" class="jsx-3768225127 ">When To Use</a></li><li class="jsx-3768225127"><a href="#how-mobile-vpns-work" class="jsx-3768225127 ">How It Works</a></li><li class="jsx-3768225127"><a href="#examples-of-mobile-vpns" class="jsx-3768225127 ">VPN Examples</a></li></ol></div></li><li class="jsx-3768225127 "><a href="#site-to-site" class="jsx-3768225127 has-list"><span class="jsx-3768225127">3. Site-to-Site VPNs</span><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3768225127 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3768225127"></use></svg></a><div class="jsx-3768225127 inner-list-wrapper"><ol class="jsx-3768225127"><li class="jsx-3768225127"><a href="#what-is-a-site-to-site-vpn" class="jsx-3768225127 ">What Is It?</a></li><li class="jsx-3768225127"><a href="#when-to-use-a-site-to-site-vpn" class="jsx-3768225127 ">When to Use</a></li><li class="jsx-3768225127"><a href="#how-site-to-site-vpns-work" class="jsx-3768225127 ">How It Works</a></li><li class="jsx-3768225127"><a href="#examples-of-site-to-site-vpns" class="jsx-3768225127 ">VPN Examples</a></li></ol></div></li><li class="jsx-3768225127 "><a href="#personal-vpn" class="jsx-3768225127 has-list"><span class="jsx-3768225127">4. Personal VPN Services</span><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-3768225127 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3768225127"></use></svg></a><div class="jsx-3768225127 inner-list-wrapper"><ol class="jsx-3768225127"><li class="jsx-3768225127"><a href="#what-is-a-personal-vpn" class="jsx-3768225127 ">What Is It?</a></li><li class="jsx-3768225127"><a href="#when-to-use-a-personal-vpn-service" class="jsx-3768225127 ">When To Use It</a></li><li class="jsx-3768225127"><a href="#how-personal-vpns-work" class="jsx-3768225127 ">How It Works</a></li><li class="jsx-3768225127"><a href="#examples-of-personal-vpn-services" class="jsx-3768225127 ">VPN Examples</a></li></ol></div></li><li class="jsx-3768225127 "><a href="#vpn-protocols" class="jsx-3768225127 ">Types of VPN Protocols</a></li></ol></div></aside></div><div class="jsx-3150998698 container-row ut-wrapper"><section class="jsx-2580530280 block-text ut-row"><div class="jsx-1808564872 video-wrapper yt-widescreen ut-wrapper"><div class="jsx-1808564872 aspect-ratio-wrapper"><button class="jsx-1808564872 play">Play</button><div class="jsx-1808564872 img"><img alt="" loading="lazy" decoding="async" data-nimg="fill" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="(max-width: 768px) 90vw, 60vw" srcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=256&q=90 256w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=320&q=90 320w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=375&q=90 375w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=384&q=90 384w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=450&q=90 450w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=600&q=90 600w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=640&q=90 640w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=750&q=90 750w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=768&q=90 768w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=900&q=90 900w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1024&q=90 1024w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1200&q=90 1200w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1280&q=90 1280w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1500&q=90 1500w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1520&q=90 1520w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1536&q=90 1536w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1600&q=90 1600w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1700&q=90 1700w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1800&q=90 1800w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=1920&q=90 1920w, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=2048&q=90 2048w" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F09%2FDifferent-Types-of-VPN-Top10VPN-Thumbnail.webp&w=2048&q=90"/></div></div><script type="application/ld+json">{"@context":"https://schema.org","@type":"VideoObject","name":" The 4 Different Types of VPN & What They Do Differently ","description":"You may have used a VPN before, but do you know what type? Or are you looking to use a VPN but are unsure which type you need? Whatever questions you have, we aim to answer them in this video. We'll take a quick look at the four big different types of VPN and clarify what they do well, what they do poorly, and how they all differ from one another.","thumbnailUrl":"https://www.top10vpn.com/images/2024/09/Different-Types-of-VPN-Top10VPN-Thumbnail.webp","uploadDate":"2024-09-26T00:00:00.000Z","duration":"T412S","embedUrl":"https://www.youtube.com/watch?v=ELiegn37LGQ"}</script></div><div><p>Understanding the different types of VPN can be confusing, even if you’ve used a VPN before.</p> <p>Inconsistent terminology and the mixing up of VPN types with protocols (like OpenVPN or PPTP) and configurations (such as <a href="/guides/what-is-double-vpn/">Double VPN</a>) contribute to this lack of clarity.</p> <p>To clear up this confusion, we drew on our decades of experience implementing corporate VPNs around the world, as well as thousands of tests of personal VPN services to create this <b>definitive guide</b> to the different types of VPN.</p> <p>At its foundation, <b>every VPN creates an encrypted tunnel over the internet</b> for secure data transmission.</p> <p>There are <strong>four distinct types of VPN</strong>, whose differences lie simply in how they utilize this encrypted tunnel.</p> <p>If you’re not sure what type of VPN is right for you, use this simple flowchart to help you decide.</p> <div id="attachment_1635025" style="width: 610px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-1635025" loading="lazy" decoding="async" class="wp-image-1635025 size-full" src="/assets/2024/10/d-flowchart-choosing-vpn-type-guide.png" alt="Flowchart to help you choose which type of VPN you need" width="600" height="569"><p id="caption-attachment-1635025" class="wp-caption-text">Flowchart to help you choose which type of VPN you need.</p></div> </div><div id="48dd6aaaf4c3" class="jsx-3376757649 collapsible-content-group"><details style="background-color:#f5f1f0" class="jsx-3376757649"><summary class="jsx-3376757649 "><h3 id="are-vpn-types-the-same-as-vpn-protocols" class="heading-5 collapsible-content-group-heading">Are VPN Types the Same as VPN Protocols?</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>The <a href="#vpn-protocols">VPN protocol</a> used <b>does not determine the type of VPN</b>. Protocols are simply sets of rules governing how your VPN software creates a secure connection to the VPN server and then uses it to transmit your data. </p> <p><b>There is significant overlap in the protocols used by each type of VPN</b>. WireGuard is often used by personal, remote access and site-to-site VPNs, for example, while IKEv2 is frequently used by both mobile VPNs and personal VPNs.</p> <p>If you want a more detailed explanation of the differences, read our <a href="/what-is-a-vpn/vpn-protocols/" rel="noopener" target="_blank">dedicated VPN protocols guide</a>. For more of a quick overview, jump ahead to our summary of the main <a href="#vpn-protocols">VPN protocols</a>.</p> </div></div></details></div><div></div></section></div><div class="jsx-3150998698 container-row ut-wrapper btf"><section id="different-types-of-vpns" class="jsx-2580530280 block-text ut-row"><h2 class="heading-2">Different Types of VPNs</h2><div><p>Here’s a table comparing the four main VPN types:</p> <table class="table-default table-not-stacked"> <thead> <tr> <th style="min-width: 147px;"></th> <th style="min-width: 147px;"><b><a href="#remote-access-vpns">Remote Access VPN</a></b></th> <th style="min-width: 147px;"><b><a href="#personal-vpn">Personal VPN</a></b></th> <th style="min-width: 147px;"><b><a href="#mobile-vpns">Mobile VPN</a></b></th> <th style="min-width: 147px;"><b><a href="#site-to-site-vpns">Site-to-Site VPN</a></b></th> </tr> </thead> <tbody> <tr> <td><b>Who Connects Where?</b></td> <td data-header="Remote Access VPN">User to a private network</td> <td data-header="Personal VPN">User to the internet via a remote server</td> <td data-header="Mobile VPN">User to a private network</td> <td data-header="Site-to-Site VPN">Network to network</td> </tr> <tr> <td><b>Software Required?</b></td> <td data-header="Remote Access VPN">Yes / OS config change</td> <td data-header="Personal VPN">Yes</td> <td data-header="Mobile VPN">Yes / OS config change</td> <td data-header="Site-to-Site VPN">Not for end-users</td> </tr> <tr> <td><b>Best Used For</b></td> <td data-header="Remote Access VPN">Connecting to private networks from another location</td> <td data-header="Personal VPN">Protecting privacy and bypassing geo-restrictions</td> <td data-header="Mobile VPN">Remote private network access with an unstable internet connection</td> <td data-header="Site-to-Site VPN">Connecting multiple networks to each other</td> </tr> </tbody> </table> <p class="spacer"> </p><p>In this guide, we explain each of these personal and business VPN types in more detail. We cover how they work, what they are useful for, and provide examples of products in each category.</p> </div></section></div><div class="jsx-3150998698 "><div class="jsx-3150998698 container-row ut-wrapper"><section id="remote-access" class="jsx-2580530280 block-text ut-row"><h3 class="heading-3">1. Remote Access VPNs</h3><div><p><img loading="lazy" decoding="async" src="/assets/2021/08/Remote-Access-VPNs.jpg" alt="Diagram explaining how remote access VPN services work" width="1180" height="386" class="size-full wp-image-201973"></p> </div><div id="collcon-1.-remote-access-vpns" class="jsx-3376757649 collapsible-content-group"><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="remote-access-what" class="heading-4 collapsible-content-group-heading">What Is a Remote Access VPN?</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>A remote access VPN, sometimes called client-based VPNs or client-to-server VPNs, let you use the internet to securely connect to a private network, such as your home network or your company’s office network, from another location.</p> <p>At one end of the scale, big tech companies like Fortinet, Palo Alto and Cisco all offer sophisticated and expensive software solutions aimed at larger businesses.</p> <p>At the other, it’s also perfectly possible to <a href="/vpn-setup/home-vpn-server/">set up your own VPN server</a> for free if you have the appropriate hardware to hand.</p> <p>We found <a href="https://tailscale.com/" rel="noopener" target="_blank">TailScale</a> the easiest way to create a remote access VPN for.</p> <div id="attachment_1634083" style="width: 810px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-1634083" loading="lazy" decoding="async" class="wp-image-1634083 size-full" src="/assets/2024/10/Tailscale-HighRes.webp" alt="Screenshot of browser-based the TailScale admin console after we connected several of our devices" width="800" height="569"><p id="caption-attachment-1634083" class="wp-caption-text">Screenshot of the browser-based TailScale admin console after we connected several of our devices.</p></div> <p>In fact, we liked TailScale so much that one of our reviewers now runs it on a Raspberry Pi at his mother’s house, allowing him to <b>fix issues with her network remotely</b>. What used to be difficult technical support calls are now quick, simple fixes.</p> <p>Once installed on your device, a remote access VPN client creates an encrypted tunnel between you and the private network you want to access.</p> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE:</b> Remote access VPNs are also sometimes called <b>client-based VPNs</b> or <b>client-to-server VPNs</b>.</p> </div> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="remote-access-when" class="heading-4 collapsible-content-group-heading">When to Use a Remote Access VPN</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>Remote access VPNs can be used in different ways, for example:</p> <ol> <li><b>Traveling for work</b>: You can use a remote access VPN to connect securely to your company network on your hotel WiFi. Not only are you able to access all your usual files and software, but the VPN also protects your data from security threats on public networks.</li> <li><b>Working from home</b>: This type of VPN can provide secure access to sensitive company systems that have been locked down by IP address. Your computer simply functions as if it were on the corporate network, with all the data encrypted as it travels across the public internet. </li> <li><b>Access to personal files</b>: A remote access VPN will allow you to directly access files on any device connected to your home network, such as photos saved to your desktop PC or music and movie files on a home media server, from wherever you are.</li> <li><b>Securely access networked devices</b>: As well as files, this type of VPN will allow you to securely control and monitor IoT devices on your network, such as surveillance cameras or smart home systems, which can otherwise be vulnerable to attack, while you are away.</li> <div class="block-highlighted block-highlighted--orange"> <p><span style="color:#5E2314;"><b>EXPERT TIP:</b></span> While remote access VPNs are very useful, cloud storage might be a more straightforward alternative if all you want to do is to access files remotely. Cloud storage (such as Dropbox or Drive) uses an encrypted browser connection to protect your data, and is much easier to set up than a VPN.</p> </div> </ol></div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="remote-access-how" class="heading-4 collapsible-content-group-heading">How Remote Access VPNs Work</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><div class="block-highlighted block-highlighted--light"> <p><b>Here’s exactly how a remote access VPN works:</b></p> <ol> <li><b>Authentication</b>: when you attempt to establish a VPN connection, the VPN server first validates your identity. Authentication methods include: <ol class="alpha-lower"> <li>Username and password</li> <li>Digital certificates for automatic authentication</li> <li>Multi-factor authentication (MFA) with some combination of Time-based One-Time Passwords (TOTP), hardware security keys (FIDO2/U2F) and biometric data (fingerprints, facial recognition)</li> <li>Single Sign-On (SSO)</li> </ol> </li> <li id="remote-tunnel"><b>Tunnel establishment</b>: after successful authentication, your VPN client and server negotiate and <a href="/what-is-a-vpn/how-does-a-vpn-work/#the-individual-phases-of-a-vpn-connection">establish an encrypted tunnel</a>. The specific steps depend on the <a href="#vpn-protocols">VPN protocol</a> you’re using but typically include: <ol class="alpha-lower"> <li>Sharing encryption keys</li> <li>Agreeing on encryption standards</li> <li>Setting up the virtual network interface</li> </ol> </li> <li><b>IP assignment</b>: the private network assigns you a virtual IP address.</li> <li><b>Remote access</b>: you can now access permitted resources on the remote private network through the VPN server as if you were in the same location.</li> </ol> </div> <p>To use a remote access VPN on your device you typically need to install client software or configure your device’s operating system to connect to the VPN. There also needs to be a VPN server on the network end of the connection.</p> <div id="attachment_1634458" style="width: 810px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-1634458" loading="lazy" decoding="async" class="wp-image-1634458 size-full" src="/assets/2024/10/WireGuard.webp" alt="WireGuard tunnel management interface on macOS" width="800" height="569"><p id="caption-attachment-1634458" class="wp-caption-text">WireGuard tunnel management interface on macOS.</p></div> <p>You can have as many client devices as you like and for as many users as need to remotely access the network.</p> <p>Between them, the client software and VPN server manage the VPN connection.</p> <p>There are many versions of remote access VPN but fundamentally, the choice is paying for a service or managing it yourself.</p> <p>If you’re doing it yourself, it basically boils down to how you set up the VPN server that acts as the gateway to the private network you want to access. Popular options include:</p> <ol> <li>An always-on PC, server or Raspberry Pi-style device running WireGuard or OpenVPN</li> <li>A flashed router with WireGuard or OpenVPN installed</li> <li>TailScale on a PC, mobile device or Raspberry Pi</li> </ol> <p>The remote access VPN market is increasingly complex, particularly at the enterprise level. </p> <p>While traditional VPN services remain available, vendors now heavily promote more expensive alternatives like <a href="https://www.zscaler.com/resources/security-terms-glossary/what-is-zero-trust-network-access" rel="noopener" target="_blank">Zero Trust Network Access (ZTNA)</a>, <a href="https://www.cloudflare.com/en-gb/learning/access-management/software-defined-perimeter/" rel="noopener" target="_blank">Software Defined Perimeter (SDP)</a>, and <a href="https://www.goodaccess.com/blog/5-things-you-need-to-know-about-sase" rel="noopener" target="_blank">Secure Access Service Edge (SASE)</a>.</p> <p>Here are some main types of remote access VPN as a service:</p> <ul class="columns-2"> <li>Client-to-site VPN</li> <li>Cloud VPN</li> <li>SSL VPN Portal</li> <li>SSL VPN Tunnel</li> <li>NordVPN’s Meshnet feature</li> </ul> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="remote-access-examples" class="heading-4 collapsible-content-group-heading">Examples of Remote Access VPNs</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>Examples of remote access VPNs for business include:</p> <ul> <li><a href="https://openvpn.net/for/remote-access/" rel="noopener" target="_blank">Access Server by OpenVPN</a>, which is free for up to two simultaneous VPN connections. </li> <li><a href="https://www.cisco.com/site/us/en/products/security/secure-client/index.html" rel="noopener" target="_blank">Cisco AnyConnect</a>, which integrates with Cisco’s enterprise security solutions.</li> <li><a href="https://www.perimeter81.com/lp/remote-access-secure-connection" rel="noopener" target="_blank">Perimeter 81 Remote Access VPN</a>.</li> <li><a href="https://www.checkpoint.com/quantum/remote-access-vpn/" rel="noopener" target="_blank">Checkpoint Remote Access VPN</a>, which comes as an IPSec Client and an SSL Portal.</li> <li><a href="https://nordlayer.com/">NordLayer</a>, from the same company that operates highly-rated personal VPN service NordVPN.</li> </ul> <p>Other popular remote access VPN products include Fortinet Forticlient, Palo Alto Global Protect, Pulse Secure, Sonicwall SSL VPN, Juniper Secure Connect.</p> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE</b>: This type of VPN is typically licensed according to how many simultaneous users need to access the VPN.</p> </div> <p>An example of a self-managed remote access VPN is what we have set up for our own team to allow for hybrid working.</p> <p>We have a WireGuard VPN server running on a Linux box in our office. WireGuard was the logical choice for us as it’s built into Linux, and is simpler and faster than OpenVPN.</p> <p>The VPN client software installed on team members’ laptops is also free and open source: TunSafe for Windows users and the official WireGuard client for our Mac users.</p> <p>This allows us to provide access to our back-end systems and other shared resources for our team when they work remotely without compromising security.</p> <p>Our set up is free, highly secure and under the complete control of our sysadmins, with none of the risk of relying on a third party.</p> </div></div></details></div></section></div></div><div class="jsx-3150998698 "><div class="jsx-3150998698 container-row ut-wrapper"><section id="mobile-vpn" class="jsx-2580530280 block-text ut-row"><h3 class="heading-3">2. Mobile VPNs</h3><div><p><img loading="lazy" decoding="async" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2021%2F08%2FMobile-VPN-services.jpg&w=1920&q=80" alt="Diagram explaining how mobile VPN services work" width="1180" height="452" class="size-full wp-image-201967"></p> </div><div id="collcon-2.-mobile-vpns" class="jsx-3376757649 collapsible-content-group"><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="what-is-a-mobile-vpn" class="heading-4 collapsible-content-group-heading">What is a Mobile VPN?</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>A mobile VPN, also known as an “Always-on VPN”, is a better option than a remote access VPN if the user is unlikely to have a stable connection, on the same network, for the entire session.</p> <p>With a mobile VPN, the VPN connection persists even if the user switches WiFi or cellular network, loses connectivity, or switches their device off for a while.</p> <div id="attachment_1634893" style="width: 810px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-1634893" loading="lazy" decoding="async" class="wp-image-1634893 size-full" src="/assets/2024/10/mobile-vpn-opt-2.webp" alt="Mobile VPN service offered by Bittium" width="600" height="569"><p id="caption-attachment-1634893" class="wp-caption-text">Mobile VPN service offered by Bittium.</p></div> <p>Mobile VPNs tend to be offered by the same big tech companies that also provide standard <a href="#remote-access">remote access VPN</a> services.</p> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE</b>: A mobile VPN can be used with <b>any</b> device and <b>any</b> connection: it doesn’t have to be a mobile phone on a mobile network.</p> <p>Confusingly, the ExpressVPN or PIA app on your smartphone is <b>not</b> a mobile VPN, rather it’s the mobile client for your <a href="#personal-vpn">personal VPN service</a>. </p></div> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="when-to-use-a-mobile-vpn" class="heading-4 collapsible-content-group-heading">When to Use a Mobile VPN</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>You should use a mobile VPN if you are constantly on the move and it’s critical that you maintain an uninterrupted connection to a remote private network.</p> <p>This type of VPN also provides the convenience of a connection that adapts to network changes.</p> <p>For example:</p> <ul> <li> <p><b>First responders</b> like firefighters and police officers rely on mobile VPNs to maintain access to critical resources such as vehicle databases, location tracking systems, and emergency dispatch applications as they move throughout their service area.</p> </li> <li> <p><b>Remote professionals</b> in regions with unreliable internet can use a mobile VPN to maintain a secure office connection throughout the workday. This type of VPN avoids the inconvenience of constant re-authentication or the challenge of whitelisting revolving IP addresses.</p> </li> </ul> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="how-mobile-vpns-work" class="heading-4 collapsible-content-group-heading">How Mobile VPNs Work</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>From a user’s perspective, connecting to and using a mobile VPN is typically much the same as with a <a href="#remote-access-how">remote access VPN</a>.</p> <p>The main differences are technical, using specialized protocols to maintain your VPN connection as you move between networks, whether switching cellular towers or changing from WiFi to mobile data.</p> <p>Mobile VPNs will typically use UDP-based protocols, such as <a href="#ikev2">IKEv2</a>, for the same reason that they are usually the default option in the mobile apps of personal VPN services.</p> <p>These VPN protocols are more resilient to network changes than TCP-based alternatives, as they can quickly re-establish connections without a full <a href="/what-is-a-vpn/how-does-a-vpn-work/#vpn-handshakes">VPN handshake</a>.</p> <p>For an overview of how these types of VPN function, refer to our explanation of <a href="#remote-access-how">how a remote access VPN works</a>.</p> <p>Now, let’s delve into the aspects unique to mobile VPNs:</p> <ul> <li><b>Network switching process</b> <ol> <li>Your device switches networks (e.g., from WiFi to cellular), changing IP address in the process.</li> <li>Your VPN client detects the network change.</li> <li>The client sends a reconnection request using the unique ID assigned to the session.</li> <li>The VPN gateway validates the session and seamlessly resumes the connection.</li> <li>Even if you switch off your device to save battery, the VPN connection will still be active when it’s turned back on.</li> </ol> </li> <li><b>Optimization techniques</b> <ol> <li><b>Connection durability</b>: tolerating brief network interruptions</li> <li><b>Fast reconnections</b>: minimizing handshake overhead</li> <li><b>Data compression</b>: reducing data transfer for slower networks</li> <li><b>Quality of Service</b>: <a href="https://www.fortinet.com/uk/resources/cyberglossary/qos-quality-of-service" rel="noopener" target="_blank">QoS mechanisms</a> ensure critical applications remain usable even in challenging network conditions.</li> </ol> </li> <li><b>Common mobile VPN challenges and solutions</b> <ol> <li><b>Battery impact</b>: continuous connection monitoring can drain the battery, requiring optimized polling intervals and efficient reconnection algorithms.</li> <li><b>Data usage</b>: <a href="https://en.wikipedia.org/wiki/Keepalive" rel="noopener" target="_blank">Keepalive</a> packets consume data, requiring minimization and compression.</li> <li><b>Performance</b>: Constant reconnections increase encryption overhead and latency, which is mitigated by hardware acceleration and optimized protocols.</li> </ol> </li> <li><b>Common mobile VPN additional features</b> <ol> <li><a href="/guides/vpn-split-tunneling/">Split tunneling</a> for selective traffic routing.</li> <li>Automatic connection rules based on networks.</li> <li>Integration with <a href="https://www.ibm.com/topics/mobile-device-management" rel="noopener" target="_blank">Mobile Device Management (MDM)</a>.</li> <li>Performance analytics and troubleshooting tools.</li> </ol> </li> </ul> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="examples-of-mobile-vpns" class="heading-5 collapsible-content-group-heading">Examples of Mobile VPNs</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>Mobile VPN examples include:</p> <ul> <li><a href="https://www.bittium.com/secure-communications-connectivity/bittium-safemove-mobile-vpn" rel="noopener" target="_blank">Bittium SafeMove Mobile VPN</a></li> <li><a href="https://www.cisco.com/c/en/us/products/ios-nx-os-software/mobile-vpn/index.html" rel="noopener" target="_blank">Cisco Mobile VPN</a></li> <li><a href="https://www.ivanti.com/en-gb/products/connect-secure-vpn" rel="noopener" target="_blank">Ivanti Connect Secure VPN</a></li> <li><a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-access/overview-always-on-vpn" rel="noopener" target="_blank">Microsoft Always On</a></li> <li><a href="https://www.digi.com/blog/post/digi-mobile-vpn-secure-connections-for-police">Digi Mobile VPN</a> is specifically aimed at first responders.</li> <li><a href="https://www.absolute.com/platform/secure-access/" rel="noopener" target="_blank">Absolute Secure Access</a>, previously known as Netmotion Mobility VPN.</li> <li><a href="https://www.radio-ip.com/en/" rel="noopener" target="_blank">Radio IP software:</a> enables mobile VPNs across all wireless network technologies.</li> </ul> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE</b>: Many personal VPNs offer mobile versions of their software that you can download onto your cell phone or tablet. These are <b>not the same as mobile VPNs</b>. Mobile VPNs are usually a form of business VPN, used by employees to access the company network.</p> </div> </div></div></details></div></section></div></div><div class="jsx-3150998698 "><div class="jsx-3150998698 container-row ut-wrapper"><section id="site-to-site" class="jsx-2580530280 block-text ut-row"><h3 class="heading-3">3. Site-to-Site VPNs</h3><div><p><img loading="lazy" decoding="async" src="/assets/2021/08/Site-to-Site-VPNs.jpg" alt="Diagram explaining how site-to-site VPN services work" width="1180" height="386" class="size-full wp-image-201976"></p> </div><div id="collcon-3.-site-to-site-vpns" class="jsx-3376757649 collapsible-content-group"><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="what-is-a-site-to-site-vpn" class="heading-4 collapsible-content-group-heading">What Is a Site-to-Site VPN?</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>A site-to-site VPN is used to connect entire networks in different locations, such as linking the corporate networks of a company’s multiple offices.</p> <p>Unlike <a href="#remote-access">remote access VPNs</a> that connect individual users to a network, site-to-site VPNs bridge two or more separate local area networks (LANs) over the internet.</p> <p>This type of VPN enables offices to share resources and communicate seamlessly as if they were part of the same network, while keeping communications secure through encryption.</p> <p>It can also extend to trusted business partners, allowing external companies to access parts of your network securely.</p> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE:</b> Site-to-site VPNs are also called <b>router-to-router VPNs</b> or <b>network-based VPNs</b>, as they work by connecting entire networks rather than individual users.</p> </div> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="when-to-use-a-site-to-site-vpn" class="heading-4 collapsible-content-group-heading">When to Use a Site-to-Site VPN</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>A site-to-site VPN is ideal when you need to connect multiple networks securely, for instance:</p> <ul> <li><b>Intranet-based VPN:</b> This type of site-to-site VPN connects different branches of the same company into a unified private wide area network (WAN). Employees from each location can access shared resources across all branches seamlessly.</li> <li><b>Extranet-based VPN:</b> This allows companies to securely share specific resources with external business partners by connecting their respective networks. It’s useful for suppliers, contractors, and collaborative ventures.</li> </ul> <div class="block-highlighted block-highlighted--orange"> <p><span style="color:#5E2314;"><b>EXPERT TIP:</b></span> You can combine a site-to-site VPN with a remote access VPN, enabling secure network connections between offices and allowing individual employees to connect remotely.</p> </div> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="how-site-to-site-vpns-work" class="heading-4 collapsible-content-group-heading">How Site-to-Site VPNs Work</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>There are three main ways a site-to-site VPN can be implemented, via:</p> <ol> <li><a href="#ipsec">IPsec tunnel</a></li> <li><a href="#dmvpn">Dynamic MultiPoint VPN (DMVPN)</a></li> <li><a href="#l3vpn">Layer 3 VPN (L3VPN)</a></li> </ol> <h5 id="ipsec">IPsec tunnel</h5> <p>IPsec tunnels create encrypted pathways between networks, implemented through routers at connected sites. This method is also known as a router-to-router VPN and comes in two variants:</p> <ol> <li>A <b>route-based IPsec tunnel</b> acts as a virtual wire between networks, allowing all traffic to pass through.</li> <li>A <b>policy-based IPsec tunnel:</b> employs specific rules to control the flow of traffic between IP networks.</li> </ol> <table class="table-default"> <thead> <tr> <th><span style="color: var(--green-70);"><b>Pros</b></span></th> <th><span style="color: var(--orange-70);"><b>Cons</b></span></th> </tr> </thead> <tbody> <tr> <td data-header="Pros">Widely supported by most firewalls and routers</td> <td data-header="Cons">Point-to-point nature limits scalability</td> </tr> <tr> <td data-header="Pros">Strong security through encryption</td> <td data-header="Cons">Can become complex to manage in large networks</td> </tr> <tr> <td data-header="Pros">Relatively simple to implement for small-scale deployments</td> <td data-header="Cons">Relies on internet connectivity, which may affect performance</td> </tr> </tbody> </table> <p class="spacer"> </p><h5 id="dmvpn">Dynamic MultiPoint VPN (DMVPN)</h5> <p>DMVPN addresses the scalability limitations of traditional IPsec tunnels.</p> <p>This Cisco-proprietary technology is particularly suitable for large organizations with numerous sites, which would otherwise might need thousands of individual router-to-router IPSec connections.</p> <p>DMVPN instead employs a hub-and-spoke architecture where:</p> <ul> <li>Branch sites (spokes) connect to a central location (hub).</li> <li>Dynamic IP addressing is supported.</li> <li>Direct spoke-to-spoke connections are possible with additional configuration.</li> </ul> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE</b>: DMVPN requires Cisco routers. Here’s a <a href="https://www.cisco.com/c/dam/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/dmvpn_design_guide.pdf" rel="noopener" target="_blank">comprehensive guide to designing a DMVPN architecture</a>.</p> </div> <table class="table-default"> <thead> <tr> <th><span style="color: var(--green-70);"><b>Pros</b></span></th> <th><span style="color: var(--orange-70);"><b>Cons</b></span></th> </tr> </thead> <tbody> <tr> <td data-header="Pros">Highly scalable for large networks</td> <td data-header="Cons">Vendor-specific (Cisco only)</td> </tr> <tr> <td data-header="Pros">Supports dynamic addressing</td> <td data-header="Cons">May require specialized expertise to implement and manage</td> </tr> <tr> <td data-header="Pros">Reduces configuration complexity in hub-and-spoke topologies</td> <td data-header="Cons">Still subject to internet performance limitations</td> </tr> </tbody> </table> <p class="spacer"> </p><h5 id="l3vpn">MPLS-based Layer 3 VPN (L3VPN)</h5> <p>The IPsec and DMVPN approaches both sit on top of the internet, which means they can’t guarantee consistent performance.</p> <p>L3VPNs instead operate at the network layer of the <a href="https://en.wikipedia.org/wiki/OSI_model" rel="noopener" target="_blank">OSI model</a> and use Multi-Protocol Label Switching to provide guaranteed quality of service across various transport media.</p> <p>These are typically offered by service providers as managed WAN solutions.</p> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE:</b> L3VPNs are also sometimes known as Virtual Private Routed Network (VPRNs).</p> </div> <table class="table-default"> <thead> <tr> <th><span style="color: var(--green-70);"><b>Pros</b></span></th> <th><span style="color: var(--orange-70);"><b>Cons</b></span></th> </tr> </thead> <tbody> <tr> <td data-header="Pros">Guaranteed performance and QoS</td> <td data-header="Cons">Significantly higher cost compared to internet-based VPNs</td> </tr> <tr> <td data-header="Pros">Traffic prioritization capabilities</td> <td data-header="Cons">Limited flexibility in terms of service changes</td> </tr> <tr> <td data-header="Pros">Provider-managed infrastructure</td> <td data-header="Cons">Dependency on service provider coverage</td> </tr> <tr> <td data-header="Pros">Protocol and transport medium agnostic</td> <td data-header="Cons"></td> </tr> </tbody> </table> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="examples-of-site-to-site-vpns" class="heading-4 collapsible-content-group-heading">Examples of Site-to-Site VPNs</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>Examples of site-to-site VPN products include:</p> <ul> <li><a href="https://openvpn.net/vpn-server-resources/site-to-site-routing-explained-in-detail/" rel="noopener" target="_blank">OpenVPN Access Server</a> – Allows for secure site-to-site connectivity using the OpenVPN protocol.</li> <li><a href="https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security/index.html" rel="noopener" target="_blank">Cisco VPN Solutions</a> – A comprehensive suite of VPN technologies including DMVPN and IPsec options for enterprise networks.</li> <li><a href="https://aws.amazon.com/vpn/" rel="noopener" target="_blank">AWS Site-to-Site VPN</a> – Enables secure, scalable connectivity between on-premises data centers and Amazon Virtual Private Cloud (VPC).</li> <li><a href="https://www.fortinet.com/products/sd-wan" rel="noopener" target="_blank">Fortinet SD-WAN</a> – Provides secure site-to-site connectivity with advanced traffic optimization and security features.</li> </ul> </div></div></details></div></section></div></div><div class="jsx-3150998698 "><div class="jsx-3150998698 container-row ut-wrapper"><section id="personal-vpn" class="jsx-2580530280 block-text ut-row"><h3 class="heading-3">4. Personal VPN Services</h3><div><p><img loading="lazy" decoding="async" src="/assets/2021/08/Personal-VPN-Services.jpg" alt="Diagram explaining how personal VPN services work" width="1180" height="390" class="size-full wp-image-201970"></p> </div><div id="collcon-4.-personal-vpn-services" class="jsx-3376757649 collapsible-content-group"><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="what-is-a-personal-vpn" class="heading-4 collapsible-content-group-heading">What is a Personal VPN?</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>A personal VPN service connects you to a remote VPN server, which can be anywhere in the world.</p> <p>This VPN server then acts like a middleman between your device and the online services you want to access.</p> <div id="attachment_1624690" style="width: 810px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-1624690" loading="lazy" decoding="async" class="wp-image-1624690 size-full" src="/assets/2024/09/nordvpn-germany-servers-scaled.webp" alt="Connecting to a VPN server in Germany using a personal VPN service" width="800" height="569"><p id="caption-attachment-1624690" class="wp-caption-text">Here we connected to a VPN server in Germany using a personal VPN service.</p></div> <p>The personal VPN – sometimes also called a ‘consumer’ or ‘commercial’ VPN – encrypts your connection, hides your identity online, and lets you spoof your geographic location.</p> <p>A personal VPN service differs from a remote access VPN in that it doesn’t give you access to a private network. </p> <p>Instead, <a href="/what-is-a-vpn/how-does-a-vpn-work/">a personal VPN works</a> by giving you access to the <b>public internet</b>, but over an encrypted connection. </p> <p>Personal VPNs are what we mostly talk about on this website in our VPN <a href="/reviews/">reviews</a>, <a href="/best-vpn/">recommendations</a> and <a href="/guides/">guides</a>.</p> <p>The most common type of personal VPNs are the subscription services offered by providers such as <a href="/reviews/expressvpn/">ExpressVPN</a>, <a href="/reviews/nordvpn/">NordVPN</a> and <a href="/reviews/private-internet-access/">Private Internet Access</a>, or free services like <a href="/reviews/windscribe/">Windscribe</a> and <a href="/reviews/protonvpn/">Proton VPN</a>.</p> <p>However, just as with <a href="#remote-access">remote access VPNs</a>, it is possible to <a href="/vpn-setup/home-vpn-server/">set up your own personal VPN</a>, although it is less common.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="when-to-use-a-personal-vpn-service" class="heading-4 collapsible-content-group-heading">When to Use a Personal VPN Service</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>There are several reasons to use a personal VPN. Some of the most popular ones include:</p> <ul> <li><b>Unblocking georestricted content:</b> A personal VPN allows you to stream movies and TV shows from different regions. For instance, connecting to a US-based VPN server allows you to access American Netflix’s extensive content library from anywhere in the world.</li> <li><b>Bypassing censorship:</b> A personal VPN helps you overcome internet restrictions in countries with strict online censorship. Connecting to a VPN server in another country not only allows you to access blocked content but also protects your browsing activity from government surveillance.</li> <li><b>Enhancing internet privacy and performance</b>: Personal VPNs prevent <a href="/tools/who-is-my-isp/">your internet service provider (ISP)</a>, governments, hackers, and anyone else from monitoring your online activity. This not only safeguards your privacy but can also prevent ISPs from <a href="/guides/how-to-stop-internet-throttling/">throttling your connection speeds</a> during high-bandwidth activities like streaming or gaming.</li> </ul> <div id="attachment_1641915" style="width: 1610px" class="wp-caption alignnone"><img aria-describedby="caption-attachment-1641915" loading="lazy" decoding="async" class="wp-image-1641915 size-full" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F10%2Fwindscribe-free-unblocking-dazn-canada.webp&w=1920&q=80" alt="Accessing DAZN Canada while connected to a Canadian Windscribe Free server" width="1600" height="1065"><p id="caption-attachment-1641915" class="wp-caption-text">Personal VPNs can be used to bypass geo-blocked content from anywhere.</p></div> <p>For a more extensive list, read our dedicated guide to <a href="/what-is-a-vpn/what-are-vpns-used-for/">what VPNs are used for</a>.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="how-personal-vpns-work" class="heading-4 collapsible-content-group-heading">How Personal VPNs Work</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><div id="attachment_1434613" style="width: 610px" class="wp-caption alignleft"><picture><source media="(max-width: 768px)" srcset="https://www.top10vpn.com/images/2024/03/How-Do-VPNs-Work-m.webp"><img aria-describedby="caption-attachment-1434613" loading="lazy" decoding="async" class="wp-image-1434613 size-full" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F03%2FHow-Do-VPNs-Work.webp&w=1200&q=80" alt="Diagram explaining how VPN services encrypt and reroute web traffic" width="600" height="460"></picture><p id="caption-attachment-1434613" class="wp-caption-text">Diagram explaining how VPN services encrypt and reroute web traffic.</p></div> <p>Personal VPNs from free or paid providers all work in the same way and simply require the installation of client software on your device.</p> <p>The VPN server network is managed by the provider and typically spans many global locations, either <a href="/what-is-a-vpn/virtual-server-locations/">physically, virtually or both</a>.</p> <p>Self-managed, or “roll your own”, personal VPNs come in many forms and, as with <a href="#remote-access-how">remote access VPNs</a>, require spinning up your own server.</p> <p>Unless you rent a Virtual Private Server (VPS) in another country though, this type of personal VPN will lack the geolocation spoofing capacity of a VPN service.</p> <p>On the other hand, several methods of <a href="/vpn-setup/home-vpn-server/">setting up your own VPN server</a> will provide you with both a remote access and a personal VPN.</p> <p>Here’s how a personal VPN from a service provider works:</p> <ol> <li> <p><b>Install software from your VPN service provider onto your device.</b></p> <p>Personal VPN apps are available on all sorts of devices, including smartphones, streaming devices and gaming consoles.</p> <p>Alternatively, you can <a href="/vpn-setup/router/">install the VPN software on your router</a> to protect all the devices that connect to it.</p></li> <p></p> <p>The set-up process typically requires some kind of one-time sign-in or use of an activation code.</p> <li> <p><b>Connect to a server in your VPN provider’s network.</b></p> <p>Personal VPNs are very straightforward. You simply tap connect and authentication takes place automatically between the client and server.</p> <p>The tunnel is established <a href="#remote-tunnel">in the same way</a> as with a remote access VPN.</p> <p>Personal VPNs tend to have large server networks to choose from. If you just want to protect your privacy, connect to a local server for the fastest speeds.</p> <p>If you want to unblock streaming content, choose a server in the country where that content is accessible.</p> </li> <li> <p><b>Browse the internet as normal.</b></p> <p>While connected to the VPN, all your internet traffic is routed via the remote server you selected.</p> <p>Your connection is encrypted, your IP address is replaced with that of the VPN server, and you can access geographically restricted content from other countries.</p> <p>For more detail on exactly how this works, see our breakdown of <a href="/what-is-a-vpn/how-does-a-vpn-work/#the-individual-phases-of-a-vpn-connection">the phases of a VPN connection</a>.</p> </li> </ol> <div class="block-highlighted block-highlighted--orange"> <p><span style="color:#5E2314;"><strong>EXPERT ADVICE:</strong></span> It’s important to choose the right VPN protocol. We recommend WireGuard for most situations, as it’s fast, secure and open-source. Jump ahead to the section on <a href="#vpn-protocols">VPN protocols</a> for more information about when it makes sense to try the alternatives.</p> </div> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h4 id="examples-of-personal-vpn-services" class="heading-4 collapsible-content-group-heading">Examples of Personal VPN Services</h4><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p>We’ve tested hundreds of free and paid personal VPNs since 2016. Currently, our three <a href="/best-vpn/">highest-rated VPNs</a> are:</p> <ol> <li><b>ExpressVPN</b></li> <li><b>NordVPN</b></li> <li><b>Private Internet Access</b></li> </ol> <div class="block-highlighted block-highlighted--light"> <p><b>NOTE:</b> Personal VPNs are typically sold on a subscription basis, with discounts available when you pay upfront for a year or more. There’s also a small number of <a href="/best-vpn/free/">free VPN services that are safe to use</a>.</p> </div> </div></div></details></div></section></div></div><div class="jsx-3150998698 "><div class="jsx-3150998698 container-row ut-wrapper"><section id="vpn-protocols" class="jsx-2580530280 block-text ut-row"><h2 class="heading-2">Different Types of VPN Protocols</h2><div><p>VPN protocols are the sets of rules VPN clients and software use to talk to each other and establish an encrypted tunnel between them.</p> <p>VPN protocols are <b>not</b> different types of VPN. In fact there’s often a lot of overlap in the protocols that each VPN type uses, i.e., a remote access VPN and a personal VPN will both use WireGuard or OpenVPN, for example.</p> <p>If you just need an overview of the VPN protocols, the table below allows you to quickly compare their relative speeds, security, and data usage. </p> <table class="table-default table-not-stacked"> <thead> <tr> <th style="min-width: 185px;">Protocol</th> <th style="min-width: 183px;">Speed</th> <th style="min-width: 185px;">Security</th> <th style="min-width: 185px;">Data Usage</th> </tr> </thead> <tbody> <tr> <td><b>WireGuard</b></td> <td><span style="color: var(--green-70);">Very Fast</span></td> <td><span style="color: var(--green-70);">Very High</span></td> <td><span style="color: var(--green-70);">Very Low</span></td> </tr> <tr> <td><b>OpenVPN</b></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> <td><span style="color: var(--green-70);">Very High</span></td> <td><span style="color: var(--orange-70);">High</span></td> </tr> <tr> <td><b>IKEv2/IPSec</b></td> <td><span style="color: var(--green-70);">Very Fast</span></td> <td><span style="color: var(--green-70);">High</span></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> </tr> <tr> <td><b>SoftEther</b></td> <td><span style="color: var(--green-70);">Very Fast</span></td> <td><span style="color: var(--green-70);">High</span></td> <td><span style="color: var(--green-70);">Low</span></td> </tr> <tr> <td><b>L2TP/IPSec</b></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> <td><span style="color: var(--orange-70);">High</span></td> </tr> <tr> <td><b>SSTP</b></td> <td><span style="color: var(--orange-70);">Slow</span></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> <td><span style="color: var(--orange-70);">High</span></td> </tr> <tr> <td><b>PPTP</b></td> <td><span style="color: var(--orange-70);">Slow</span></td> <td><span style="color: var(--orange-70);">Low</span></td> <td><span style="color: var(--yellow-70);">Moderate</span></td> </tr> </tbody> </table> <p class="spacer"> </p><p>There’s also a brief explanation of each one underneath, which includes their pros and cons.</p> <p>For a deeper exploration of the topic, we also have a <a href="/what-is-a-vpn/vpn-protocols/">dedicated guide to VPN protocols</a>.</p> </div><div id="collcon-different-types-of-vpn-protocols" class="jsx-3376757649 collapsible-content-group"><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="wireguard" class="heading-5 collapsible-content-group-heading">WireGuard</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#wireguard">WireGuard</a> is a modern VPN protocol that prioritizes simplicity and performance. It uses state-of-the-art cryptography and is implemented with only about 4,000 lines of code, making it easier to audit and less susceptible to vulnerabilities.</p> <p>The protocol is built into the Linux kernel, which contributes to its exceptional speed and efficiency.</p> <p>WireGuard is ideal for when you really need a high-speed connection, such as streaming or gaming. It’s also particularly effective on mobile, as it can switch between networks seamlessly.</p> <p>Its main advantages include faster connection times, improved battery life on mobile devices, and better overall performance. </p> <p>WireGuard’s simplicity means it is less configurable than other protocols however, which may be off-putting for some. Any <a href="/guides/wireguard-vs-openvpn/#privacy-&-logging">concerns over IP-logging are completely unfounded</a> in our view, as WireGuard can be configured to not record this data.</p> <p>It’s the VPN protocol that we typically recommend using wherever possible.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="openvpn" class="heading-5 collapsible-content-group-heading">OpenVPN</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#openvpn">OpenVPN</a> is an open-source VPN protocol that became the industry standard for personal VPN services.</p> <p>For many years it was our recommended option for consumer VPN users until WireGuard more recently <a href="/guides/wireguard-vs-openvpn/">replaced it as our protocol of choice</a>.</p> <p>OpenVPN offers a highly secure and versatile connection, using OpenSSL library and TLS protocols for encryption and authentication.</p> <p>It is extremely flexible and difficult to block as it can be configured to run on any port and can use either <a href="/guides/udp-vs-tcp/">UDP or TCP protocols</a>.</p> <p>OpenVPN is an excellent choice if security and privacy are more important to you than raw speed. It is particularly effective at bypassing firewalls and can be used on almost any platform.</p> <p>The drawbacks of OpenVPN are that it can be <a href="/guides/wireguard-vs-openvpn/#speed">slower than newer protocols like WireGuard</a>, requires third-party software for implementation, and can be complex to set up manually.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="ikev2" class="heading-5 collapsible-content-group-heading">IKEv2</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#ikev2">IKEv2</a> (Internet Key Exchange version 2), when combined with IPSec, creates a highly secure and fast VPN protocol.</p> <p>Developed jointly by Microsoft and Cisco, IKEv2 handles the <a href="https://en.wikipedia.org/wiki/Security_association" rel="noopener" target="_blank">SA (Security Association)</a> attribute negotiation, while IPSec provides encryption for the actual data traffic.</p> <p>This protocol is known for its ability to quickly re-establish a VPN connection when a user switches networks or temporarily loses their connection, which is why it’s ideal for <a href="#mobile-vpn">mobile VPNs</a> and personal VPN services’ mobile apps.</p> <p>The main advantages of IKEv2 are its excellent stability, fast speeds, and native support on many platforms.</p> <p>The protocol’s biggest downside is that it’s closed-source and so can’t be audited like WireGuard or OpenVPN for flaws or backdoors.</p> <p>Other potential disadvantages are that IKEv2 isn’t supported by as many platforms as OpenVPN, and that, in theory at least, it’s easier to block as it uses <a href="/guides/vpn-ports/">fixed ports</a>.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="softether" class="heading-5 collapsible-content-group-heading">SoftEther</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#softether">SoftEther</a> (Software Ethernet) is a multi-protocol VPN software designed as an alternative to OpenVPN. </p> <p>SoftEther can tunnel through most firewalls by using HTTPS, making it highly versatile in restrictive network environments. It started as an academic project at the University of Tsukuba in Japan but has grown into a powerful and flexible VPN solution.</p> <p>SoftEther can be a good option if you need to bypass strict firewalls or network restrictions while maintaining good performance.</p> <p>SoftEther’s strengths include its ability to support multiple protocols, that it’s usually faster than OpenVPN, and strong encryption.</p> <p>However, it is not as widely supported by commercial VPN providers as other protocols, can be complex to set up, and may require more technical knowledge to implement effectively.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="l2tp-ipsec" class="heading-5 collapsible-content-group-heading">L2TP/IPSec</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#l2tp">L2TP</a> (Layer 2 Tunneling Protocol) is typically paired with IPSec for encryption, as it doesn’t provide encryption on its own.</p> <p>Together they provide a very secure VPN connection that encapsulates data twice. L2TP/IPSec is a successor to PPTP and is significantly more secure while maintaining wide compatibility.</p> <p>L2TP/IPSec is best for situations where security is paramount and native support is important, as it’s built into many operating systems.</p> <p>The primary advantages of L2TP/IPSec include its widespread support, good security when properly configured, and ease of setup on most platforms.</p> <p>Drawbacks include slower speeds due to double encapsulation, difficulty in getting through firewalls due to fixed ports, and <a href="https://www.paloaltonetworks.co.uk/cyberpedia/what-is-l2tp#pros" rel="noopener" target="_blank">potential vulnerabilities</a> if <a href="/guides/vpn-passthrough/">Network Address Translation (NAT)</a> is implemented incorrectly.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="sstp" class="heading-5 collapsible-content-group-heading">SSTP</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#sstp">SSTP</a> (Secure Socket Tunneling Protocol) is Microsoft’s proprietary VPN protocol that uses SSL/TLS encryption.</p> <p>It’s similar to OpenVPN in that it can use TCP port 443, making it difficult to block and able to bypass most firewalls.</p> <p>While SSTP can be useful in environments where other VPN protocols are blocked or restricted, we don’t recommend using it except as a last resort as it is closed-source.</p> <p>It’s also not well-supported outside of Windows and slower than other protocols.</p> </div></div></details><details open="" class="jsx-3376757649"><summary class="jsx-3376757649 standard"><h3 id="pptp" class="heading-5 collapsible-content-group-heading">PPTP</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" class="jsx-3376757649 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-3376757649"></use></svg></summary><div class="jsx-2580530280 block-text collapsible-content-group-body"><div><p><a href="/what-is-a-vpn/vpn-protocols/#pptp">PPTP</a> (Point-to-Point Tunneling Protocol) is one of the oldest VPN protocols still in use today.</p> <p>Developed by Microsoft for dial-up networks, it was once the standard protocol for corporate VPN access but now has largely been phased out.</p> <p>We do not recommend <b>ever</b> using this <a href="https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol">obsolete VPN protocol</a> due to its age and known security vulnerabilities.</p> </div></div></details></div></section></div></div><div class="jsx-3150998698 container-row ut-wrapper"><div class="feedback-wrapper ut-row"><div style="height:27.5px;margin:0 auto calc(var(--base-unit) * 30)"></div></div></div></div><hr class="jsx-3150998698"/><div class="jsx-3150998698 container-row ut-wrapper"><section class="jsx-2580530280 block-text"></section><div data-swiftype-index="false" class="jsx-3150998698 related-articles"><h2 class="heading-4">Related guides</h2><ul class="jsx-3150998698"><li class="jsx-3150998698"><img alt="Illustration showing countries where VPNs are illegal and legal" loading="lazy" width="279" height="189" decoding="async" data-nimg="1" style="color:transparent" srcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2019%2F11%2FVPN_Legal_Engagemt_Header-map-768x521.jpg&w=320&q=75 1x, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2019%2F11%2FVPN_Legal_Engagemt_Header-map-768x521.jpg&w=600&q=75 2x" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2019%2F11%2FVPN_Legal_Engagemt_Header-map-768x521.jpg&w=600&q=75"/><p class="jsx-3150998698 heading-5"><a href="/what-is-a-vpn/are-vpns-legal/" class="jsx-3150998698">Are VPNs Legal?</a></p></li><li class="jsx-3150998698"><img alt="vpn, dns, and proxy servers" loading="lazy" width="279" height="189" decoding="async" data-nimg="1" style="color:transparent" srcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2020%2F06%2Fvpn-servers-explained-768x521.jpg&w=320&q=75 1x, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2020%2F06%2Fvpn-servers-explained-768x521.jpg&w=600&q=75 2x" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2020%2F06%2Fvpn-servers-explained-768x521.jpg&w=600&q=75"/><p class="jsx-3150998698 heading-5"><a href="/what-is-a-vpn/virtual-server-locations/" class="jsx-3150998698">Virtual Server Locations & Rented VPN Servers Explained</a></p></li><li class="jsx-3150998698"><img alt="scales showing disadvantages of using a VPN" loading="lazy" width="279" height="189" decoding="async" data-nimg="1" style="color:transparent" srcSet="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2021%2F04%2FDisadvantages-of-VPN-768x521.jpg&w=320&q=75 1x, /_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2021%2F04%2FDisadvantages-of-VPN-768x521.jpg&w=600&q=75 2x" src="/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2021%2F04%2FDisadvantages-of-VPN-768x521.jpg&w=600&q=75"/><p class="jsx-3150998698 heading-5"><a href="/what-is-a-vpn/vpn-disadvantages/" class="jsx-3150998698">The 10 Disadvantages Of Using a VPN</a></p></li></ul></div></div><span class="jsx-2378246354 jsx-3313091859 tooltip-toast-group"><span class="jsx-2378246354 jsx-3313091859 tooltip-toast large"><i class="jsx-2378246354 jsx-3313091859 arrow"></i><span class="jsx-2378246354 jsx-3313091859 tooltip-toast-wrapper"><span class="jsx-2378246354 jsx-3313091859 flex no-header"><span class="jsx-2378246354 jsx-3313091859 tooltip-toast-content"></span><button aria-label="Close" class="jsx-2378246354 jsx-3313091859 button-text"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" class="jsx-2378246354 jsx-3313091859 icon-cross"><use xlink:href="#svg-cross" class="jsx-2378246354 jsx-3313091859"></use></svg></button></span></span></span></span><script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.top10vpn.com/what-is-a-vpn/vpn-types/"},"headline":"The Different Types of VPN & When to Use Them","image":["https://www.top10vpn.com/images/2024/10/VPN-Types-fb.jpg"],"datePublished":"2021-08-02T16:30:42.000Z","dateModified":"2024-10-25T13:58:00.000Z","author":[{"@context":"https://schema.org","@type":"Person","name":"JP Jones","url":"https://www.top10vpn.com/about/vpn-experts/jpjones/","sameAs":[],"image":"https://www.top10vpn.com/images/2022/12/expertbio-JP-small-opt.jpeg"},{"@context":"https://schema.org","@type":"Person","name":"Simon Migliano","url":"https://www.top10vpn.com/about/vpn-experts/simonmigliano/","sameAs":[]}],"publisher":{"@type":"Organization","name":"Top10VPN","publishingPrinciples":"https://www.top10vpn.com/about/how-we-review-vpns/","logo":"https://www.top10vpn.com/static/images/logo-raster.png"},"description":"\nUnderstanding the different types of VPN can be confusing, even if you’ve used a VPN before.\nInconsistent terminology and the mixing up of VPN types with protocols (like OpenVPN or PPTP) and configurations (such as Double VPN) contribute to this lack of clarity.\nTo clear up this confusion, we drew on our decades of experience implementing corporate VPNs around the world, as well as thousands of tests of personal VPN services to create this definitive guide to the different types of VPN.\nAt its foundation, every VPN creates an encrypted tunnel over the internet for secure data transmission.\nThere are four distinct types of VPN, whose differences lie simply in how they utilize this encrypted tunnel.\nIf you’re not sure what type of VPN is right for you, use this simple flowchart to help you decide.\nFlowchart to help you choose which type of VPN you need.\n\n","inLanguage":"en"}</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"WebPage","name":"The Different Types of VPN & When to Use Them","reviewedBy":{"@context":"https://schema.org","@type":"Person","name":"Simon Migliano","url":"https://www.top10vpn.com/about/vpn-experts/simonmigliano/","sameAs":[]}}</script></main><footer id="footer" data-swiftype-index="false" class="jsx-4062602538 footer"><div class="jsx-4062602538 container-row footer-trio"><div class="jsx-4062602538 footer-company"><div class="jsx-4062602538 logo"><img alt="Top10VPN" loading="lazy" width="184" height="26" decoding="async" data-nimg="1" style="color:transparent" src="/static/images/logo.svg"/></div><p class="jsx-4062602538">We've been testing and reviewing VPN services since 2016. We also publish VPN research and advice to help protect your internet privacy and security.</p></div><div class="jsx-4062602538 footer-about"><p class="jsx-4062602538 heading-5">About</p><ul class="jsx-4062602538"><li class="jsx-4062602538"><a href="/about/">About Us</a></li><li class="jsx-4062602538"><a href="/about/vpn-experts/">Our VPN Experts</a></li><li class="jsx-4062602538"><a href="/about/how-we-review-vpns/">Our Review Process</a></li><li class="jsx-4062602538"><a href="/about/how-we-make-money/">Our Business Model</a></li><li class="jsx-4062602538"><a href="/research-grant/">Research Opportunities</a></li><li class="jsx-4062602538"><a href="/about/press/">Press</a></li></ul></div><div class="jsx-4062602538 footer-contact"><p class="jsx-4062602538 heading-5">Contact</p><ul class="jsx-4062602538 footer-contacts"><li class="jsx-4062602538"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 32 32" class="jsx-4062602538 icon-mail"><path fill="#000" fill-rule="evenodd" d="M24 8H7.3a2 2 0 00-2 2v12.5c0 1.1.9 2 2 2h16.5c1.2 0 2.1-.9 2.1-2V10C26 8.9 25 8 24 8zM7.3 12.1l8.3 5.2 8.2-5.2v10.4H7.4V12zm0-2l8.3 5.1 8.2-5.1H7.4z" clip-rule="evenodd" class="jsx-4062602538"></path></svg>hello@top10vpn.com</li></ul><ul class="jsx-4062602538 footer-social"><li class="jsx-4062602538"><a href="https://twitter.com/top10vpn" target="_blank" rel="noopener noreferrer" class="jsx-4062602538"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" class="jsx-4062602538 icon-twitter"><path fill="#000" fill-rule="evenodd" d="M12 24a12 12 0 1 0 0-24 12 12 0 0 0 0 24Zm5.6-18-4 4.8 4.4 6.5h-3.3l-3-4.4L8 17.3H7l4.3-5L7 6h3.3l2.8 4.2L16.7 6h1Zm-5.8 5.7.4.6 3 4.3h1.5L13 11.4l-.4-.7-2.8-4H8.3l3.5 5Z" clip-rule="evenodd" class="jsx-4062602538"></path></svg><span class="jsx-4062602538 visually-hidden">Twitter</span></a></li><li class="jsx-4062602538"><a href="https://www.linkedin.com/company/top10vpn" target="_blank" rel="noopener noreferrer" class="jsx-4062602538"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" class="jsx-4062602538 icon-linkedin"><path fill="#000" fill-rule="evenodd" d="M12 24a12 12 0 1 0 0-24 12 12 0 0 0 0 24Zm3.7-7H18v-4c0-2-.4-3.6-2.8-3.6-1 0-1.8.7-2.1 1.2v-1h-2.2V17h2.3v-3.7c0-1 .1-1.9 1.3-1.9s1.2 1.1 1.2 2V17ZM7 7.3a1.3 1.3 0 1 0 2.6 0 1.3 1.3 0 0 0-2.6 0ZM9.4 17H7.2V9.6h2.2V17Z" clip-rule="evenodd" class="jsx-4062602538"></path></svg><span class="jsx-4062602538 visually-hidden">LinkedIn</span></a></li><li class="jsx-4062602538"><a href="https://www.youtube.com/@top10vpn" target="_blank" rel="noopener noreferrer" class="jsx-4062602538"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" class="jsx-4062602538 icon-youtube"><path fill="#000" fill-rule="evenodd" d="M12 24a12 12 0 1 0 0-24 12 12 0 0 0 0 24Zm6.7-15c-.2-.7-.6-1.1-1.2-1.3-1.1-.3-5.5-.3-5.5-.3s-4.4 0-5.5.3c-.6.2-1 .6-1.2 1.2C5 10 5 12.3 5 12.3s0 2.3.3 3.4A2 2 0 0 0 6.5 17c1.1.3 5.5.3 5.5.3s4.4 0 5.5-.3a2 2 0 0 0 1.2-1.3c.3-1 .3-3.4.3-3.4s0-2.3-.3-3.4Zm-8.1 5.4 3.6-2-3.6-2.1v4.1Z" clip-rule="evenodd" class="jsx-4062602538"></path></svg><span class="jsx-4062602538 visually-hidden">YouTube</span></a></li><li class="jsx-4062602538"><a href="https://top10vpn.substack.com/" target="_blank" rel="noopener noreferrer" class="jsx-4062602538"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" class="jsx-4062602538 icon-substack"><path fill="#000" fill-rule="evenodd" d="M12 24a12 12 0 1 0 0-24 12 12 0 0 0 0 24Zm5-17.3H7v1.4h10V6.7Zm0 5.1H7v6.3l5-2.8 5 2.8v-6.3Zm0-2.5H7v1.4h10V9.3Z" clip-rule="evenodd" class="jsx-4062602538"></path></svg><span class="jsx-4062602538 visually-hidden">Substack</span></a></li></ul></div></div><div class="jsx-4062602538 footer-small-print container-row"><div class="jsx-4062602538"><a href="/privacy-policy/">Privacy Policy</a><a href="/cookie-policy/">Cookie Policy</a><a href="/terms-conditions/">Terms of Use</a><a href="/code-of-conduct/">Code of Conduct</a><a href="/responsible-disclosure-policy/">Responsible Disclosure</a><div class="jsx-4062602538 language-selector"><button class="jsx-4062602538 language-selector-toggle"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 14 14" class="jsx-4062602538"><path fill="#000" d="M7 0a7 7 0 1 1 0 14A7 7 0 0 1 7 0Zm.3.6v3h2.3a8 8 0 0 0-.5-1.2C8.6 1.4 8 .7 7.3.6Zm-.6 0C6 .7 5.4 1.3 5 2.4a8 8 0 0 0-.5 1.2h2.3v-3Zm2 .2c.4.3.7.8 1 1.3l.5 1.5h2.3A6.5 6.5 0 0 0 8.7.8ZM5.3.8c-1.6.4-3 1.5-3.8 2.8h2.3l.6-1.5c.2-.5.5-1 .9-1.3Zm7.5 3.4h-2.5c.2.8.3 1.6.3 2.5h2.8c0-.9-.2-1.7-.6-2.5Zm-3 0H7.3v2.5H10c0-.9-.2-1.7-.3-2.5Zm-3 0H4.1C4.1 5 4 5.8 4 6.7h2.8V4.2Zm-3.1 0H1.2C.8 5 .6 5.8.6 6.7h2.8c0-.9 0-1.7.3-2.5Zm9.7 3h-2.8c0 1 0 1.8-.3 2.6h2.5c.4-.8.6-1.6.6-2.5Zm-3.3 0H7.3v2.6h2.5c.1-.8.3-1.6.3-2.5Zm-3.4 0H4c0 1 .2 1.8.3 2.6h2.5V7.3Zm-3.3 0H.6c0 1 .2 1.8.6 2.6h2.5c-.2-.8-.3-1.6-.3-2.5Zm9.1 3.2h-2.3l-.6 1.5c-.2.5-.6 1-.9 1.3 1.6-.4 3-1.5 3.8-2.8Zm-2.9 0H7.3v3c.7-.1 1.3-.8 1.8-1.8l.5-1.2Zm-2.9 0H4.4l.5 1.2c.5 1 1.1 1.7 1.8 1.8v-3Zm-2.9 0H1.5a6.5 6.5 0 0 0 3.8 2.8c-.4-.3-.7-.8-1-1.3l-.5-1.5Z" class="jsx-4062602538"></path></svg><span class="jsx-4062602538">English</span><svg xmlns="http://www.w3.org/2000/svg" width="18" height="18" class="jsx-4062602538 icon-chevron-down"><use xlink:href="#svg-chevron" class="jsx-4062602538"></use></svg></button><ul class="jsx-4062602538 language-popup"><li class="jsx-4062602538"><a href="/what-is-a-vpn/vpn-types/" class="jsx-4062602538">English</a></li><li class="jsx-4062602538"><a href="/es/que-es-una-vpn/tipos-de-vpn/" class="jsx-4062602538">Español</a></li><li class="jsx-4062602538"><a href="/it/cosa-e-una-vpn/tipi-di-vpn/" class="jsx-4062602538">Italiano</a></li><li class="jsx-4062602538"><a href="/pl/vpn-co-to-jest/rodzaje-vpn/" class="jsx-4062602538">Polski</a></li><li class="jsx-4062602538"><a href="/pt/o-que-e-uma-vpn/tipos-de-vpn/" class="jsx-4062602538">Português</a></li><li class="jsx-4062602538"><a href="/sv/vad-ar-en-vpn/typer-av-vpn/" class="jsx-4062602538">Svenska</a></li><li class="jsx-4062602538"><a href="/fr/cest-quoi-un-vpn/type-de-vpn/" class="jsx-4062602538">Français</a></li><li class="jsx-4062602538"><a href="/nl/wat-is-een-vpn/vpn-typen/" class="jsx-4062602538">Nederlands</a></li><li class="jsx-4062602538"><a href="/de/was-ist-ein-vpn/vpn-typen/" class="jsx-4062602538">Deutsch</a></li><li class="jsx-4062602538"><a href="/ko/what-is-a-vpn/vpn-types/" class="jsx-4062602538">한국어</a></li></ul></div></div><p class="jsx-4062602538">Top10VPN.com is operated by PrivacyCo Ltd. | © 2016-2025. All rights reserved.</p></div></footer></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"pageProps":{},"data":{"ui":{"comparisonBasket":{"compare_selected_vpns":"Compare selected VPNs","comparison_tool_preview":"Comparison Tool Preview ({{fe_current_providers_length}} of {{fe_max_providers}})","select_max_providers":"Max of {{fe_max_providers}} providers reached 😀","ph_se_add_provider":"Add provider","se_added":"Added","se_hint":"Search for a VPN Provider, e.g. ExpressVPN, NordVPN, CyberGhost","close":"Close","overall_rating":"Overall Rating","add_to_compare":"Add to compare","added_to_compare":"Added to compare","se_nothing_found":"Nothing found"},"tableSheets":{"expand":"Expand Table","close_fullscreen":"Close Fullscreen"},"apps":{"amazon_firetv":"Amazon Fire TV","android":"Android","androidtv":"Android TV","appletv":"Apple TV","chrome":"Chrome","chromeos":"ChromeOS","chromecast":"Chromecast","edge":"Microsoft Edge","firefox":"Firefox","ios":"iOS","linux":"Linux","mac":"Mac","macos":"macOS","nintendo":"Nintendo","opera":"Opera","playstation":"PlayStation","roku":"Roku","router":"Router","safari":"Safari","smarttv":"Smart TV","windows":"Windows","xbox":"Xbox"},"breadcrumbs":{"about_us":"About Us","best_vpn":"Best VPN","guides":"Guides","vpn_setup":"VPN Setup","what_is_a_vpn":"What Is a VPN?","tools":"Tools"},"cards":{"btn_visit_providername":"Visit {{fe_providername}}","btn_visit_site":"Visit Site","pros":"Pros","cons":"Cons","see_all_categories":"See all ratings","see_fewer_ratings":"See fewer ratings","see_all_features":"See all features","see_less_features":"See less features","plusmore":"+more","see_all_plans":"See all plans","tooltip_download_speed":"Based on 100Mbps local test connection","btn_end_of_card_cta":"or read our \u003ca href=\"/reviews/{{fe_providerslug}}/\"\u003efull {{fe_providername}} Review\u003c/a\u003e.","key_data":{"heading":"{{fe_providername}} Key Data","key_summary_table_labels":{"data_cap":"Data Cap","top_download_speed":"Local Download Speed","logging_policy":"Logging Policy","leaks":"Data Leaks","jurisdiction":"Jurisdiction","servers":"Servers","ip_addresses":"IP Addresses","countries":"Countries with Servers","us_netflix":"US Netflix","torrenting":"Torrenting","simultaneous_connections":"Simultaneous Connections","works_in_china":"Works In China?","support":"Support","pricing_plans":"Pricing Plans","moneyback_guarantee":"Money-Back Guarantee","website":"Official Website","free_trial":"Free Trial","compatible_with":"Compatible with"},"key_summary_table_values":{"logging_policy":{"zero_logs":"No Logs","anonymous_server_usage":"No Identifying Data","some_user_logs":"Some User Logs","intrusive":"Intrusive Logging","unknown":"Unknown"},"leaks":{"no":"No","yes":"Yes"},"torrenting":{"no":"No","partially":"Partially","restricted":"Restricted","permitted":"Permitted","unlimited":"Unlimited"},"works_in_china":{"no":"No","unreliable":"Unreliable","yes":"Yes"},"trial_period_unit":{"hour":"Hour","hours":"Hours","day":"Day","days":"Days","month":"Month","months":"Months","none":"None"},"moneyback_guarantee_unit_values":{"hours":"hours","days":"days","months":"months","none":"None"},"trial_period_payment_info":{"no_payment_info":"No Payment Info Required","payment_info":"Payment Info Required"},"periodunit_moneyback_guarantee":"{{fe_num}} {{fe_unit}} Money-Back Guarantee","period_day_moneyback_guarantee":"{{fe_num}}-day Money-Back Guarantee","yes":"Yes","no":"No","not_disclosed":"Not disclosed"},"type":{"premium":"Paid","free":"Free"}}},"general":{"close":"Close","yes":"Yes","none":"None","no":"No","undisclosed":"Undisclosed"},"header":{"updated":"Updated {{date}}","about_authors":"About authors","additional_research":"Additional Research by {{fe_authorname}}","additional_testing":"Additional Testing by {{fe_authorname}}","fact_checked":"Fact-checked by {{fe_authorname}}","disclaimer":"Top10VPN is editorially independent. We may \u003ca href=\"/about/how-we-make-money/\"\u003eearn commissions\u003c/a\u003e if you buy a VPN via our links.","localised_message":"","read_full_bio":"Read full bio"},"marginals":{"header":{"other":{"skip_to_main_content":"Skip to main content"},"best_vpn":{"heading":"BEST VPN","popular":{"subheading":"Popular","items":[{"name":"Best VPN Services","uri":"/best-vpn/"},{"name":"Best Free VPNs","uri":"/best-vpn/free/"},{"name":"Best VPN Free Trials","uri":"/best-vpn/free-trials/"},{"name":"Best Cheap VPNs","uri":"/best-vpn/cheap-vpns/"},{"name":"Best Streaming VPNs","uri":"/best-vpn/streaming/"}]},"by_location":{"subheading":"By Location","items":[{"name":"USA","uri":"/best-vpn/usa/"},{"name":"UK","uri":"/best-vpn/uk/"},{"name":"Canada","uri":"/best-vpn/canada/"},{"name":"India","uri":"/best-vpn/india-vpn/"}]},"by_device_os":{"subheading":"By Device/OS","items":[{"name":"Windows","uri":"/best-vpn/windows/"},{"name":"Mac","uri":"/best-vpn/mac/"},{"name":"iPhone (iOS)","uri":"/best-vpn/iphone/"},{"name":"Android","uri":"/best-vpn/android/"}]},"btn_text":"See all categories","btn_url":"/best-vpn/#hub-cards"},"vpn_reviews":{"heading":"VPN REVIEWS","popular":{"subheading":"Popular \u003cspan class=\"attr\"\u003eReviews\u003c/span\u003e","items":[{"name":"ExpressVPN","uri":"/reviews/expressvpn/"},{"name":"NordVPN","uri":"/reviews/nordvpn/"},{"name":"Private Internet Access","uri":"/reviews/private-internet-access/"},{"name":"Surfshark","uri":"/reviews/surfshark/"},{"name":"IPVanish","uri":"/reviews/ipvanish/"},{"name":"CyberGhost","uri":"/reviews/cyberghost/"},{"name":"PrivateVPN","uri":"/reviews/privatevpn/"}]},"free_vpns":{"subheading":"Free VPN\u003cspan class=\"hidden-xs\"\u003es\u003c/span\u003e \u003cspan class=\"attr\"\u003eReviews\u003c/span\u003e","items":[{"name":"Proton VPN","uri":"/reviews/protonvpn/"},{"name":"Windscribe","uri":"/reviews/windscribe/"},{"name":"PrivadoVPN","uri":"/reviews/privadovpn/"},{"name":"Hotspot Shield","uri":"/reviews/hotspot-shield/"},{"name":"TunnelBear","uri":"/reviews/tunnelbear/"},{"name":"ZoogVPN","uri":"/reviews/zoogvpn/"},{"name":"Hide.me","uri":"/reviews/hide-me/"}]},"btn_text":"See all VPN reviews","btn_url":"/reviews/"},"what_is_a_vpn":{"show":true,"heading":"WHAT IS A VPN","items":[{"name":"What Is a VPN?","uri":"/vpn-explained/"},{"name":"How Does a VPN Work?","uri":"/what-is-a-vpn/how-does-a-vpn-work/"},{"name":"What Is a VPN Used For?","uri":"/what-is-a-vpn/what-are-vpns-used-for/"},{"name":"Are VPNs Really Worth It?","uri":"/what-is-a-vpn/are-vpns-worth-it/"},{"name":"Types of VPN","uri":"/what-is-a-vpn/vpn-types/"}],"btn_text":"See all guides","btn_url":"/vpn-explained/#seeallguides"},"tools":{"show":true,"heading":"TOOLS","items":[{"name":"VPN Comparison Tool","uri":"/tools/vpn-comparison/"},{"name":"IP Leak Test","uri":"/tools/do-i-leak/"},{"name":"VPN Speed Comparison","uri":"/best-vpn/speed/#vpn-speed-comparison-tool"},{"name":"What's My IP Address?","uri":"/tools/what-is-my-ip/"},{"name":"What's My DNS Server?","uri":"/tools/what-is-my-dns-server/"}],"btn_text":"See all tools","btn_url":"/tools/"},"learn":{"show":true,"heading":"GUIDES","items":[{"name":"How to Setup \u0026 Use a VPN","uri":"/vpn-setup/"},{"name":"How to Hide Your IP Address","uri":"/guides/hide-your-ip-address/"},{"name":"How to Change Your VPN Location","uri":"/guides/change-vpn-location/"},{"name":"How to Check Your VPN Is Working","uri":"/guides/is-my-vpn-working/"},{"name":"How to Change Netflix Region","uri":"/guides/how-to-change-netflix-region/"}],"btn_text":"See all guides","btn_url":"/guides/"},"research":{"show":true,"heading":"RESEARCH","read_our_investigations":"Read our investigations","items":[{"name":"VPN Demand Statistics","uri":"/research/vpn-demand-statistics/"},{"name":"The Cost of Internet Shutdowns","uri":"/research/cost-of-internet-shutdowns/"},{"name":"The Dangers of Free VPNs","uri":"/research/free-vpn-investigations/"}]},"about":{"show":true,"show_bottom_button":false,"heading":"ABOUT","items":[{"uri":"/about/","name":"About Us"},{"uri":"/about/how-we-review-vpns/","name":"How We Review"},{"uri":"/about/vpn-experts/","name":"Our VPN Experts"},{"uri":"/about/how-we-make-money/","name":"How We Make Money"},{"uri":"/about/press/","name":"Press"}],"btn_text":"","btn_url":"/about/"}},"footer":{"mid":{"lhs_text":"We've been testing and reviewing VPN services since 2016. We also publish VPN research and advice to help protect your internet privacy and security.","contact":{"email":"hello@top10vpn.com","heading":"Contact","youtube":{"title":"YouTube","url":"https://www.youtube.com/@top10vpn"}},"about_header":"About","about":[{"name":"About Us","uri":"/about/"},{"name":"Our VPN Experts","uri":"/about/vpn-experts/"},{"name":"Our Review Process","uri":"/about/how-we-review-vpns/"},{"name":"Our Business Model","uri":"/about/how-we-make-money/"},{"name":"Research Opportunities","uri":"/research-grant/"},{"name":"Press","uri":"/about/press/"}]},"lower":{"legal":[{"name":"Privacy Policy","uri":"/privacy-policy/"},{"name":"Cookie Policy","uri":"/cookie-policy/"},{"name":"Terms of Use","uri":"/terms-conditions/"},{"name":"Code of Conduct","uri":"/code-of-conduct/"},{"name":"Responsible Disclosure","uri":"/responsible-disclosure-policy/"}],"company_info":"Top10VPN.com is operated by PrivacyCo Ltd. | © 2016-{{fe_year}}. All rights reserved."},"back_to_top":{"back_to_top":"Back to top"},"cookie_bar":{"uses_cookies":"By using our website you give consent to the use of cookies. \u003ca href=\"/cookie-policy/\"\u003eDetails\u003c/a\u003e.","btn_txt":"OK"}}},"paths":{"about":"about","best_vpn":"best-vpn","guides":"guides","reviews":"reviews","vpn_setup":"vpn-setup","what_is_a_vpn":"what-is-a-vpn","tools":"tools","vpn_comparison":"vpn-comparison","vpn_experts":"vpn-experts"},"related_articles":"Related guides","supporting_authors":{"additional_testing":"Additional Testing by {{fe_authorname}}","additional_research":"Additional Research by {{fe_authorname}}","fact_checked":"Fact-checked by {{fe_authorname}}"},"thumbs_feedback":{"main_prompt":"Was this content helpful?","feedback_reason":"What is the reason for your feedback?","textarea_placeholder":"Please tell us what you like or dislike on this page","btn_cancel":"Cancel","btn_submit":"Submit feedback","success_message":"Thanks for your feedback!","leave_trustpilot_review":"Leave us a review on \u003ca href=\"https://uk.trustpilot.com/review/www.top10vpn.com?b=MTQ1NTcyNzU1NDczN3w1NmM0YTNjMjAwMDBmZjAwMDkzYzVmMDc\" target=\"_blank\"\u003eTrustpilot\u003c/a\u003e"},"table_of_contents":"Table of Contents","see_all":"See all"},"placeholders":{"totalProductCount":{"value":61,"format":"number"},"totalProviderCount":{"value":61,"format":"number"},"totalUserReviews":{"value":4749,"format":"number"},"totalUserReviewsCount":{"value":4749,"format":"number"},"globalProviderCount":{"value":49,"format":"number"},"globalProductCount":{"value":61,"format":"number"},"androidtvvpncount":{"value":35,"format":"number"}},"breadcrumbs":{"path":[{"name":"What Is a VPN?","url":"/vpn-explained/"}],"page_name":"Types Of VPN"},"seo":{"title":"The 4 Different Types of VPN Explained (and When to Use Them)","metadesc":"VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them.","canonical":"","twitter":{"title":"The 4 Different Types of VPN Explained (and When to Use Them)","image":"https://www.top10vpn.com/images/2024/10/VPN-Types-tw.jpg","description":"VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them."},"opengraph":{"title":"The 4 Different Types of VPN Explained (and When to Use Them)","image":"https://www.top10vpn.com/images/2024/10/VPN-Types-fb.jpg","description":"VPNs fall into 4 main types: personal, remote access, mobile, and site-to-site. In this guide, you'll find out how each VPN type works and when to use them."},"robots":{"noindex":false,"nofollow":false},"hreflang":[{"lang":"en","href":"/what-is-a-vpn/vpn-types/"},{"lang":"x-default","href":"/what-is-a-vpn/vpn-types/"},{"lang":"es","href":"/es/que-es-una-vpn/tipos-de-vpn/"},{"lang":"nl","href":"/nl/wat-is-een-vpn/vpn-typen/"},{"lang":"it","href":"/it/cosa-e-una-vpn/tipi-di-vpn/"},{"lang":"pl","href":"/pl/vpn-co-to-jest/rodzaje-vpn/"},{"lang":"sv","href":"/sv/vad-ar-en-vpn/typer-av-vpn/"},{"lang":"fr","href":"/fr/cest-quoi-un-vpn/type-de-vpn/"},{"lang":"pt","href":"/pt/o-que-e-uma-vpn/tipos-de-vpn/"},{"lang":"de","href":"/de/was-ist-ein-vpn/vpn-typen/"},{"lang":"ko","href":"/ko/what-is-a-vpn/vpn-types/"}]},"xr_data":{"config":{"primary":"USD","additional":["GBP","AUD","CAD","EUR","SGD"]},"content":{"body":"\u003cp\u003e\u003ca href=\"/currency-conversions/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"\u003eConverted price\u003c/a\u003e in other popular currencies:\u003c/p\u003e\n"},"rates":[{"currency":"AUD","rate":1.61135},{"currency":"CAD","rate":1.44665},{"currency":"EUR","rate":0.96355},{"currency":"GBP","rate":0.795355},{"currency":"SGD","rate":1.3513},{"currency":"USD","rate":1}]},"authors":{"main_author":{"first_name":"JP","last_name":"Jones","display_format":"{{fe_forename}} {{fe_surname}}","photo":{"url":"https://www.top10vpn.com/images/2022/12/expertbio-JP-small-opt.jpeg","alt":"JP Jone's profile image"},"slug":"jpjones","expert":{"is_expert":true,"snippet_clean":"JP Jones is our CTO. He has over 25 years of software engineering and networking experience, and oversees all technical aspects of our VPN testing process."}},"additional_authors":[],"supporting_authors":[{"author":{"first_name":"Simon","last_name":"Migliano","display_format":"{{fe_forename}} {{fe_surname}}","slug":"simonmigliano","expert":{"is_expert":true,"snippet_clean":"Simon Migliano is a recognized world expert in VPNs. He's tested hundreds of VPN services and his research has featured on the BBC, The New York Times and more."}},"type":"fact"}]},"chapters":[{"__typename":"UT_Chapters_Type_DefaultChapter","chapter_jumplinks":{"label":"Different Types of VPNs","show_jumplink":true},"content":"\u003cp\u003eHere’s a table comparing the four main VPN types:\u003c/p\u003e\n\u003ctable class=\"table-default table-not-stacked\"\u003e\n\u003cthead\u003e\n\u003ctr\u003e\n\u003cth style=\"min-width: 147px;\"\u003e\u003c/th\u003e\n\u003cth style=\"min-width: 147px;\"\u003e\u003cb\u003e\u003ca href=\"#remote-access-vpns\"\u003eRemote Access VPN\u003c/a\u003e\u003c/b\u003e\u003c/th\u003e\n\u003cth style=\"min-width: 147px;\"\u003e\u003cb\u003e\u003ca href=\"#personal-vpn\"\u003ePersonal VPN\u003c/a\u003e\u003c/b\u003e\u003c/th\u003e\n\u003cth style=\"min-width: 147px;\"\u003e\u003cb\u003e\u003ca href=\"#mobile-vpns\"\u003eMobile VPN\u003c/a\u003e\u003c/b\u003e\u003c/th\u003e\n\u003cth style=\"min-width: 147px;\"\u003e\u003cb\u003e\u003ca href=\"#site-to-site-vpns\"\u003eSite-to-Site VPN\u003c/a\u003e\u003c/b\u003e\u003c/th\u003e\n\u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eWho Connects Where?\u003c/b\u003e\u003c/td\u003e\n\u003ctd data-header=\"Remote Access VPN\"\u003eUser to a private network\u003c/td\u003e\n\u003ctd data-header=\"Personal VPN\"\u003eUser to the internet via a remote server\u003c/td\u003e\n\u003ctd data-header=\"Mobile VPN\"\u003eUser to a private network\u003c/td\u003e\n\u003ctd data-header=\"Site-to-Site VPN\"\u003eNetwork to network\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eSoftware Required?\u003c/b\u003e\u003c/td\u003e\n\u003ctd data-header=\"Remote Access VPN\"\u003eYes / OS config change\u003c/td\u003e\n\u003ctd data-header=\"Personal VPN\"\u003eYes\u003c/td\u003e\n\u003ctd data-header=\"Mobile VPN\"\u003eYes / OS config change\u003c/td\u003e\n\u003ctd data-header=\"Site-to-Site VPN\"\u003eNot for end-users\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eBest Used For\u003c/b\u003e\u003c/td\u003e\n\u003ctd data-header=\"Remote Access VPN\"\u003eConnecting to private networks from another location\u003c/td\u003e\n\u003ctd data-header=\"Personal VPN\"\u003eProtecting privacy and bypassing geo-restrictions\u003c/td\u003e\n\u003ctd data-header=\"Mobile VPN\"\u003eRemote private network access with an unstable internet connection\u003c/td\u003e\n\u003ctd data-header=\"Site-to-Site VPN\"\u003eConnecting multiple networks to each other\u003c/td\u003e\n\u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n\u003cp class=\"spacer\"\u003e\n\u003cp\u003eIn this guide, we explain each of these personal and business VPN types in more detail. We cover how they work, what they are useful for, and provide examples of products in each category.\u003c/p\u003e\n","heading_settings":{"content":"Different Types of VPNs","level":2,"looks_like":2,"custom_id":""},"highlight_chapter":false,"type":"chapter"},{"__typename":"UT_Chapters_Type_CollapsibleContent","chapter_jumplinks":{"label":"1. Remote Access VPNs","show_jumplink":true},"content":"\u003cp\u003e\u003cimg loading=\"lazy\" decoding=\"async\" src=\"/assets/2021/08/Remote-Access-VPNs.jpg\" alt=\"Diagram explaining how remote access VPN services work\" width=\"1180\" height=\"386\" class=\"size-full wp-image-201973\" /\u003e\u003c/p\u003e\n","heading_settings":{"content":"1. Remote Access VPNs","level":3,"looks_like":3,"custom_id":"remote-access"},"highlight_chapter":false,"type":"chapter_w_collapsible","subchapters":[{"subheading":"What Is a Remote Access VPN?","heading_settings":{"content":"What Is a Remote Access VPN?","level":4,"looks_like":4,"custom_id":"remote-access-what"},"content":"\u003cp\u003eA remote access VPN, sometimes called client-based VPNs or client-to-server VPNs, let you use the internet to securely connect to a private network, such as your home network or your company’s office network, from another location.\u003c/p\u003e\n\u003cp\u003eAt one end of the scale, big tech companies like Fortinet, Palo Alto and Cisco all offer sophisticated and expensive software solutions aimed at larger businesses.\u003c/p\u003e\n\u003cp\u003eAt the other, it\u0026#8217;s also perfectly possible to \u003ca href=\"/vpn-setup/home-vpn-server/\"\u003eset up your own VPN server\u003c/a\u003e for free if you have the appropriate hardware to hand.\u003c/p\u003e\n\u003cp\u003eWe found \u003ca href=\"https://tailscale.com/\" rel=\"noopener\" target=\"_blank\"\u003eTailScale\u003c/a\u003e the easiest way to create a remote access VPN for.\u003c/p\u003e\n\u003cdiv id=\"attachment_1634083\" style=\"width: 810px\" class=\"wp-caption alignleft\"\u003e\u003cimg aria-describedby=\"caption-attachment-1634083\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1634083 size-full\" src=\"/assets/2024/10/Tailscale-HighRes.webp\" alt=\"Screenshot of browser-based the TailScale admin console after we connected several of our devices\" width=\"800\" height=\"569\" /\u003e\u003cp id=\"caption-attachment-1634083\" class=\"wp-caption-text\"\u003eScreenshot of the browser-based TailScale admin console after we connected several of our devices.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003eIn fact, we liked TailScale so much that one of our reviewers now runs it on a Raspberry Pi at his mother\u0026#8217;s house, allowing him to \u003cb\u003efix issues with her network remotely\u003c/b\u003e. What used to be difficult technical support calls are now quick, simple fixes.\u003c/p\u003e\n\u003cp\u003eOnce installed on your device, a remote access VPN client creates an encrypted tunnel between you and the private network you want to access.\u003c/p\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e Remote access VPNs are also sometimes called \u003cb\u003eclient-based VPNs\u003c/b\u003e or \u003cb\u003eclient-to-server VPNs\u003c/b\u003e.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"What Is It?","type":"standard"},{"subheading":"When to Use a Remote Access VPN","heading_settings":{"content":"When to Use a Remote Access VPN","level":4,"looks_like":4,"custom_id":"remote-access-when"},"content":"\u003cp\u003eRemote access VPNs can be used in different ways, for example:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cb\u003eTraveling for work\u003c/b\u003e: You can use a remote access VPN to connect securely to your company network on your hotel WiFi. Not only are you able to access all your usual files and software, but the VPN also protects your data from security threats on public networks.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eWorking from home\u003c/b\u003e: This type of VPN can provide secure access to sensitive company systems that have been locked down by IP address. Your computer simply functions as if it were on the corporate network, with all the data encrypted as it travels across the public internet. \u003c/li\u003e\n\u003cli\u003e\u003cb\u003eAccess to personal files\u003c/b\u003e: A remote access VPN will allow you to directly access files on any device connected to your home network, such as photos saved to your desktop PC or music and movie files on a home media server, from wherever you are.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eSecurely access networked devices\u003c/b\u003e: As well as files, this type of VPN will allow you to securely control and monitor IoT devices on your network, such as surveillance cameras or smart home systems, which can otherwise be vulnerable to attack, while you are away.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--orange\"\u003e\n\u003cp\u003e\u003cspan style=\"color:#5E2314;\"\u003e\u003cb\u003eEXPERT TIP:\u003c/b\u003e\u003c/span\u003e While remote access VPNs are very useful, cloud storage might be a more straightforward alternative if all you want to do is to access files remotely. Cloud storage (such as Dropbox or Drive) uses an encrypted browser connection to protect your data, and is much easier to set up than a VPN.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"When To Use It","type":"standard"},{"subheading":"How Remote Access VPNs Work","heading_settings":{"content":"How Remote Access VPNs Work","level":4,"looks_like":4,"custom_id":"remote-access-how"},"content":"\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eHere’s exactly how a remote access VPN works:\u003c/b\u003e\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cb\u003eAuthentication\u003c/b\u003e: when you attempt to establish a VPN connection, the VPN server first validates your identity. Authentication methods include:\n\u003col class=\"alpha-lower\"\u003e\n\u003cli\u003eUsername and password\u003c/li\u003e\n\u003cli\u003eDigital certificates for automatic authentication\u003c/li\u003e\n\u003cli\u003eMulti-factor authentication (MFA) with some combination of Time-based One-Time Passwords (TOTP), hardware security keys (FIDO2/U2F) and biometric data (fingerprints, facial recognition)\u003c/li\u003e\n\u003cli\u003eSingle Sign-On (SSO)\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli id=\"remote-tunnel\"\u003e\u003cb\u003eTunnel establishment\u003c/b\u003e: after successful authentication, your VPN client and server negotiate and \u003ca href=\"/what-is-a-vpn/how-does-a-vpn-work/#the-individual-phases-of-a-vpn-connection\"\u003eestablish an encrypted tunnel\u003c/a\u003e. The specific steps depend on the \u003ca href=\"#vpn-protocols\"\u003eVPN protocol\u003c/a\u003e you\u0026#8217;re using but typically include:\n\u003col class=\"alpha-lower\"\u003e\n\u003cli\u003eSharing encryption keys\u003c/li\u003e\n\u003cli\u003eAgreeing on encryption standards\u003c/li\u003e\n\u003cli\u003eSetting up the virtual network interface\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eIP assignment\u003c/b\u003e: the private network assigns you a virtual IP address.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eRemote access\u003c/b\u003e: you can now access permitted resources on the remote private network through the VPN server as if you were in the same location.\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/div\u003e\n\u003cp\u003eTo use a remote access VPN on your device you typically need to install client software or configure your device’s operating system to connect to the VPN. There also needs to be a VPN server on the network end of the connection.\u003c/p\u003e\n\u003cdiv id=\"attachment_1634458\" style=\"width: 810px\" class=\"wp-caption alignleft\"\u003e\u003cimg aria-describedby=\"caption-attachment-1634458\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1634458 size-full\" src=\"/assets/2024/10/WireGuard.webp\" alt=\"WireGuard tunnel management interface on macOS\" width=\"800\" height=\"569\" /\u003e\u003cp id=\"caption-attachment-1634458\" class=\"wp-caption-text\"\u003eWireGuard tunnel management interface on macOS.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003eYou can have as many client devices as you like and for as many users as need to remotely access the network.\u003c/p\u003e\n\u003cp\u003eBetween them, the client software and VPN server manage the VPN connection.\u003c/p\u003e\n\u003cp\u003eThere are many versions of remote access VPN but fundamentally, the choice is paying for a service or managing it yourself.\u003c/p\u003e\n\u003cp\u003eIf you\u0026#8217;re doing it yourself, it basically boils down to how you set up the VPN server that acts as the gateway to the private network you want to access. Popular options include:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eAn always-on PC, server or Raspberry Pi-style device running WireGuard or OpenVPN\u003c/li\u003e\n\u003cli\u003eA flashed router with WireGuard or OpenVPN installed\u003c/li\u003e\n\u003cli\u003eTailScale on a PC, mobile device or Raspberry Pi\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eThe remote access VPN market is increasingly complex, particularly at the enterprise level. \u003c/p\u003e\n\u003cp\u003eWhile traditional VPN services remain available, vendors now heavily promote more expensive alternatives like \u003ca href=\"https://www.zscaler.com/resources/security-terms-glossary/what-is-zero-trust-network-access\" rel=\"noopener\" target=\"_blank\"\u003eZero Trust Network Access (ZTNA)\u003c/a\u003e, \u003ca href=\"https://www.cloudflare.com/en-gb/learning/access-management/software-defined-perimeter/\" rel=\"noopener\" target=\"_blank\"\u003eSoftware Defined Perimeter (SDP)\u003c/a\u003e, and \u003ca href=\"https://www.goodaccess.com/blog/5-things-you-need-to-know-about-sase\" rel=\"noopener\" target=\"_blank\"\u003eSecure Access Service Edge (SASE)\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eHere are some main types of remote access VPN as a service:\u003c/p\u003e\n\u003cul class=\"columns-2\"\u003e\n\u003cli\u003eClient-to-site VPN\u003c/li\u003e\n\u003cli\u003eCloud VPN\u003c/li\u003e\n\u003cli\u003eSSL VPN Portal\u003c/li\u003e\n\u003cli\u003eSSL VPN Tunnel\u003c/li\u003e\n\u003cli\u003eNordVPN\u0026#8217;s Meshnet feature\u003c/li\u003e\n\u003c/ul\u003e\n","add_to_jl":true,"jumplink_text_override":"How It Works","type":"standard"},{"subheading":"Examples of Remote Access VPNs","heading_settings":{"content":"Examples of Remote Access VPNs","level":4,"looks_like":4,"custom_id":"remote-access-examples"},"content":"\u003cp\u003eExamples of remote access VPNs for business include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://openvpn.net/for/remote-access/\" rel=\"noopener\" target=\"_blank\"\u003eAccess Server by OpenVPN\u003c/a\u003e, which is free for up to two simultaneous VPN connections. \u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.cisco.com/site/us/en/products/security/secure-client/index.html\" rel=\"noopener\" target=\"_blank\"\u003eCisco AnyConnect\u003c/a\u003e, which integrates with Cisco’s enterprise security solutions.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.perimeter81.com/lp/remote-access-secure-connection\" rel=\"noopener\" target=\"_blank\"\u003ePerimeter 81 Remote Access VPN\u003c/a\u003e.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.checkpoint.com/quantum/remote-access-vpn/\" rel=\"noopener\" target=\"_blank\"\u003eCheckpoint Remote Access VPN\u003c/a\u003e, which comes as an IPSec Client and an SSL Portal.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://nordlayer.com/\"\u003eNordLayer\u003c/a\u003e, from the same company that operates highly-rated personal VPN service NordVPN.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eOther popular remote access VPN products include Fortinet Forticlient, Palo Alto Global Protect, Pulse Secure, Sonicwall SSL VPN, Juniper Secure Connect.\u003c/p\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE\u003c/b\u003e: This type of VPN is typically licensed according to how many simultaneous users need to access the VPN.\u003c/p\u003e\n\u003c/div\u003e\n\u003cp\u003eAn example of a self-managed remote access VPN is what we have set up for our own team to allow for hybrid working.\u003c/p\u003e\n\u003cp\u003eWe have a WireGuard VPN server running on a Linux box in our office. WireGuard was the logical choice for us as it\u0026#8217;s built into Linux, and is simpler and faster than OpenVPN.\u003c/p\u003e\n\u003cp\u003eThe VPN client software installed on team members\u0026#8217; laptops is also free and open source: TunSafe for Windows users and the official WireGuard client for our Mac users.\u003c/p\u003e\n\u003cp\u003eThis allows us to provide access to our back-end systems and other shared resources for our team when they work remotely without compromising security.\u003c/p\u003e\n\u003cp\u003eOur set up is free, highly secure and under the complete control of our sysadmins, with none of the risk of relying on a third party.\u003c/p\u003e\n","add_to_jl":true,"jumplink_text_override":"VPN Examples","type":"standard"}]},{"__typename":"UT_Chapters_Type_CollapsibleContent","chapter_jumplinks":{"label":"2. Mobile VPNs","show_jumplink":true},"content":"\u003cp\u003e\u003cimg loading=\"lazy\" decoding=\"async\" src=\"/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2021%2F08%2FMobile-VPN-services.jpg\u0026w=1920\u0026q=80\" alt=\"Diagram explaining how mobile VPN services work\" width=\"1180\" height=\"452\" class=\"size-full wp-image-201967\" /\u003e\u003c/p\u003e\n","heading_settings":{"content":"2. Mobile VPNs","level":3,"looks_like":3,"custom_id":"mobile-vpn"},"highlight_chapter":false,"type":"chapter_w_collapsible","subchapters":[{"subheading":"What is a Mobile VPN?","heading_settings":{"content":"What is a Mobile VPN?","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eA mobile VPN, also known as an \u0026#8220;Always-on VPN\u0026#8221;, is a better option than a remote access VPN if the user is unlikely to have a stable connection, on the same network, for the entire session.\u003c/p\u003e\n\u003cp\u003eWith a mobile VPN, the VPN connection persists even if the user switches WiFi or cellular network, loses connectivity, or switches their device off for a while.\u003c/p\u003e\n\u003cdiv id=\"attachment_1634893\" style=\"width: 810px\" class=\"wp-caption alignleft\"\u003e\u003cimg aria-describedby=\"caption-attachment-1634893\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1634893 size-full\" src=\"/assets/2024/10/mobile-vpn-opt-2.webp\" alt=\"Mobile VPN service offered by Bittium\" width=\"600\" height=\"569\" /\u003e\u003cp id=\"caption-attachment-1634893\" class=\"wp-caption-text\"\u003eMobile VPN service offered by Bittium.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003eMobile VPNs tend to be offered by the same big tech companies that also provide standard \u003ca href=\"#remote-access\"\u003eremote access VPN\u003c/a\u003e services.\u003c/p\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE\u003c/b\u003e: A mobile VPN can be used with \u003cb\u003eany\u003c/b\u003e device and \u003cb\u003eany\u003c/b\u003e connection: it doesn’t have to be a mobile phone on a mobile network.\u003c/p\u003e\n\u003cp\u003eConfusingly, the ExpressVPN or PIA app on your smartphone is \u003cb\u003enot\u003c/b\u003e a mobile VPN, rather it\u0026#8217;s the mobile client for your \u003ca href=\"#personal-vpn\"\u003epersonal VPN service\u003c/a\u003e.\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"What Is It?","type":"standard"},{"subheading":"When to Use a Mobile VPN","heading_settings":{"content":"When to Use a Mobile VPN","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eYou should use a mobile VPN if you are constantly on the move and it\u0026#8217;s critical that you maintain an uninterrupted connection to a remote private network.\u003c/p\u003e\n\u003cp\u003eThis type of VPN also provides the convenience of a connection that adapts to network changes.\u003c/p\u003e\n\u003cp\u003eFor example:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cb\u003eFirst responders\u003c/b\u003e like firefighters and police officers rely on mobile VPNs to maintain access to critical resources such as vehicle databases, location tracking systems, and emergency dispatch applications as they move throughout their service area.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cb\u003eRemote professionals\u003c/b\u003e in regions with unreliable internet can use a mobile VPN to maintain a secure office connection throughout the workday. This type of VPN avoids the inconvenience of constant re-authentication or the challenge of whitelisting revolving IP addresses.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n","add_to_jl":true,"jumplink_text_override":"When To Use","type":"standard"},{"subheading":"How Mobile VPNs Work","heading_settings":{"content":"How Mobile VPNs Work","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eFrom a user\u0026#8217;s perspective, connecting to and using a mobile VPN is typically much the same as with a \u003ca href=\"#remote-access-how\"\u003eremote access VPN\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eThe main differences are technical, using specialized protocols to maintain your VPN connection as you move between networks, whether switching cellular towers or changing from WiFi to mobile data.\u003c/p\u003e\n\u003cp\u003eMobile VPNs will typically use UDP-based protocols, such as \u003ca href=\"#ikev2\"\u003eIKEv2\u003c/a\u003e, for the same reason that they are usually the default option in the mobile apps of personal VPN services.\u003c/p\u003e\n\u003cp\u003eThese VPN protocols are more resilient to network changes than TCP-based alternatives, as they can quickly re-establish connections without a full \u003ca \nhref=\"/what-is-a-vpn/how-does-a-vpn-work/#vpn-handshakes\"\u003eVPN handshake\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eFor an overview of how these types of VPN function, refer to our explanation of \u003ca href=\"#remote-access-how\"\u003ehow a remote access VPN works\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eNow, let\u0026#8217;s delve into the aspects unique to mobile VPNs:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cb\u003eNetwork switching process\u003c/b\u003e\n\u003col\u003e\n\u003cli\u003eYour device switches networks (e.g., from WiFi to cellular), changing IP address in the process.\u003c/li\u003e\n\u003cli\u003eYour VPN client detects the network change.\u003c/li\u003e\n\u003cli\u003eThe client sends a reconnection request using the unique ID assigned to the session.\u003c/li\u003e\n\u003cli\u003eThe VPN gateway validates the session and seamlessly resumes the connection.\u003c/li\u003e\n\u003cli\u003eEven if you switch off your device to save battery, the VPN connection will still be active when it\u0026#8217;s turned back on.\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eOptimization techniques\u003c/b\u003e\n\u003col\u003e\n\u003cli\u003e\u003cb\u003eConnection durability\u003c/b\u003e: tolerating brief network interruptions\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eFast reconnections\u003c/b\u003e: minimizing handshake overhead\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eData compression\u003c/b\u003e: reducing data transfer for slower networks\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eQuality of Service\u003c/b\u003e: \u003ca href=\"https://www.fortinet.com/uk/resources/cyberglossary/qos-quality-of-service\" rel=\"noopener\" target=\"_blank\"\u003eQoS mechanisms\u003c/a\u003e ensure critical applications remain usable even in challenging network conditions.\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eCommon mobile VPN challenges and solutions\u003c/b\u003e\n\u003col\u003e\n\u003cli\u003e\u003cb\u003eBattery impact\u003c/b\u003e: continuous connection monitoring can drain the battery, requiring optimized polling intervals and efficient reconnection algorithms.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eData usage\u003c/b\u003e: \u003ca href=\"https://en.wikipedia.org/wiki/Keepalive\" rel=\"noopener\" target=\"_blank\"\u003eKeepalive\u003c/a\u003e packets consume data, requiring minimization and compression.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003ePerformance\u003c/b\u003e: Constant reconnections increase encryption overhead and latency, which is mitigated by hardware acceleration and optimized protocols.\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eCommon mobile VPN additional features\u003c/b\u003e\n\u003col\u003e\n\u003cli\u003e\u003ca href=\"/guides/vpn-split-tunneling/\"\u003eSplit tunneling\u003c/a\u003e for selective traffic routing.\u003c/li\u003e\n\u003cli\u003eAutomatic connection rules based on networks.\u003c/li\u003e\n\u003cli\u003eIntegration with \u003ca href=\"https://www.ibm.com/topics/mobile-device-management\" rel=\"noopener\" target=\"_blank\"\u003eMobile Device Management (MDM)\u003c/a\u003e.\u003c/li\u003e\n\u003cli\u003ePerformance analytics and troubleshooting tools.\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n","add_to_jl":true,"jumplink_text_override":"How It Works","type":"standard"},{"subheading":"Examples of Mobile VPNs","heading_settings":{"content":"Examples of Mobile VPNs","level":4,"looks_like":5,"custom_id":""},"content":"\u003cp\u003eMobile VPN examples include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.bittium.com/secure-communications-connectivity/bittium-safemove-mobile-vpn\" rel=\"noopener\" target=\"_blank\"\u003eBittium SafeMove Mobile VPN\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.cisco.com/c/en/us/products/ios-nx-os-software/mobile-vpn/index.html\" rel=\"noopener\" target=\"_blank\"\u003eCisco Mobile VPN\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.ivanti.com/en-gb/products/connect-secure-vpn\" rel=\"noopener\" target=\"_blank\"\u003eIvanti Connect Secure VPN\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://learn.microsoft.com/en-us/windows-server/remote/remote-access/overview-always-on-vpn\" rel=\"noopener\" target=\"_blank\"\u003eMicrosoft Always On\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.digi.com/blog/post/digi-mobile-vpn-secure-connections-for-police\"\u003eDigi Mobile VPN\u003c/a\u003e is specifically aimed at first responders.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.absolute.com/platform/secure-access/\" rel=\"noopener\" target=\"_blank\"\u003eAbsolute Secure Access\u003c/a\u003e, previously known as Netmotion Mobility VPN.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.radio-ip.com/en/\" rel=\"noopener\" target=\"_blank\"\u003eRadio IP software:\u003c/a\u003e enables mobile VPNs across all wireless network technologies.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE\u003c/b\u003e: Many personal VPNs offer mobile versions of their software that you can download onto your cell phone or tablet. These are \u003cb\u003enot the same as mobile VPNs\u003c/b\u003e. Mobile VPNs are usually a form of business VPN, used by employees to access the company network.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"VPN Examples","type":"standard"}]},{"__typename":"UT_Chapters_Type_CollapsibleContent","chapter_jumplinks":{"label":"3. Site-to-Site VPNs","show_jumplink":true},"content":"\u003cp\u003e\u003cimg loading=\"lazy\" decoding=\"async\" src=\"/assets/2021/08/Site-to-Site-VPNs.jpg\" alt=\"Diagram explaining how site-to-site VPN services work\" width=\"1180\" height=\"386\" class=\"size-full wp-image-201976\" /\u003e\u003c/p\u003e\n","heading_settings":{"content":"3. Site-to-Site VPNs","level":3,"looks_like":3,"custom_id":"site-to-site"},"highlight_chapter":false,"type":"chapter_w_collapsible","subchapters":[{"subheading":"What Is a Site-to-Site VPN?","heading_settings":{"content":"What Is a Site-to-Site VPN?","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eA site-to-site VPN is used to connect entire networks in different locations, such as linking the corporate networks of a company\u0026#8217;s multiple offices.\u003c/p\u003e\n\u003cp\u003eUnlike \u003ca href=\"#remote-access\"\u003eremote access VPNs\u003c/a\u003e that connect individual users to a network, site-to-site VPNs bridge two or more separate local area networks (LANs) over the internet.\u003c/p\u003e\n\u003cp\u003eThis type of VPN enables offices to share resources and communicate seamlessly as if they were part of the same network, while keeping communications secure through encryption.\u003c/p\u003e\n\u003cp\u003eIt can also extend to trusted business partners, allowing external companies to access parts of your network securely.\u003c/p\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e Site-to-site VPNs are also called \u003cb\u003erouter-to-router VPNs\u003c/b\u003e or \u003cb\u003enetwork-based VPNs\u003c/b\u003e, as they work by connecting entire networks rather than individual users.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"What Is It?","type":"standard"},{"subheading":"When to Use a Site-to-Site VPN","heading_settings":{"content":"When to Use a Site-to-Site VPN","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eA site-to-site VPN is ideal when you need to connect multiple networks securely, for instance:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cb\u003eIntranet-based VPN:\u003c/b\u003e This type of site-to-site VPN connects different branches of the same company into a unified private wide area network (WAN). Employees from each location can access shared resources across all branches seamlessly.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eExtranet-based VPN:\u003c/b\u003e This allows companies to securely share specific resources with external business partners by connecting their respective networks. It’s useful for suppliers, contractors, and collaborative ventures.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--orange\"\u003e\n\u003cp\u003e\u003cspan style=\"color:#5E2314;\"\u003e\u003cb\u003eEXPERT TIP:\u003c/b\u003e\u003c/span\u003e You can combine a site-to-site VPN with a remote access VPN, enabling secure network connections between offices and allowing individual employees to connect remotely.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"When to Use","type":"standard"},{"subheading":"How Site-to-Site VPNs Work","heading_settings":{"content":"How Site-to-Site VPNs Work","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eThere are three main ways a site-to-site VPN can be implemented, via:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003ca href=\"#ipsec\"\u003eIPsec tunnel\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#dmvpn\"\u003eDynamic MultiPoint VPN (DMVPN)\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#l3vpn\"\u003eLayer 3 VPN (L3VPN)\u003c/a\u003e\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch5 id=\"ipsec\"\u003eIPsec tunnel\u003c/h5\u003e\n\u003cp\u003eIPsec tunnels create encrypted pathways between networks, implemented through routers at connected sites. This method is also known as a router-to-router VPN and comes in two variants:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eA \u003cb\u003eroute-based IPsec tunnel\u003c/b\u003e acts as a virtual wire between networks, allowing all traffic to pass through.\u003c/li\u003e\n\u003cli\u003eA \u003cb\u003epolicy-based IPsec tunnel:\u003c/b\u003e employs specific rules to control the flow of traffic between IP networks.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ctable class=\"table-default\"\u003e\n\u003cthead\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--green-70);\"\u003e\u003cb\u003ePros\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--orange-70);\"\u003e\u003cb\u003eCons\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eWidely supported by most firewalls and routers\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003ePoint-to-point nature limits scalability\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eStrong security through encryption\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eCan become complex to manage in large networks\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eRelatively simple to implement for small-scale deployments\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eRelies on internet connectivity, which may affect performance\u003c/td\u003e\n\u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n\u003cp class=\"spacer\"\u003e\n\u003ch5 id=\"dmvpn\"\u003eDynamic MultiPoint VPN (DMVPN)\u003c/h5\u003e\n\u003cp\u003eDMVPN addresses the scalability limitations of traditional IPsec tunnels.\u003c/p\u003e\n\u003cp\u003eThis Cisco-proprietary technology is particularly suitable for large organizations with numerous sites, which would otherwise might need thousands of individual router-to-router IPSec connections.\u003c/p\u003e\n\u003cp\u003eDMVPN instead employs a hub-and-spoke architecture where:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eBranch sites (spokes) connect to a central location (hub).\u003c/li\u003e\n\u003cli\u003eDynamic IP addressing is supported.\u003c/li\u003e\n\u003cli\u003eDirect spoke-to-spoke connections are possible with additional configuration.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE\u003c/b\u003e: DMVPN requires Cisco routers. Here\u0026#8217;s a \u003ca href=\"https://www.cisco.com/c/dam/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/dmvpn_design_guide.pdf\" rel=\"noopener\" target=\"_blank\"\u003ecomprehensive guide to designing a DMVPN architecture\u003c/a\u003e.\u003c/p\u003e\n\u003c/div\u003e\n\u003ctable class=\"table-default\"\u003e\n\u003cthead\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--green-70);\"\u003e\u003cb\u003ePros\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--orange-70);\"\u003e\u003cb\u003eCons\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eHighly scalable for large networks\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eVendor-specific (Cisco only)\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eSupports dynamic addressing\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eMay require specialized expertise to implement and manage\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eReduces configuration complexity in hub-and-spoke topologies\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eStill subject to internet performance limitations\u003c/td\u003e\n\u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n\u003cp class=\"spacer\"\u003e\n\u003ch5 id=\"l3vpn\"\u003eMPLS-based Layer 3 VPN (L3VPN)\u003c/h5\u003e\n\u003cp\u003eThe IPsec and DMVPN approaches both sit on top of the internet, which means they can’t guarantee consistent performance.\u003c/p\u003e\n\u003cp\u003eL3VPNs instead operate at the network layer of the \u003ca href=\"https://en.wikipedia.org/wiki/OSI_model\" rel=\"noopener\" target=\"_blank\"\u003eOSI model\u003c/a\u003e and use Multi-Protocol Label Switching to provide guaranteed quality of service across various transport media.\u003c/p\u003e\n\u003cp\u003eThese are typically offered by service providers as managed WAN solutions.\u003c/p\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e L3VPNs are also sometimes known as Virtual Private Routed Network (VPRNs).\u003c/p\u003e\n\u003c/div\u003e\n\u003ctable class=\"table-default\"\u003e\n\u003cthead\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--green-70);\"\u003e\u003cb\u003ePros\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003cth\u003e\u003cspan style=\"color: var(--orange-70);\"\u003e\u003cb\u003eCons\u003c/b\u003e\u003c/span\u003e\u003c/th\u003e\n\u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eGuaranteed performance and QoS\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eSignificantly higher cost compared to internet-based VPNs\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eTraffic prioritization capabilities\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eLimited flexibility in terms of service changes\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eProvider-managed infrastructure\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003eDependency on service provider coverage\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd data-header=\"Pros\"\u003eProtocol and transport medium agnostic\u003c/td\u003e\n\u003ctd data-header=\"Cons\"\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n","add_to_jl":true,"jumplink_text_override":"How It Works","type":"standard"},{"subheading":"Examples of Site-to-Site VPNs","heading_settings":{"content":"Examples of Site-to-Site VPNs","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eExamples of site-to-site VPN products include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://openvpn.net/vpn-server-resources/site-to-site-routing-explained-in-detail/\" rel=\"noopener\" target=\"_blank\"\u003eOpenVPN Access Server\u003c/a\u003e – Allows for secure site-to-site connectivity using the OpenVPN protocol.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security/index.html\" rel=\"noopener\" target=\"_blank\"\u003eCisco VPN Solutions\u003c/a\u003e – A comprehensive suite of VPN technologies including DMVPN and IPsec options for enterprise networks.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://aws.amazon.com/vpn/\" rel=\"noopener\" target=\"_blank\"\u003eAWS Site-to-Site VPN\u003c/a\u003e – Enables secure, scalable connectivity between on-premises data centers and Amazon Virtual Private Cloud (VPC).\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.fortinet.com/products/sd-wan\" rel=\"noopener\" target=\"_blank\"\u003eFortinet SD-WAN\u003c/a\u003e – Provides secure site-to-site connectivity with advanced traffic optimization and security features.\u003c/li\u003e\n\u003c/ul\u003e\n","add_to_jl":true,"jumplink_text_override":"VPN Examples","type":"standard"}]},{"__typename":"UT_Chapters_Type_CollapsibleContent","chapter_jumplinks":{"label":"4. Personal VPN Services","show_jumplink":true},"content":"\u003cp\u003e\u003cimg loading=\"lazy\" decoding=\"async\" src=\"/assets/2021/08/Personal-VPN-Services.jpg\" alt=\"Diagram explaining how personal VPN services work\" width=\"1180\" height=\"390\" class=\"size-full wp-image-201970\" /\u003e\u003c/p\u003e\n","heading_settings":{"content":"4. Personal VPN Services","level":3,"looks_like":3,"custom_id":"personal-vpn"},"highlight_chapter":false,"type":"chapter_w_collapsible","subchapters":[{"subheading":"What is a Personal VPN?","heading_settings":{"content":"What is a Personal VPN?","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eA personal VPN service connects you to a remote VPN server, which can be anywhere in the world.\u003c/p\u003e\n\u003cp\u003eThis VPN server then acts like a middleman between your device and the online services you want to access.\u003c/p\u003e\n\u003cdiv id=\"attachment_1624690\" style=\"width: 810px\" class=\"wp-caption alignleft\"\u003e\u003cimg aria-describedby=\"caption-attachment-1624690\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1624690 size-full\" src=\"/assets/2024/09/nordvpn-germany-servers-scaled.webp\" alt=\"Connecting to a VPN server in Germany using a personal VPN service\" width=\"800\" height=\"569\" /\u003e\u003cp id=\"caption-attachment-1624690\" class=\"wp-caption-text\"\u003eHere we connected to a VPN server in Germany using a personal VPN service.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003eThe personal VPN – sometimes also called a ‘consumer’ or ‘commercial’ VPN – encrypts your connection, hides your identity online, and lets you spoof your geographic location.\u003c/p\u003e\n\u003cp\u003eA personal VPN service differs from a remote access VPN in that it doesn’t give you access to a private network. \u003c/p\u003e\n\u003cp\u003eInstead, \u003ca href=\"/what-is-a-vpn/how-does-a-vpn-work/\"\u003ea personal VPN works\u003c/a\u003e by giving you access to the \u003cb\u003epublic internet\u003c/b\u003e, but over an encrypted connection. \u003c/p\u003e\n\u003cp\u003ePersonal VPNs are what we mostly talk about on this website in our VPN \u003ca href=\"/reviews/\"\u003ereviews\u003c/a\u003e, \u003ca href=\"/best-vpn/\"\u003erecommendations\u003c/a\u003e and \u003ca href=\"/guides/\"\u003eguides\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eThe most common type of personal VPNs are the subscription services offered by providers such as \u003ca href=\"/reviews/expressvpn/\"\u003eExpressVPN\u003c/a\u003e, \u003ca href=\"/reviews/nordvpn/\"\u003eNordVPN\u003c/a\u003e and \u003ca href=\"/reviews/private-internet-access/\"\u003ePrivate Internet Access\u003c/a\u003e, or free services like \u003ca href=\"/reviews/windscribe/\"\u003eWindscribe\u003c/a\u003e and \u003ca href=\"/reviews/protonvpn/\"\u003eProton VPN\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eHowever, just as with \u003ca href=\"#remote-access\"\u003eremote access VPNs\u003c/a\u003e, it is possible to \u003ca href=\"/vpn-setup/home-vpn-server/\"\u003eset up your own personal VPN\u003c/a\u003e, although it is less common.\u003c/p\u003e\n","add_to_jl":true,"jumplink_text_override":"What Is It?","type":"standard"},{"subheading":"When to Use a Personal VPN Service","heading_settings":{"content":"When to Use a Personal VPN Service","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eThere are several reasons to use a personal VPN. Some of the most popular ones include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cb\u003eUnblocking georestricted content:\u003c/b\u003e A personal VPN allows you to stream movies and TV shows from different regions. For instance, connecting to a US-based VPN server allows you to access American Netflix\u0026#8217;s extensive content library from anywhere in the world.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eBypassing censorship:\u003c/b\u003e A personal VPN helps you overcome internet restrictions in countries with strict online censorship. Connecting to a VPN server in another country not only allows you to access blocked content but also protects your browsing activity from government surveillance.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eEnhancing internet privacy and performance\u003c/b\u003e: Personal VPNs prevent \u003ca href=\"/tools/who-is-my-isp/\"\u003eyour internet service provider (ISP)\u003c/a\u003e, governments, hackers, and anyone else from monitoring your online activity. This not only safeguards your privacy but can also prevent ISPs from \u003ca href=\"/guides/how-to-stop-internet-throttling/\"\u003ethrottling your connection speeds\u003c/a\u003e during high-bandwidth activities like streaming or gaming.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv id=\"attachment_1641915\" style=\"width: 1610px\" class=\"wp-caption alignnone\"\u003e\u003cimg aria-describedby=\"caption-attachment-1641915\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1641915 size-full\" src=\"/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F10%2Fwindscribe-free-unblocking-dazn-canada.webp\u0026w=1920\u0026q=80\" alt=\"Accessing DAZN Canada while connected to a Canadian Windscribe Free server\" width=\"1600\" height=\"1065\" /\u003e\u003cp id=\"caption-attachment-1641915\" class=\"wp-caption-text\"\u003ePersonal VPNs can be used to bypass geo-blocked content from anywhere.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003eFor a more extensive list, read our dedicated guide to \u003ca href=\"/what-is-a-vpn/what-are-vpns-used-for/\"\u003ewhat VPNs are used for\u003c/a\u003e.\u003c/p\u003e\n","add_to_jl":true,"jumplink_text_override":"When To Use It","type":"standard"},{"subheading":"How Personal VPNs Work","heading_settings":{"content":"How Personal VPNs Work","level":4,"looks_like":4,"custom_id":""},"content":"\u003cdiv id=\"attachment_1434613\" style=\"width: 610px\" class=\"wp-caption alignleft\"\u003e\u003cpicture\u003e\u003csource media=\"(max-width: 768px)\" srcset=\"https://www.top10vpn.com/images/2024/03/How-Do-VPNs-Work-m.webp\"\u003e\u003cimg aria-describedby=\"caption-attachment-1434613\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1434613 size-full\" src=\"/_next/image/?url=https%3A%2F%2Fwww.top10vpn.com%2Fimages%2F2024%2F03%2FHow-Do-VPNs-Work.webp\u0026w=1200\u0026q=80\" alt=\"Diagram explaining how VPN services encrypt and reroute web traffic\" width=\"600\" height=\"460\" /\u003e\u003c/picture\u003e\u003cp id=\"caption-attachment-1434613\" class=\"wp-caption-text\"\u003eDiagram explaining how VPN services encrypt and reroute web traffic.\u003c/p\u003e\u003c/div\u003e\n\u003cp\u003ePersonal VPNs from free or paid providers all work in the same way and simply require the installation of client software on your device.\u003c/p\u003e\n\u003cp\u003eThe VPN server network is managed by the provider and typically spans many global locations, either \u003ca href=\"/what-is-a-vpn/virtual-server-locations/\"\u003ephysically, virtually or both\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eSelf-managed, or \u0026#8220;roll your own\u0026#8221;, personal VPNs come in many forms and, as with \u003ca href=\"#remote-access-how\"\u003eremote access VPNs\u003c/a\u003e, require spinning up your own server.\u003c/p\u003e\n\u003cp\u003eUnless you rent a Virtual Private Server (VPS) in another country though, this type of personal VPN will lack the geolocation spoofing capacity of a VPN service.\u003c/p\u003e\n\u003cp\u003eOn the other hand, several methods of \u003ca href=\"/vpn-setup/home-vpn-server/\"\u003esetting up your own VPN server\u003c/a\u003e will provide you with both a remote access and a personal VPN.\u003c/p\u003e\n\u003cp\u003eHere’s how a personal VPN from a service provider works:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cb\u003eInstall software from your VPN service provider onto your device.\u003c/b\u003e\u003c/p\u003e\n\u003cp\u003ePersonal VPN apps are available on all sorts of devices, including smartphones, streaming devices and gaming consoles.\u003c/p\u003e\n\u003cp\u003eAlternatively, you can \u003ca href=\"/vpn-setup/router/\"\u003einstall the VPN software on your router\u003c/a\u003e to protect all the devices that connect to it.\u003c/li\u003e\n\u003c/p\u003e\n\u003cp\u003eThe set-up process typically requires some kind of one-time sign-in or use of an activation code.\u003c/p\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cb\u003eConnect to a server in your VPN provider’s network.\u003c/b\u003e\u003c/p\u003e\n\u003cp\u003ePersonal VPNs are very straightforward. You simply tap connect and authentication takes place automatically between the client and server.\u003c/p\u003e\n\u003cp\u003eThe tunnel is established \u003ca href=\"#remote-tunnel\"\u003ein the same way\u003c/a\u003e as with a remote access VPN.\u003c/p\u003e\n\u003cp\u003ePersonal VPNs tend to have large server networks to choose from. If you just want to protect your privacy, connect to a local server for the fastest speeds.\u003c/p\u003e\n\u003cp\u003eIf you want to unblock streaming content, choose a server in the country where that content is accessible.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cb\u003eBrowse the internet as normal.\u003c/b\u003e\u003c/p\u003e\n\u003cp\u003eWhile connected to the VPN, all your internet traffic is routed via the remote server you selected.\u003c/p\u003e\n\u003cp\u003eYour connection is encrypted, your IP address is replaced with that of the VPN server, and you can access geographically restricted content from other countries.\u003c/p\u003e\n\u003cp\u003eFor more detail on exactly how this works, see our breakdown of \u003ca href=\"/what-is-a-vpn/how-does-a-vpn-work/#the-individual-phases-of-a-vpn-connection\"\u003ethe phases of a VPN connection\u003c/a\u003e.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--orange\"\u003e\n\u003cp\u003e\u003cspan style=\"color:#5E2314;\"\u003e\u003cstrong\u003eEXPERT ADVICE:\u003c/strong\u003e\u003c/span\u003e It\u0026#8217;s important to choose the right VPN protocol. We recommend WireGuard for most situations, as it\u0026#8217;s fast, secure and open-source. Jump ahead to the section on \u003ca href=\"#vpn-protocols\"\u003eVPN protocols\u003c/a\u003e for more information about when it makes sense to try the alternatives.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"How It Works","type":"standard"},{"subheading":"Examples of Personal VPN Services","heading_settings":{"content":"Examples of Personal VPN Services","level":4,"looks_like":4,"custom_id":""},"content":"\u003cp\u003eWe’ve tested hundreds of free and paid personal VPNs since 2016. Currently, our three \u003ca href=\"/best-vpn/\"\u003ehighest-rated VPNs\u003c/a\u003e are:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cb\u003eExpressVPN\u003c/b\u003e\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eNordVPN\u003c/b\u003e\u003c/li\u003e\n\u003cli\u003e\u003cb\u003ePrivate Internet Access\u003c/b\u003e\u003c/li\u003e\n\u003c/ol\u003e\n\u003cdiv class=\"block-highlighted block-highlighted--light\"\u003e\n\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e Personal VPNs are typically sold on a subscription basis, with discounts available when you pay upfront for a year or more. There’s also a small number of \u003ca href=\"/best-vpn/free/\"\u003efree VPN services that are safe to use\u003c/a\u003e.\u003c/p\u003e\n\u003c/div\u003e\n","add_to_jl":true,"jumplink_text_override":"VPN Examples","type":"standard"}]},{"__typename":"UT_Chapters_Type_CollapsibleContent","chapter_jumplinks":{"label":"Types of VPN Protocols","show_jumplink":true},"content":"\u003cp\u003eVPN protocols are the sets of rules VPN clients and software use to talk to each other and establish an encrypted tunnel between them.\u003c/p\u003e\n\u003cp\u003eVPN protocols are \u003cb\u003enot\u003c/b\u003e different types of VPN. In fact there\u0026#8217;s often a lot of overlap in the protocols that each VPN type uses, i.e., a remote access VPN and a personal VPN will both use WireGuard or OpenVPN, for example.\u003c/p\u003e\n\u003cp\u003eIf you just need an overview of the VPN protocols, the table below allows you to quickly compare their relative speeds, security, and data usage. \u003c/p\u003e\n\u003ctable class=\"table-default table-not-stacked\"\u003e\n\u003cthead\u003e\n\u003ctr\u003e\n\u003cth style=\"min-width: 185px;\"\u003eProtocol\u003c/th\u003e\n\u003cth style=\"min-width: 183px;\"\u003eSpeed\u003c/th\u003e\n\u003cth style=\"min-width: 185px;\"\u003eSecurity\u003c/th\u003e\n\u003cth style=\"min-width: 185px;\"\u003eData Usage\u003c/th\u003e\n\u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eWireGuard\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery Fast\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery High\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery Low\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eOpenVPN\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery High\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eHigh\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eIKEv2/IPSec\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery Fast\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eHigh\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eSoftEther\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eVery Fast\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eHigh\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--green-70);\"\u003eLow\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eL2TP/IPSec\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eHigh\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003eSSTP\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eSlow\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eHigh\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cb\u003ePPTP\u003c/b\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eSlow\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--orange-70);\"\u003eLow\u003c/span\u003e\u003c/td\u003e\n\u003ctd\u003e\u003cspan style=\"color: var(--yellow-70);\"\u003eModerate\u003c/span\u003e\u003c/td\u003e\n\u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n\u003cp class=\"spacer\"\u003e\n\u003cp\u003eThere\u0026#8217;s also a brief explanation of each one underneath, which includes their pros and cons.\u003c/p\u003e\n\u003cp\u003eFor a deeper exploration of the topic, we also have a \u003ca href=\"/what-is-a-vpn/vpn-protocols/\"\u003ededicated guide to VPN protocols\u003c/a\u003e.\u003c/p\u003e\n","heading_settings":{"content":"Different Types of VPN Protocols","level":2,"looks_like":2,"custom_id":"vpn-protocols"},"highlight_chapter":false,"type":"chapter_w_collapsible","subchapters":[{"subheading":"WireGuard","heading_settings":{"content":"WireGuard","level":3,"looks_like":5,"custom_id":"wireguard"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#wireguard\"\u003eWireGuard\u003c/a\u003e is a modern VPN protocol that prioritizes simplicity and performance. It uses state-of-the-art cryptography and is implemented with only about 4,000 lines of code, making it easier to audit and less susceptible to vulnerabilities.\u003c/p\u003e\n\u003cp\u003eThe protocol is built into the Linux kernel, which contributes to its exceptional speed and efficiency.\u003c/p\u003e\n\u003cp\u003eWireGuard is ideal for when you really need a high-speed connection, such as streaming or gaming. It\u0026#8217;s also particularly effective on mobile, as it can switch between networks seamlessly.\u003c/p\u003e\n\u003cp\u003eIts main advantages include faster connection times, improved battery life on mobile devices, and better overall performance. \u003c/p\u003e\n\u003cp\u003eWireGuard\u0026#8217;s simplicity means it is less configurable than other protocols however, which may be off-putting for some. Any \u003ca href=\"/guides/wireguard-vs-openvpn/#privacy-\u0026#038;-logging\"\u003econcerns over IP-logging are completely unfounded\u003c/a\u003e in our view, as WireGuard can be configured to not record this data.\u003c/p\u003e\n\u003cp\u003eIt\u0026#8217;s the VPN protocol that we typically recommend using wherever possible.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"OpenVPN","heading_settings":{"content":"OpenVPN","level":3,"looks_like":5,"custom_id":"openvpn"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#openvpn\"\u003eOpenVPN\u003c/a\u003e is an open-source VPN protocol that became the industry standard for personal VPN services.\u003c/p\u003e\n\u003cp\u003eFor many years it was our recommended option for consumer VPN users until WireGuard more recently \u003ca href=\"/guides/wireguard-vs-openvpn/\"\u003ereplaced it as our protocol of choice\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eOpenVPN offers a highly secure and versatile connection, using OpenSSL library and TLS protocols for encryption and authentication.\u003c/p\u003e\n\u003cp\u003eIt is extremely flexible and difficult to block as it can be configured to run on any port and can use either \u003ca href=\"/guides/udp-vs-tcp/\"\u003eUDP or TCP protocols\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eOpenVPN is an excellent choice if security and privacy are more important to you than raw speed. It is particularly effective at bypassing firewalls and can be used on almost any platform.\u003c/p\u003e\n\u003cp\u003eThe drawbacks of OpenVPN are that it can be \u003ca href=\"/guides/wireguard-vs-openvpn/#speed\"\u003eslower than newer protocols like WireGuard\u003c/a\u003e, requires third-party software for implementation, and can be complex to set up manually.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"IKEv2","heading_settings":{"content":"IKEv2","level":3,"looks_like":5,"custom_id":"ikev2"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#ikev2\"\u003eIKEv2\u003c/a\u003e (Internet Key Exchange version 2), when combined with IPSec, creates a highly secure and fast VPN protocol.\u003c/p\u003e\n\u003cp\u003eDeveloped jointly by Microsoft and Cisco, IKEv2 handles the \u003ca href=\"https://en.wikipedia.org/wiki/Security_association\" rel=\"noopener\" target=\"_blank\"\u003eSA (Security Association)\u003c/a\u003e attribute negotiation, while IPSec provides encryption for the actual data traffic.\u003c/p\u003e\n\u003cp\u003eThis protocol is known for its ability to quickly re-establish a VPN connection when a user switches networks or temporarily loses their connection, which is why it\u0026#8217;s ideal for \u003ca href=\"#mobile-vpn\"\u003emobile VPNs\u003c/a\u003e and personal VPN services\u0026#8217; mobile apps.\u003c/p\u003e\n\u003cp\u003eThe main advantages of IKEv2 are its excellent stability, fast speeds, and native support on many platforms.\u003c/p\u003e\n\u003cp\u003eThe protocol\u0026#8217;s biggest downside is that it\u0026#8217;s closed-source and so can\u0026#8217;t be audited like WireGuard or OpenVPN for flaws or backdoors.\u003c/p\u003e\n\u003cp\u003eOther potential disadvantages are that IKEv2 isn\u0026#8217;t supported by as many platforms as OpenVPN, and that, in theory at least, it\u0026#8217;s easier to block as it uses \u003ca href=\"/guides/vpn-ports/\"\u003efixed ports\u003c/a\u003e.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"SoftEther","heading_settings":{"content":"SoftEther","level":3,"looks_like":5,"custom_id":"softether"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#softether\"\u003eSoftEther\u003c/a\u003e (Software Ethernet) is a multi-protocol VPN software designed as an alternative to OpenVPN.\t\u003c/p\u003e\n\u003cp\u003eSoftEther can tunnel through most firewalls by using HTTPS, making it highly versatile in restrictive network environments. It started as an academic project at the University of Tsukuba in Japan but has grown into a powerful and flexible VPN solution.\u003c/p\u003e\n\u003cp\u003eSoftEther can be a good option if you need to bypass strict firewalls or network restrictions while maintaining good performance.\u003c/p\u003e\n\u003cp\u003eSoftEther\u0026#8217;s strengths include its ability to support multiple protocols, that it\u0026#8217;s usually faster than OpenVPN, and strong encryption.\u003c/p\u003e\n\u003cp\u003eHowever, it is not as widely supported by commercial VPN providers as other protocols, can be complex to set up, and may require more technical knowledge to implement effectively.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"L2TP/IPSec","heading_settings":{"content":"L2TP/IPSec","level":3,"looks_like":5,"custom_id":"l2tp-ipsec"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#l2tp\"\u003eL2TP\u003c/a\u003e (Layer 2 Tunneling Protocol) is typically paired with IPSec for encryption, as it doesn\u0026#8217;t provide encryption on its own.\u003c/p\u003e\n\u003cp\u003eTogether they provide a very secure VPN connection that encapsulates data twice. L2TP/IPSec is a successor to PPTP and is significantly more secure while maintaining wide compatibility.\u003c/p\u003e\n\u003cp\u003eL2TP/IPSec is best for situations where security is paramount and native support is important, as it\u0026#8217;s built into many operating systems.\u003c/p\u003e\n\u003cp\u003eThe primary advantages of L2TP/IPSec include its widespread support, good security when properly configured, and ease of setup on most platforms.\u003c/p\u003e\n\u003cp\u003eDrawbacks include slower speeds due to double encapsulation, difficulty in getting through firewalls due to fixed ports, and \u003ca href=\"https://www.paloaltonetworks.co.uk/cyberpedia/what-is-l2tp#pros\" rel=\"noopener\" target=\"_blank\"\u003epotential vulnerabilities\u003c/a\u003e if \u003ca href=\"/guides/vpn-passthrough/\"\u003eNetwork Address Translation (NAT)\u003c/a\u003e is implemented incorrectly.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"SSTP","heading_settings":{"content":"SSTP","level":3,"looks_like":5,"custom_id":"sstp"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#sstp\"\u003eSSTP\u003c/a\u003e (Secure Socket Tunneling Protocol) is Microsoft\u0026#8217;s proprietary VPN protocol that uses SSL/TLS encryption.\u003c/p\u003e\n\u003cp\u003eIt\u0026#8217;s similar to OpenVPN in that it can use TCP port 443, making it difficult to block and able to bypass most firewalls.\u003c/p\u003e\n\u003cp\u003eWhile SSTP can be useful in environments where other VPN protocols are blocked or restricted, we don\u0026#8217;t recommend using it except as a last resort as it is closed-source.\u003c/p\u003e\n\u003cp\u003eIt\u0026#8217;s also not well-supported outside of Windows and slower than other protocols.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"},{"subheading":"PPTP","heading_settings":{"content":"PPTP","level":3,"looks_like":5,"custom_id":"pptp"},"content":"\u003cp\u003e\u003ca href=\"/what-is-a-vpn/vpn-protocols/#pptp\"\u003ePPTP\u003c/a\u003e (Point-to-Point Tunneling Protocol) is one of the oldest VPN protocols still in use today.\u003c/p\u003e\n\u003cp\u003eDeveloped by Microsoft for dial-up networks, it was once the standard protocol for corporate VPN access but now has largely been phased out.\u003c/p\u003e\n\u003cp\u003eWe do not recommend \u003cb\u003eever\u003c/b\u003e using this \u003ca href=\"https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol\"\u003eobsolete VPN protocol\u003c/a\u003e due to its age and known security vulnerabilities.\u003c/p\u003e\n","add_to_jl":false,"jumplink_text_override":"","type":"standard"}]}],"colour_scheme":"B8C6FC","components_data":{"box_cta":[],"video":[{"type":"youtube","caption":"","id":"623a44ac62de68","url":"https://www.youtube.com/watch?v=ELiegn37LGQ","poster_image":{"url":"https://www.top10vpn.com/images/2024/09/Different-Types-of-VPN-Top10VPN-Thumbnail.webp"},"mobile_poster_image":{"url":null},"mobile_url":"","show_schema":true,"description":"You may have used a VPN before, but do you know what type? Or are you looking to use a VPN but are unsure which type you need? Whatever questions you have, we aim to answer them in this video. We'll take a quick look at the four big different types of VPN and clarify what they do well, what they do poorly, and how they all differ from one another.","title":" The 4 Different Types of VPN \u0026 What They Do Differently ","duration":412,"publish_date":"2024-09-26T00:00:00.000Z"}],"guide_links":[],"hub_cards":null,"tableSheets":[],"collapsible_content":[{"id":"48dd6aaaf4c3","color":"#f5f1f0","content":[{"heading_settings":{"content":"Are VPN Types the Same as VPN Protocols?","level":3,"looks_like":5,"custom_id":""},"body":"\u003cp\u003eThe \u003ca href=\"#vpn-protocols\"\u003eVPN protocol\u003c/a\u003e used \u003cb\u003edoes not determine the type of VPN\u003c/b\u003e. Protocols are simply sets of rules governing how your VPN software creates a secure connection to the VPN server and then uses it to transmit your data. \u003c/p\u003e\n\u003cp\u003e\u003cb\u003eThere is significant overlap in the protocols used by each type of VPN\u003c/b\u003e. WireGuard is often used by personal, remote access and site-to-site VPNs, for example, while IKEv2 is frequently used by both mobile VPNs and personal VPNs.\u003c/p\u003e\n\u003cp\u003eIf you want a more detailed explanation of the differences, read our \u003ca href=\"/what-is-a-vpn/vpn-protocols/\" rel=\"noopener\" target=\"_blank\"\u003ededicated VPN protocols guide\u003c/a\u003e. For more of a quick overview, jump ahead to our summary of the main \u003ca href=\"#vpn-protocols\"\u003eVPN protocols\u003c/a\u003e.\u003c/p\u003e\n","collapsed":true}]}],"why_trust_us":{"title":"Why Trust Us?","content":"\u003cp\u003eWe’re fully independent and have been reviewing VPNs since 2016. Our advice is based on our own testing results and is unaffected by financial incentives. Learn \u003ca href=\"https://www.top10vpn.com/about/\"\u003ewho we are\u003c/a\u003e and \u003ca href=\"https://www.top10vpn.com/about/how-we-review-vpns/\"\u003ehow we test VPNs\u003c/a\u003e.\u003c/p\u003e\n","show_stats":false,"stats":[{"name":"REMOVE","value":""},{"name":"REMOVE","value":""},{"name":"REMOVE","value":""}]}},"external_utils":{"load_hotjar":false,"load_oim":false,"oim_campaign":"","oim_campaign_mobile":""},"intro_chapter":{"heading":"","content":"\u003cdiv style=\"display: none;\" data-videoph=\"623a44ac62de68\"\u003e\u003c/div\u003e\n\u003cp\u003eUnderstanding the different types of VPN can be confusing, even if you\u0026#8217;ve used a VPN before.\u003c/p\u003e\n\u003cp\u003eInconsistent terminology and the mixing up of VPN types with protocols (like OpenVPN or PPTP) and configurations (such as \u003ca href=\"/guides/what-is-double-vpn/\"\u003eDouble VPN\u003c/a\u003e) contribute to this lack of clarity.\u003c/p\u003e\n\u003cp\u003eTo clear up this confusion, we drew on our decades of experience implementing corporate VPNs around the world, as well as thousands of tests of personal VPN services to create this \u003cb\u003edefinitive guide\u003c/b\u003e to the different types of VPN.\u003c/p\u003e\n\u003cp\u003eAt its foundation, \u003cb\u003eevery VPN creates an encrypted tunnel over the internet\u003c/b\u003e for secure data transmission.\u003c/p\u003e\n\u003cp\u003eThere are \u003cstrong\u003efour distinct types of VPN\u003c/strong\u003e, whose differences lie simply in how they utilize this encrypted tunnel.\u003c/p\u003e\n\u003cp\u003eIf you\u0026#8217;re not sure what type of VPN is right for you, use this simple flowchart to help you decide.\u003c/p\u003e\n\u003cdiv id=\"attachment_1635025\" style=\"width: 610px\" class=\"wp-caption alignleft\"\u003e\u003cimg aria-describedby=\"caption-attachment-1635025\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1635025 size-full\" src=\"/assets/2024/10/d-flowchart-choosing-vpn-type-guide.png\" alt=\"Flowchart to help you choose which type of VPN you need\" width=\"600\" height=\"569\" /\u003e\u003cp id=\"caption-attachment-1635025\" class=\"wp-caption-text\"\u003eFlowchart to help you choose which type of VPN you need.\u003c/p\u003e\u003c/div\u003e\n\u003cdiv style=\"display: none;\" data-collapsibleContent=\"48dd6aaaf4c3\"\u003e\u003c/div\u003e\n","chapter_jumplinks":{"label":"","show_jumplink":false}},"main_image":{"show_image":false,"image":{"url":"https://www.top10vpn.com/images/2021/08/VPN-Types.jpg","alt":"Illustration showing two people using different types of VPN","width":1180,"height":803}},"references":"","related_articles":[{"title":"Are VPNs Legal?","url":"/what-is-a-vpn/are-vpns-legal/","image":{"url":"https://www.top10vpn.com/images/2019/11/VPN_Legal_Engagemt_Header-map-768x521.jpg","alt":"Illustration showing countries where VPNs are illegal and legal","width":768,"height":521}},{"title":"Virtual Server Locations \u0026#038; Rented VPN Servers Explained","url":"/what-is-a-vpn/virtual-server-locations/","image":{"url":"https://www.top10vpn.com/images/2020/06/vpn-servers-explained-768x521.jpg","alt":"vpn, dns, and proxy servers","width":768,"height":521}},{"title":"The 10 Disadvantages Of Using a VPN","url":"/what-is-a-vpn/vpn-disadvantages/","image":{"url":"https://www.top10vpn.com/images/2021/04/Disadvantages-of-VPN-768x521.jpg","alt":"scales showing disadvantages of using a VPN","width":768,"height":521}}],"title":"The Different Types of VPN \u0026#038; When to Use Them","tldr":{"heading":"Overview","content":"\u003cp\u003eThe four main VPN types are: \u003cb\u003ePersonal\u003c/b\u003e (encrypts traffic to mask IP and bypass restrictions), \u003cb\u003eRemote Access\u003c/b\u003e (connects to private networks remotely), \u003cb\u003eMobile\u003c/b\u003e (maintains connections when switching networks), and \u003cb\u003eSite-to-Site\u003c/b\u003e (combines separate networks).\u003c/p\u003e\n"},"updated_date":"2024-10-25T13:58:00.000Z","published_date":"2021-08-02T16:30:42.000Z","view_password":"","recaptchaSiteKeyV3":"6Ld6xwAVAAAAAJFsy3_JH2x9-p2xrLHhrVsepqTW","slug":"vpn-types"}},"url":{"route":"/what-is-a-vpn/[slug]","pathname":"/what-is-a-vpn/[slug]","query":{"slug":"vpn-types"},"asPath":"/what-is-a-vpn/vpn-types/","isFallback":false,"basePath":"","locale":"en","locales":["en","es","it","pl","pt","sv","fr","nl","de","ko"],"defaultLocale":"en","isReady":true,"isPreview":false,"isLocaleDomain":false},"showBanner":false,"vFlag":false,"variant":false,"GA4":"G-4F248Z2SQ6","fpTestsPercentage":"0","__N_SSP":true},"page":"/what-is-a-vpn/[slug]","query":{"slug":"vpn-types"},"buildId":"eba613bb9ce2136c91543a121112b4bfd932a7f4","isFallback":false,"isExperimentalCompile":false,"gssp":true,"appGip":true,"locale":"en","locales":["en","es","it","pl","pt","sv","fr","nl","de","ko"],"defaultLocale":"en","scriptLoader":[]}</script><script defer="" src="https://www.googletagmanager.com/gtag/js?id=G-4F248Z2SQ6"></script><script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('set', 'url_passthrough', true); gtag('consent', 'default', { 'ad_storage': 'granted', 'ad_user_data': 'granted', 'ad_personalization': 'granted', 'analytics_storage': 'granted', 'security_storage': 'granted', }); gtag('config','AW-951368176'); gtag('config','G-J4RT6V6VSW'); gtag('config','G-4F248Z2SQ6'); // TEMP: Collecting data on dark mode preference if (window.matchMedia && window.matchMedia('(prefers-color-scheme: dark)').matches) { window.gtag("event", "dark_mode_preference", { value: "dark", send_to: "G-4F248Z2SQ6", }); } else if (window.matchMedia && window.matchMedia('(prefers-color-scheme: light)').matches) { window.gtag("event", "dark_mode_preference", { value: "light", send_to: "G-4F248Z2SQ6", }); } else { window.gtag("event", "dark_mode_preference", { value: "no-preference", send_to: "G-4F248Z2SQ6", }); } // End TEMP </script><noscript><div style="display:inline"><img height="1" width="1" style="display:none" alt="" src="//googleads.g.doubleclick.net/pagead/viewthroughconversion/951368176/?guid=ON&script=0"/></div></noscript></body></html>