VPNs for Business

Virtual private networks (VPNs) create a tunnel between a private network and a public network, allowing users on the public network to send and receive data as if they were directly connected to the private network. VPNs have long been a popular choice for consumers seeking more privacy in their everyday Internet browsing, but the use of VPNs in the business sector has exploded in recent years. According to 2017 research from Global Wave Index, 30% of VPN users regularly utilize VPN technology to access sites/service for work, highlighting the increasing importance of secure remote connections for enterprises; and VPN protocols are the underlying technology that makes these secure remote connections possible.

What are VPN protocols?

VPN protocols determine exactly how data is routed through a connection. These protocols have different specifications based on the benefits and desired circumstances; for example, some VPN protocols prioritize data throughput speed while others focus on masking or encrypting data packets for privacy and security.

5 Common VPN Protocols

There are two main approaches to VPN functionality: 1) two protocols are used (one protocol to move the data through the tunnel and one protocol to secure that traffic); or 2) one protocol is used for both data transfer and data security.

Here are five common VPN protocols and their primary benefits.

Point-to-Point Tunneling Protocol is one of the oldest VPN protocols in existence. Developed in the mid-90s by Microsoft, PPTP was integrated into Windows 95 and specifically designed for dial-up connections. But as technology advanced, PPTP’s basic encryption was quickly cracked, compromising its underlying security. However, because it lacks many of the security features found in other modern protocols it can deliver the best connection speeds for users who may not need heavy encryption. But while PPTP is still used in certain applications, most providers have since upgraded to faster more reliable protocols.

TL;DR: fast data speeds, wide support, many security issues

2) L2TP/IPSec
Layer 2 Tunnel Protocol is a replacement of the PPTP VPN protocol. This protocol does not provide any encryption or privacy out-of-the-box and is frequently paired with security protocol IPsec. Once implemented, L2TP/IPsec is extremely secure and has no known vulnerabilities.

TL;DR: widely used, good speeds, easily blocked due to reliance of UDP on single port

3) OpenVPN
OpenVPN is an open source protocol that allows developers access to its underlying code. This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm.

TL;DR: open source, strongest encryption, slower speeds

Secure Socket Tunneling Protocol is popular due to its full integration with every Microsoft operating system since Windows Vista SP 1. SSTP utilizes 2048-bit SSL/TLS certificates for authentication and 256-bit SSL keys for encryption. The biggest drawback to SSTP is that is basically a Microsoft-developed proprietary protocol and developers do not have access to the underlying code.

TL;DR: good security, difficult to block and detect, great support for native and third party clients

5) IKEv2
Internet Key Exchange version 2 is a common VPN tunneling protocol that provides a secure key exchange session. Similar to L2TP (and IKEv1), IKEv2 is normally paired with IPsec for encryption and authentication. This protocol is very good at re-establishing the link after temporary connection loss and excels at switching connections across network types (from WiFi to cellular, for example).

TL;DR: fast, mobile friendly, network switching capabilities, open source options, great support for native and third party clients

The Purpose-Built VPN Protocol

Several years ago, NetMotion engineers determined that while standard security protocols meet the needs of mobile users, there simply wasn’t a delivery protocol reliable enough for the variable and unpredictable conditions of wireless environments. So in developing NetMotion Mobility, we built out own.

There are two main components of the Mobility VPN: The Mobility server and the Mobility client. These components communicate using a proprietary, secure, guaranteed delivery protocol called IMP (Internet Mobility Protocol) and RT-IMP, a version of IMP optimized for real-time traffic such as voice and video. Both IMP and RT-IMP run over UDP and on wireless networks, they provide TCP-like reliability with the performance advantages of UDP.

The Mobility client and server use a transparent, transport level, proxy architecture to isolate all tunneled IP flows from changes in the underlying physical wireless network. This ensures that the TCP connections for tunneled applications remain connected across network roams and other disruptions in network connectivity. Mobility uses industry-standard encryption and authentication protocols as well as FIPS 140-2 validated and NSA Suite B compliant cryptographic libraries.

If your workforce relies on mobile devices and wireless networks to get the job done, there is not a better option than NetMotion’s purpose-built mobile VPN—from a technical standpoint or end-user perspective.