What is a VPN?

What does a VPN mean? What does it do, and how does it work? What are the benefits of VPN? Here are the answers to all of those questions and more.

What is a VPN hero

What is a VPN exactly?

IPVanish app on laptop

VPN Meaning

You may have heard the term “VPN,” but what does VPN stand for? VPN is short for virtual private network.

VPNs originally came into prominence decades ago as a method for remote workers to access their corporate network for internal files and secure communication. They’re still used for this purpose. Today, however, VPN providers like IPVanish also offer a simple solution for everyday internet privacy and online freedom.

A person using IPVanish app on mobile and laptop devices

What does a virtual private network do?

A virtual private network, or VPN, is a technology used to secure connections from a device to the internet. It achieves secure connections through the process of VPN encryption. This makes digital data virtually unreadable and inaccessible to outsiders and potential onlookers. That includes entities such as ISPs, as well as others with whom you share network access, such as strangers on a free Wi-Fi hotspot.

A VPN doesn’t just increase your internet privacy and security, however. It also functions as an online IP changer to create greater online freedom.

How does a VPN work?

What is a VPN - How does a VPN work graphic
What is a VPN - How does a VPN work graphic

Tunneling

A VPN uses something called tunneling to establish an encrypted internet connection. When you use the internet, all of your activity is separated into data packets. Typically, third parties can use a process called deep packet inspection to read these data packets and track everything you do online. But tunneling encrypts every data packet, then encapsulates it into another data packet.

So, why is this process called tunneling? This has to do with the way these data packets are transmitted. When you use a VPN, your data packets are sent via a secure tunnel through a VPN server before they arrive at their original destination.

Encryption

When data packets are encrypted, they are re-coded into a new format. This new code, called ciphertext, requires a decryption key to read, so only authorized parties can decipher encrypted data packets. This means when third parties such as your ISP go to inspect your data packets, they won’t be able to. Instead, the contents inside will be rendered unreadable by your VPN connection.

A person is seen using the IPVanish VPN iOS app in the Locations screen

What is a VPN server?

A VPN server is a remote computer system operated by a VPN provider. When you use a VPN, your internet traffic travels to a VPN server before it is sent to its final destination. This journey takes place via secure tunnels. But VPN servers don’t just play a critical role in providing security.

When your VPN connection is active, your IP address will match your VPN server’s IP address. To the rest of the internet, such as the website you visit, you’ll appear as if you’re actually connecting from your server’s location rather than your true physical location.

IPVanish app on tablet

What is an IP address?

An IP address is a unique numeric code used to identify you and your approximate physical location. It is typically assigned by your broadband provider to your network and any connected devices.

Your IP address is detected by every app you use and website you visit. It also allows network owners and broadband providers to monitor you. In some instances, these entities can even deny you access to websites and services you should rightfully have access to based on your IP address. By using a VPN to change your IP address, however, your online activity will no longer be traceable to you. Additionally, you won’t be limited to any unfairly or wrongly imposed restrictions placed on your true IP address.

IPVanish VPN app on laptop and phone

Dedicated IP vs Dynamic IP

With regards to IP addresses offered by VPN service providers, there are two primary types: dedicated IP addresses and dynamic IP addresses. Dedicated IPs, also known as static IPs, are assigned to each individual VPN user and do not change.

Dynamic IP addresses, on the other hand, do not stay the same. These are the types of IP addresses IPVanish offers. By using dynamic IPs, we ensure your privacy is more protected, as dynamic IPs cannot be traced and predicted in the same way dedicated IPs can. Our dynamic IPs are shared amongst subscribers, making it difficult to associate any online activity with individual users. When you use IPVanish, your IP will change during each connected VPN session.  

A person using a computer

What are VPN protocols?

VPN protocols are the specific methods used to route your internet traffic through a VPN connection. Each protocol relies on unique rules which determine how they process data. Some of these protocols emphasize speed; others prioritize security.

IPVanish offers multiple VPN protocols so that users can choose the best protocol possible for their specific use cases. These protocols include IKEv2, OpenVPN, IPSec, and WireGuard®, the newest VPN protocol.

Ready to get started?

Sign up today to surf the web with the protection of IPVanish.

Available on

What are VPNs used for?

A VPN’s primary purpose is to encrypt network connections. Combined with IP masking capabilities, this provides many daily VPN use cases, including to:

Advantages of Using a VPN

Advantages of

Using a VPN

A VPN isn’t the only digital tool people turn to in order to increase their online privacy or change their online location. Other services, such as encrypted messaging apps, Tor, and proxies, are popular. But a VPN comes with a few of key advantages:

First, a VPN encrypts your entire online connection. Every website you visit, app you use, or message you send while connected to a VPN will be shielded from any potential onlookers. With an encrypted messaging app, only your messages will be encrypted.

Secondly, Tor can’t match a VPN for speed. Tor randomly routes your traffic through more than three nodes. These hops cause frequent latency and significantly slow you down. This isn’t the case with a VPN, which uses a secure tunnel to route your traffic through a single server.

Finally, whereas services such as proxies change your online location, they don’t provide any privacy or security benefits. But with a VPN, you get the best of both worlds. You can choose a server in the location you wish to appear in online, and you can secure your connection to any network with encryption.

A different way to browse

If you are looking for more than a browser proxy, but lighter than a VPN, IPVanish has you covered. Every IPVanish VPN account comes equipped with a SOCKS5 proxy, a versatile proxy compatible with most apps and devices.

How to Set Up a VPN

Setting up a VPN manually can be complex and time-consuming. Fortunately, when you subscribe to a VPN provider, such as IPVanish, the VPN setup process is simple. IPVanish makes it easy to use a VPN with VPN apps for all your devices and operating systems. And with unmetered connections, you can protect all your household devices at the same time. We also offer VPN routers, so you can encrypt your entire household network via a single device.

To begin setting up your VPN with IPVanish, choose your operating system.

Chrome OS

VPN Service Provider’s Checklist

There are hundreds upon thousands of VPNs to choose from, so how do you know which VPN to choose? Any VPN you consider should meet the following criteria:

Should I use a free VPN?

You may find yourself asking “should I use a free VPN?” While that may sound like an appealing idea, the answer is absolutely not.

VPN Frequently Asked Questions

Need help with something? Here are our most frequently asked questions.

Ready to get started?

Advanced encryption

Shared IP addresses

Unmetered device connections

Verified no-traffic logs

Multiple connection protocols

No data transfer caps

Proxy web server

24/7 customer support

Servers in 90+ regions

Secure access to media

Advanced encryption

Shared IP addresses

Unmetered device connections

Verified no-traffic logs

Multiple connection protocols

No data transfer caps

Proxy web server

24/7 customer support

Servers in 90+ regions

Secure access to media

Apple Icon
Google Play Icon
Fire TV Icon
Linux Icon
Ios Icon
Scroll to Top