How a VPN works
Without a VPN, your traffic travels from your device to its destination in a way that your ISP, network administrators, and potentially attackers on the same network can see. A VPN changes this by wrapping your traffic in an encrypted tunnel to a VPN server — everything between you and that server is encrypted and unreadable to outside observers.
The key concept here is tunneling — encapsulating one network protocol inside another. The original packet becomes the payload inside an outer encrypted packet. This is why VPNs can traverse the public internet securely.
Types of VPN
VPN tunneling protocols — the exam table
| Protocol | Port / Layer | Encryption | Status | Key facts |
|---|---|---|---|---|
| IPsec | Layer 3 (IP) | AES, 3DES | Current | Two modes: Transport (encrypts payload only) and Tunnel (encrypts entire packet). Uses AH and ESP protocols. |
| OpenVPN | UDP 1194 / TCP 443 | TLS / AES | Current | Open-source, highly configurable. Can run on port 443 to bypass firewalls. Widely used in enterprise and consumer VPNs. |
| WireGuard | UDP 51820 | ChaCha20 | Current | Modern, lean protocol with significantly less code than OpenVPN/IPsec. Fast and increasingly adopted. |
| L2TP/IPsec | UDP 1701, 500, 4500 | IPsec (AES) | Legacy | L2TP provides the tunnel, IPsec provides encryption — neither provides security alone. Common on older enterprise systems. |
| SSTP | TCP 443 | TLS | Legacy | Microsoft proprietary. Uses HTTPS port so passes through most firewalls. Windows-only natively. |
| PPTP | TCP 1723 | MPPE (weak) | Deprecated | Old Microsoft protocol. Encryption is broken — known vulnerabilities. Appears on exam as an example of weak/insecure VPN. Do not use. |
PPTP appears frequently on Security+ as the answer to "which VPN protocol is considered insecure?" Its encryption (MPPE) has known weaknesses and it should never be used on modern networks. If a question asks which VPN protocol to avoid or replace, PPTP is the answer.
Contrast with IPsec and OpenVPN — both are considered secure and current standards.
IPsec modes and components — Security+ detail
IPsec is the most heavily tested VPN technology on both Network+ and Security+. You need to know its two modes and two core protocols:
Transport Mode Encrypts only the payload (data portion) of each IP packet Original IP header preserved — source and destination IPs visible Used for end-to-end encryption between two hosts Tunnel Mode Encrypts the entire original IP packet (header + payload) New outer IP header added with VPN endpoint addresses Used for gateway-to-gateway (site-to-site) VPNs AH — Authentication Header Provides integrity and authentication — no encryption Verifies the packet hasn't been tampered with ESP — Encapsulating Security Payload Provides encryption + integrity + authentication Most commonly used — does everything AH does plus encryption
Split tunneling
Split tunneling determines whether all of a user's traffic goes through the VPN, or only traffic destined for the corporate network.
The Security+ exam frequently frames split tunneling as a security risk. The concern is that a remote employee's device connects to both the corporate VPN and the public internet simultaneously — if the device is compromised, an attacker could potentially use it as a pivot point into the corporate network.
Exam question pattern: "Which VPN configuration poses the greatest security risk?" → Split tunneling.
Key VPN terms
VPN Concentrator → Dedicated hardware/software that manages VPN connections at scale Tunnel → The encrypted path through which encapsulated packets travel Encapsulation → Wrapping one packet inside another to traverse a network IKE / IKEv2 → Internet Key Exchange — negotiates IPsec security associations (SAs) Security Association→ Agreement on encryption algorithms and keys between VPN peers Always-on VPN → Device maintains VPN connection automatically, even before login Clientless VPN → Browser-based SSL VPN — no client software required Split DNS → Corporate DNS queries go through VPN; public DNS queries go direct
Exam scenarios
Ready to sit Network+ or Security+?
See the study guides and practice exams worth your time for both certifications.