[ultimate_heading main_heading=”IPVanish Protocols” main_heading_color=”#ffffff” main_heading_style=”font-weight:bold;” main_heading_margin=”margin-bottom:10px;”][/ultimate_heading]

We support multiple VPN connection types to make IPVanish as powerful and adaptable as possible. Below are some details and tips for using them to help you decide which one is best for you.

[ultimate_heading main_heading=”What VPN Connection Types Does IPVanish Offer?” heading_tag=”h3″ main_heading_style=”font-weight:bold;” main_heading_margin=”margin-bottom:10px;”][/ultimate_heading]
[bsf-info-box icon_type=”custom” icon_img=”id^3385|url^https://electrical-md.com/wp-content/uploads/2018/10/wifi.png|caption^null|alt^null|title^wifi|description^null” img_width=”100″ title=”IKEv2 (Internet Key Exchange Protocol Version 2)” pos=”left” title_font_style=”font-weight:bold;”]

IKEv2, a protocol made available exclusively through IPSec, is used to configure the security association, or the specific approach to how IP packets are encrypted over IPSec. While IKEv2 is only available in newer mobile devices, it is considered a more secure extension of the IPSec protocol because devices can switch between a Wi-Fi and cellular network without disrupting the VPN connection.

[/bsf-info-box][bsf-info-box icon_type=”custom” icon_img=”id^3381|url^https://electrical-md.com/wp-content/uploads/2018/10/fast-network.png|caption^null|alt^null|title^fast-network|description^null” img_width=”100″ title=”OpenVPN” pos=”left” title_font_style=”font-weight:bold;”]

Use this protocol whenever possible. Allows for multiple types of authentication methods, but ultimately uses SSL/TLS (similar to your web browser) for key exchange. While it typically offers faster access speeds than L2TP, it also requires a third-party software and certificate files to be installed in order to use it — unless, of course, you’re using the IPVanish software. Also, support for mobile devices is limited.

  • TCP (Transmission Control Protocol)
    OpenVPN over TCP is the most popular and reliable VPN connection type. It uses error correction to prevent the loss of information packets during data transfer. These lost packets would ultimately lead to failed websites and incomplete downloads if not for TCP’s automatic retransmitting of them.

  • UDP (User Datagram Protocol)
    OpenVPN over UDP is often faster than TCP due to having no error correction. While lost packets are inevitable using UDP, certain web technologies are better experienced this way, particularly VoIP and online gaming, where real-time interaction would be interrupted by old, retransmitted data.

[/bsf-info-box][bsf-info-box icon_type=”custom” icon_img=”id^3383|url^https://electrical-md.com/wp-content/uploads/2018/10/secure-phone.png|caption^null|alt^null|title^secure-phone|description^null” img_width=”100″ title=”L2TP (Layer 2 Tunneling Protocol)” pos=”left” title_font_style=”font-weight:bold;”]

L2TP is best for mobile devices that are not compatible with the OpenVPN protocol. While L2TP fixes the vulnerabilities in PPTP, it may result in slower speeds than OpenVPN. Also, because it uses multiple ports, it can be more difficult to configure on a router.

[/bsf-info-box][bsf-info-box icon_type=”custom” icon_img=”id^3380|url^https://electrical-md.com/wp-content/uploads/2018/10/encryption.png|caption^null|alt^null|title^encryption|description^null” img_width=”100″ title=”IPSec (Internet Protocol Security)” pos=”left” title_font_style=”font-weight:bold;”]

IPSec is a protocol suite that encrypts IP packets for transport and tunneling. Available for most mobile devices, IPsec protects all application traffic over an IP network. But unlike OpenVPN, PPTP and other connection types, IPSec does not define a particular encryption algorithm or an authentication function in and of itself — it simply provides a framework for secure transport.

[/bsf-info-box][bsf-info-box icon_type=”custom” icon_img=”id^3384|url^https://electrical-md.com/wp-content/uploads/2018/10/sstp.png|caption^null|alt^null|title^sstp|description^null” img_width=”100″ title=”SSTP (Secure Socket Tunneling Protocol)” pos=”left” title_font_style=”font-weight:bold;”]

SSTP is a protocol originally developed by Microsoft. Like OpenVPN, it is a SSL/TLS VPN, which means it will look like encrypted web activity over the network. Unlike OpenVPN, SSTP encapsulates the VPN traffic in a HTTP session, so it will look exactly like traffic coming from your favorite web browser.

[/bsf-info-box][bsf-info-box icon_type=”custom” icon_img=”id^4143|url^https://electrical-md.com/wp-content/uploads/2018/10/stream.jpg|caption^null|alt^null|title^stream|description^null” img_width=”100″ title=”PPTP (Point-to-Point Tunneling Protocol)” pos=”left” title_font_style=”font-weight:bold;”]

While PPTP is typically used on older operating systems and dated mobile devices, it is the protocol that is most likely to work when the rest are failing. Because of many known security vulnerabilities, however, PPTP is only recommended as a last-resort for low-risk speed-intensive browsing, like streaming video.


[ultimate_heading main_heading=”What VPN Connection Types Does IPVanish Offer?” heading_tag=”h3″ main_heading_style=”font-weight:bold;” main_heading_margin=”margin-bottom:10px;”][/ultimate_heading][bsf-info-box icon_type=”custom” icon_img=”id^3390|url^https://electrical-md.com/wp-content/uploads/2018/10/firewall.png|caption^null|alt^null|title^firewall|description^null” img_width=”100″ pos=”left” title_font_style=”font-weight:bold;”]OpenVPN

We allow connections via TCP or UDP on ports 443 or 1194. The IPVanish software uses port 443.


Both need the PPTP & L2TP pass-through options in the firewall/router’s management interface to be enabled (if applicable). Routers without these options may not support PPTP or L2TP traffic.

  • To allow PPTP traffic, open TCP port 1723.
  • To allow L2TP w/IPSec traffic, open UDP ports 500, 1701 & 4500.

Internet Key Exchange

Both protocols use UDP port 500.