A Guide to VPN Protocols
Author: Sue Poremba,Date published: October 3, 2025 Examples of use cases for common protocols include:,A site-to-site VPN connects multiple networks, such as a corporate network with multiple branch offices. Internet Protocol Security (IPSec) authenticates and then encrypts individual IP packets. It offers a suite of security protocols that add encryption services to other protocols. This protocol is commonly used for site-to-site VPN tunnels. Layer 2 Tunnel Protocol (L2TP) is often paired with IPSec because, while it creates the tunnel and handles authentication, it doesn't have any encryption. Call sales,Chat with us,Have us contact you,Get updates,Already have an account?,* Required,The information provided will be used in accordance with our terms set out in our . Please confirm you have read and understood this Notice,Verizon may wish to contact you in the future concerning its products and/or services. If you would like to receive these communications from Verizon, indicate by selecting from the dropdown menu below. Please note that you can unsubscribe or update your preferences at any time. By submitting the form, you are agreeing to receive insights, reports and other information from Verizon and affiliated companies in accordance with our . California residents can view our California Privacy Notice .
Learn more