- What a VPN Actually Does
- What a VPN Does NOT Do
- VPN Protocols Compared
- Split Tunneling vs Full Tunnel
- Commercial vs Enterprise VPN
- Recommendations
- Full Tunnel (Default on Most VPNs)
- Split Tunneling
- For Individuals (Public WiFi Protection)
- For Organizations
A VPN (Virtual Private Network) creates an encrypted tunnel between your device and a VPN server. All your internet traffic â DNS queries, HTTP/HTTPS requests, everything â flows through this tunnel. To your ISP, the coffee shop router, and any WiFi attacker, your traffic appears as an opaque encrypted stream to the VPN server's IP address.
What a VPN Does NOT DoA VPN does not make you completely anonymous or invincible. Understanding these limitations is critical:
- Doesn't hide your browsing from the VPN provider: The VPN provider sees all your traffic â choose one with a strong no-logging policy
- Doesn't protect against compromised VPN endpoints: If the VPN server is malicious or compromised, all bets are off
- Doesn't prevent phishing or malware delivered over HTTPS: If you download a malicious file over HTTPS, the VPN doesn't protect you
- Doesn't hide you from the website you're visiting: Google, Facebook, and your employer still see your real IP if you're logged in
- Doesn't protect against local physical attacks: PoisonTap, Rubber Ducky, and other physical attacks can bypass VPN protection
- Can be detected and blocked: Some networks block VPN traffic by detecting the protocol
| Protocol | Speed | Security | Setup Difficulty | Best For |
|---|---|---|---|---|
| WireGuard | Fastest | Excellent (modern cryptography) | Easy | Performance, modern deployments |
| OpenVPN (UDP) | Fast | Excellent (open source, audited) | Moderate | General purpose, transparency |
| IKEv2/IPSec | Fast | Good | Easy (built into most OS) | Mobile devices, roaming connections |
| OpenVPN (TCP) | Moderate | Excellent | Moderate | Firewall-evading, stable connections |
| L2TP/IPSec | Slow | Moderate (NSA-backdoored suspected) | Easy | Legacy compatibility only |
| PPTP | Moderate | Broken â DO NOT USE | Easy | Nothing. Never use this. |
All traffic goes through the VPN tunnel. Your ISP and local network see only encrypted VPN traffic. You can't access local resources (printers, local servers) while connected, but you're maximally protected.
Split TunnelingOnly some traffic goes through the VPN. Other traffic (e.g., local network resources, corporate applications) goes through the normal internet path. This is common in enterprise VPN configurations.
# Split tunneling example (OpenVPN client config) route-nopull # Don't route ALL traffic through VPN route 10.0.0.0 255.0.0.0 vpn_gateway # Route corporate traffic through VPN route 0.0.0.0 0.0.0.0 net_gateway # Everything else goes normal route
If you configure split tunneling incorrectly, traffic you expect to be protected (like web browsing) may leak through the normal internet path, especially during VPN reconnection events. If you use a VPN for security on public WiFi, use full tunnel mode â the minimal performance cost is worth the certainty.
Commercial vs Enterprise VPN| Commercial VPN | Enterprise VPN | |
|---|---|---|
| Examples | NordVPN, ExpressVPN, Mullvad, ProtonVPN | GlobalProtect, Cisco AnyConnect, FortiClient, Tailscale |
| Purpose | Privacy, general security | Corporate network access |
| Configuration | User sets up individually | IT department manages centrally |
| Access | Full internet via VPN server | Corporate network resources only |
| Logging | Varies â choose no-log providers | Full corporate logging and monitoring |
| Cost | $3â$13/month | Per-user licensing, often included in security suite |
- WireGuard via a reputable provider (Mullvad, NordVPN, ProtonVPN)
- Enable the VPN kill switch (stops all traffic if VPN drops)
- Use full tunnel mode on public WiFi
- Avoid free VPNs â they monetise your data
- Corporate VPN required for all remote work, especially from public networks
- Deploy VPN profiles via MDM for managed devices
- Consider Zero Trust Network Access (ZTNA) solutions like Cloudflare Access or Twingate as modern alternatives
- Monitor for unauthorized VPN usage (shadow IT risk)