What is OpenVPN protocol?
OpenVPN is one of the youngest, since it was released in 2001, and widely used open-source technology, i.e. everyone can freely use it and modify it as needed. It uses a custom security protocol that utilizes SSL/TLS for key exchange, creating secure point-to-point or site-to-site connections. OpenVPN can run over User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) tunnel transports. This makes your web traffic indistinguishable from the traffic using standard HTTPS over SSL, and it is therefore extremely difficult to detect and block.
VPN Unlimited currently supports only OpenVPN via the UDP port. It is a simple OSI transport layer protocol for network applications based on Internet Protocol (IP). UDP is the main alternative to TCP and one of the oldest network protocols, introduced in 1980. UDP is an ideal protocol for network applications in which perceived latency is critical such as gaming, voice and video communications. The protocol permits individual packets to be dropped and UDP packets to be received in a different order than that in which they were sent, allowing for better performance.
Features and technical details
Due to its strong features, ease of use, and extensive support, OpenVPN became one of the most popular VPN software solutions. Here are more characteristics of the protocol:
- High level of security and configurability
- Use of up to 256 bit encryption
- Support for dynamic IP addresses and DHCP
- Scalability to hundreds or thousands of users
- Portability to most major OS platforms through third party software
- No support for IPSec, L2TP and PPTP
VPN Unlimited uses OpenVPN as a default protocol for Windows, Android and Linux. To increase security on your iOS devices, we recommend you to enable our special technology, called KeepSolid Wise that operates via TCP port and makes your VPN traffic appear like an innocent-looking transformed traffic instead, e.g. standard HTTPS.
- Extremely secure
- Goes through firewalls
- Open source
- Uses a wide range of encryption algorithms
- Highly configurable
- Uses third party software
- Support on mobile devices needs improvements
- Requires technical knowledge to configure