Your IP: • ISP: Intranet • Your Status: Unprotected


What Is A VPN Protocol?

A protocol is a set of rules that a VPN uses to establish a connection to a server. It includes important parameters like how the connection will be established, how the session keys will be exchanged, and what encryption algorithms will be used.

OysterVPN offers PPTP, L2TP/IPsec, IKEv2, and OpenVPN protocols. Each VPN protocol is a little different from the other but ultimately defines how a connection is secured.

One VPN protocol may be faster and the other more secure. You can set your preferred VPN protocol at any time in OysterVPN.

What is Tunneling?

Tunneling means encapsulating data inside a wrapper for sending it over the internet. Data packets are wrapped inside another set of data packets and marked with header information, such as destination and source. Encapsulating data allows it to move through networks that may not support a protocol. It avoids incompatibility issues when traversing the ocean of networks that is the internet.

What is Encryption?

Encryption is the process of converting plaintext into ciphertext – an unreadable format that is encoded by a special key. Once encrypted, data can only be decrypted using the right key. OysterVPN uses encryption to hide your internet activities and data from third parties such as ISPs and hackers. When you connect to a VPN server, OysterVPN uses 256-bit encryption to secure internet traffic before it reaches the VPN server where it is decrypted.

What is Difference Between TCP and UDP?

Transmission Control Protocol and User Datagram Protocol are two protocols for delivering data over a network. They dictate how data packets arrive and rearrange at the destination. TCP is more reliable because it waits for an acknowledgment before sending the next data packet, whereas UDP is faster because it focuses on delivery over reliability. UDP is preferable for applications like video streaming where the reliability of data packets is not the most important thing.

Frequently asked questions

IKEv2 is suited for mobile devices because it can maintain VPN connection during changing networks, such as when switching between cellular data and Wi-Fi. OpenVPN may help you bypass firewalls when running in TCP mode.
OpenVPN is an open-source protocol which uses Transport Layer Security (TLS) and can run in both TCP and UDP modes.

Secure your digital life

24/7 Customer Support

Real humans, not bots. We make sure that you can connect with us quickly via live chat and email for troubleshooting issues and any queries.


We back up your purchase with a money-back Guarantee. Don't like OysterVPN? Just reach out to us and we'll refund your money.