What Are Virtual Private Networks and How Do They Work?

Learn how virtual private networks work, which protocols to use, and where VPNs fit alongside Zero Trust in your enterprise security strategy.

Abnormal AI

April 19, 2026


Virtual private networks let people and organizations move sensitive information across public networks without trusting those networks to keep it safe. That matters any time your data travels through infrastructure you don't control, where someone else could quietly intercept, read, or change it along the way. Getting a feel for that risk is where modern network security really starts to click.

Key Takeaways

  • A virtual private network creates a secure, encrypted tunnel over public infrastructure, providing confidentiality, data integrity, and authentication for transmitted information.

  • VPN connections follow a structured process of negotiation, identity verification, key exchange, and encryption before any user data flows through the tunnel.

  • Several VPN types and protocols exist, each suited to different use cases, and choosing the wrong protocol can leave data vulnerable to known attacks.

  • VPNs protect data in transit but do not make users anonymous, secure endpoint devices, or eliminate the need for trust in a provider.

  • Zero Trust Network Access (ZTNA) is gradually supplementing traditional VPN architectures, though most organizations still rely on VPNs as a core access tool.

What Is a Virtual Private Network?

A virtual private network is a logical private connection created over shared public infrastructure.

Defining the Core Concept

The NIST glossary describes three structural attributes. First, a VPN is logical, meaning it is created by software rather than by dedicated physical cables. This software-defined nature makes VPNs flexible and scalable, allowing organizations to create secure connections on demand without building physical infrastructure. Second, it operates over public infrastructure, most commonly the internet. Third, it emulates the properties of a private network through security mechanisms like encryption and authentication. The IETF VPN frames it functionally as "the emulation of a private network facility across a shared IP based network infrastructure."

Understanding the Problem VPNs Solve

VPNs solve the problem of sending data across networks where unauthorized parties may intercept, read, or modify it.

  • Confidentiality: Data cannot be read by outsiders.

  • Integrity: Data cannot be altered in transit without detection.

  • Data Origin Authentication: You can verify the sender's identity.

  • Replay Protection: Captured packets cannot be re-sent by attackers.

  • Access Control: Only authorized users reach protected resources.

Together, these properties transform an inherently open network into something that behaves like a private one.

How Virtual Private Networks Establish Secure Connections

Virtual private networks establish secure connections through negotiation, authentication, key exchange, and packet protection.

Negotiating Security Parameters

Before any data flows, both endpoints must agree on how they will communicate securely. Each side proposes which encryption algorithm to use, which hashing algorithm ensures integrity, which authentication method verifies identity, and which Diffie-Hellman group to use for key exchange. Once both sides accept a matching set of parameters, the connection moves forward. This negotiation phase is handled by the Internet Key Exchange (IKE) protocol, which manages the entire setup process automatically.

Proving Identity Through Authentication

Authentication confirms that each endpoint is communicating with the right party, not an imposter. Two primary methods exist. Digital certificates are the more secure option: each party holds a public/private key pair, and the private key proves identity while the other party's public key verifies it. Pre-shared keys (PSK) are simpler but less secure, relying on a shared password established in advance. NIST SP 800-77 explicitly describes PSK as "a less secure method of identity authentication." For remote users on laptops or phones, methods like username/password via the Extensible Authentication Protocol (EAP) are also common.

Generating Shared Encryption Keys

After authentication, both parties need the same encryption key, but sending that key across the internet would defeat the purpose. The Diffie-Hellman algorithm solves this by allowing both sides to exchange mathematical values publicly, then independently calculate the same shared secret using their own private values. The actual secret never crosses the network. A related concept called Perfect Forward Secrecy (PFS) adds further protection: when a fresh key exchange happens for each session, compromising one session's key cannot decrypt previously recorded sessions.

Wrapping, Encrypting, and Delivering Data Packets

With keys in place, the VPN applies ESP RFC. The original data packet, including its real source and destination addresses, gets fully encrypted. A new outer IP header is added containing only the VPN gateway addresses. An integrity check value (ICV) is appended so the receiver can detect any tampering. Anyone intercepting the packet on the public internet sees only the outer VPN gateway addresses and encrypted ciphertext. The original content, sender, and destination remain concealed.

When the encrypted packet reaches the VPN server, the process reverses. The server verifies the integrity check value, rejects any replayed packets, looks up the correct encryption keys, decrypts the payload, and forwards the original packet to its intended destination on the private network. Throughout the session, keys are periodically rotated to limit exposure if any single key were compromised.

Types of a Virtual Private Network

Virtual private networks are commonly grouped by topology, which explains who or what the tunnel connects.

Site-to-Site VPNs

A site-to-site VPN connects two entire networks through gateway devices at each location. The encrypted tunnel runs between the gateways, and end users on either network require no VPN software. All traffic between the two networks passes through the tunnel automatically, with the gateways handling all encryption and decryption transparently. Organizations commonly use this topology to connect branch offices to headquarters or to link business partner networks, often replacing expensive private leased lines with encrypted internet connections.

Remote Access VPNs

A remote access VPN connects an individual user to an organizational network. Each remote user establishes their own tunnel from a personal device to a VPN gateway. This is the most common enterprise VPN deployment pattern, enabling employees to securely access internal resources while working from home, traveling, or connecting from untrusted networks. Depending on the implementation, a remote access VPN may require a dedicated client application or work through a standard web browser. Split tunneling, which routes only corporate-bound traffic through the VPN, is a common configuration option in this topology.

Host-to-Host and Mesh VPNs

Host-to-host and mesh VPNs extend encrypted connections beyond the gateway-centered model. Host-to-host VPNs create a tunnel between two specific machines without any gateway involved. VPN software runs on both endpoints, providing the most granular control over exactly which systems communicate through the encrypted channel. This approach is useful for securing traffic between a specific pair of servers but is impractical at organizational scale. Mesh VPNs take a different approach, with many hosts maintaining encrypted tunnels directly to multiple peers rather than routing everything through a central gateway. Mesh architectures eliminate single points of failure but grow complex as the number of nodes increases.

Major Virtual Private Network Protocols and How They Compare

VPN protocols differ mainly in how they balance security, performance, and operational complexity.

IKEv2/IPsec

IKEv2/IPsec is the backbone of most enterprise and government VPN deployments. Defined by IETF standards, it operates at the network layer and can protect all IP-level traffic. NIST SP 800-77 recommends AES-GCM encryption with 128, 192, or 256-bit keys and HMAC-SHA-256, HMAC-SHA-384, or HMAC-SHA-512 for integrity checks. IKEv2 supports NAT traversal natively and handles rekeying efficiently. One primary trade-off is that its large codebase creates a broad potential attack surface that demands careful configuration and ongoing maintenance.

WireGuard

WireGuard is a newer, minimalist VPN protocol originally written for the Linux kernel. Its fixed cryptographic suite emphasizes simplicity and a smaller attack surface. The trade-off is that this rigidity offers no ability to swap algorithms if one is later found vulnerable.

OpenVPN and Deprecated Protocols

OpenVPN is a widely used SSL-based VPN that runs over either TCP or UDP on any configurable port. It supports AES-256-GCM encryption and TLS certificates for authentication. Because it operates as a user-space application rather than within the operating system kernel, it carries higher latency and overhead than kernel-based alternatives. Organizations should also be aware that NIST has explicitly flagged older protocols like PPTP and L2TP/IPsec as deprecated. NIST states these protocols "must not be used" because their encryption has become too weak to withstand current attacks.

Real-World Use Cases for VPN Deployments

VPN deployments are most useful when people or organizations need to protect traffic in transit across networks they do not control.

Securing Remote and Third-Party Access

The dominant enterprise use case is connecting remote employees to corporate resources over encrypted tunnels. VPN gateways can control which network segments and applications a remote user can reach after authentication. However, CISA noted that organizations may have a limited number of simultaneous VPN connections, and exceeding that capacity can disrupt critical business operations. VPN connections for vendors, contractors, and business partners introduce additional risk when access governance is lax. Connections that persist after contracts end can become unmonitored entry points. On the personal side, the FTC advises individuals to use a VPN when connecting to public Wi-Fi, noting that public networks do not provide secure internet connections on their own.

Supporting Compliance and Specialized Environments

Regulated and specialized environments often rely on VPNs to protect sensitive traffic in transit. Federal agencies follow CISA's Trusted Internet Connections 3.0 framework, which routes remote users through VPN connections with services restricted to authenticated, VPN-connected users.

Industrial control system (ICS) environments frequently employ a two-hop architecture, where technicians VPN into a demilitarized zone and then connect to operational technology systems through a hardened jump host.

Common Misconceptions About a Virtual Private Network

Virtual private networks protect data in transit, but they do not solve every security or privacy problem.

Overestimating Privacy and Anonymity

A VPN does not make you anonymous online. While it hides your traffic from your local network and internet service provider, the VPN provider itself can see your activity. "No-log" policies are difficult to verify independently because VPN services operate on closed platforms. A VPN shifts the trust relationship from your ISP to your VPN provider, and it does not eliminate the need for trust altogether. Your provider may also be subject to legal requests for user data regardless of stated policies.

Assuming VPNs Are a Complete Security Solution

Deploying a VPN does not secure an organization's remote access on its own. Some VPN implementations authenticate users only once at session initiation, then grant access to all authorized resources for the entire session. If credentials are stolen or a device is compromised, an attacker gains persistent access. VPN infrastructure itself has become a high-value target, not just a defensive tool.

Overlooking Performance and Configuration Risks

VPN overhead can be meaningful. Protocol choice creates real performance differences across modern options. Split tunneling, which routes only some traffic through the VPN to improve speed, introduces its own risks by exposing traffic outside the tunnel to ISPs and destination services. The security trade-offs of any performance optimization deserve careful evaluation.

The Shift Toward Zero Trust Network Access

Zero Trust Network Access narrows access decisions to specific resources instead of extending broad network-level trust.

Understanding the Zero Trust Model

The trust model behind traditional networks assumed that users inside the network perimeter could be trusted. NIST Zero Trust defines Zero Trust as "an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources." Every access request must be verified regardless of where it originates, and verification is continuous rather than one-time. Remote users should not need a VPN to backhaul traffic through the corporate network when accessing cloud-hosted services.

Comparing ZTNA With Traditional VPN Access

ZTNA limits access to specific applications, while a traditional VPN often grants broader network access after authentication. Everything else on the network remains hidden. Authentication is continuous and context-aware, evaluating factors like device health, location, and user behavior alongside credentials. This narrower access model significantly reduces the blast radius if credentials are compromised. Organizations typically deploy ZTNA alongside existing VPN infrastructure as an overlay, then gradually migrate workloads rather than cutting over all at once.

Recognizing the Hybrid Reality

VPNs and ZTNA will coexist for years in most environments. NIST's Zero Trust Architecture project acknowledges that ZTA solutions must interoperate with legacy technologies. For most organizations, VPN and ZTNA will coexist for years as infrastructure matures and workloads migrate incrementally.

Frequently Asked Questions

Building a Clearer Picture of VPN Security

Virtual private networks remain a foundational tool for securing data in transit across public infrastructure. They provide encryption, authentication, and access control, but they do not guarantee anonymity or replace broader security controls. As organizations weigh VPNs alongside ZTNA and Zero Trust architectures, understanding both their strengths and limits leads to more resilient security decisions.

Related Posts

Blog Thumbnail
2026 Attack Landscape Report: BEC Tactics Adapt to Your Operations

April 22, 2026

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Loading...