{"id":323,"date":"2015-06-18T18:46:54","date_gmt":"2015-06-18T18:46:54","guid":{"rendered":"http:\/\/tedstechshack.com\/?p=323"},"modified":"2015-06-18T18:46:54","modified_gmt":"2015-06-18T18:46:54","slug":"comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn","status":"publish","type":"post","link":"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/","title":{"rendered":"Comparison of VPN Protocols: PPTP, L2TP\/IPsec, SSTP, and OpenVPN"},"content":{"rendered":"

The most popular VPN protocols in use today are PPTP, L2TP\/IPsec, SSTP, and OpenVPN. Each of these has its strengths and weaknesses and it can be difficult to decide which is the best choice for your situation. Not all VPN providers support all of these protocols, SSTP being the notable exception, but most will support the other three. I hope that my independent review of them, will help you to decide, which of these is the best for you.<\/p>\n

The main facets to consider are; reliability, security, performance, and ease of use.<\/p>\n

read more…<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The most popular VPN protocols in use today are PPTP, L2TP\/IPsec, SSTP, and OpenVPN. Each of these has its strengths and weaknesses and it can be difficult to decide which is the best choice for your situation. Not all VPN providers support all of these protocols, SSTP being the notable exception, but most will support […]<\/p>\n","protected":false},"author":1,"featured_media":325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":""},"categories":[4],"tags":[],"jetpack_featured_media_url":"https:\/\/tedstechshack.com\/wp-content\/uploads\/2015\/06\/VPN-protocols.jpg","jetpack_publicize_connections":[],"yoast_head":"\nComparison of VPN Protocols: PPTP, L2TP\/IPsec, SSTP, and OpenVPN - Ted's Tech Shack<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comparison of VPN Protocols: PPTP, L2TP\/IPsec, SSTP, and OpenVPN - Ted's Tech Shack\" \/>\n<meta property=\"og:description\" content=\"The most popular VPN protocols in use today are PPTP, L2TP\/IPsec, SSTP, and OpenVPN. Each of these has its strengths and weaknesses and it can be difficult to decide which is the best choice for your situation. Not all VPN providers support all of these protocols, SSTP being the notable exception, but most will support […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/\" \/>\n<meta property=\"og:site_name\" content=\"Ted's Tech Shack\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-18T18:46:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2015\/06\/VPN-protocols.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tedstechshack.com\/#website\",\"url\":\"https:\/\/tedstechshack.com\/\",\"name\":\"Ted's Tech Shack\",\"description\":\"Solving your technology needs!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/tedstechshack.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2015\/06\/VPN-protocols.jpg\",\"width\":800,\"height\":389},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/#webpage\",\"url\":\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/\",\"name\":\"Comparison of VPN Protocols: PPTP, L2TP\/IPsec, SSTP, and OpenVPN - Ted's Tech Shack\",\"isPartOf\":{\"@id\":\"https:\/\/tedstechshack.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/#primaryimage\"},\"datePublished\":\"2015-06-18T18:46:54+00:00\",\"dateModified\":\"2015-06-18T18:46:54+00:00\",\"author\":{\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tedstechshack.com\/2015\/06\/18\/comparison-of-vpn-protocols-pptp-l2tpipsec-sstp-and-openvpn\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\",\"name\":\"Ted Parvu\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04344bf248172739a95607c68db267dc?s=96&d=retro&r=pg\",\"caption\":\"Ted Parvu\"},\"description\":\"My hacking career began at age 12, when my father brought home a Sinclair ZX-81 computer kit and a lifelong fascination with computing was born. I became a privacy and security advocate after learning of the US Government's criminal investigation against Phil Zimmermann. Years later I found myself in Silicon Valley being paid to hack Phil's PGP code. I soon tired of the rat race and moved to the Northwoods of Minnesota where I have over 2 million acres of protected wilderness to roam. Here I indulge in my passions for wilderness and technology and as an advocate for computer security and privacy.\",\"sameAs\":[\"https:\/\/www.facebook.com\/tedstechshack\",\"https:\/\/www.linkedin.com\/pub\/ted-parvu\/41\/b22\/25\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5bhup-5d","_links":{"self":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/323"}],"collection":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":2,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/323\/revisions\/326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media\/325"}],"wp:attachment":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}