Supported VPN Tunnel Topologies

LiquidVPN supports multiple VPN tunnel topologies that our OpenVPN users can select from.

LiquidVPN Supports Four Different VPN Tunnel Topologies

Use the links below to navigate.
A VPN Tunnel Prevents Hackers From Stealing Your Data

Meet the OpenVPN Tunnel Topologies

Public IP VPN Topology

Dynamically assigned public IP addresses are available in many locations. We recommend  public IP connections for day to day web surfing, P2P downloading, gaming, VOIP and other general activities.

Whenever you choose an OpenVPN configuration labeled “Public” you are randomly assigned your own public IP address. Once you log off the public IP address goes back in the pool until it is assigned to someone else.

Because there is no NAT firewall in front of your device with this configuration we do not recommend using a Public VPN tunnel on tablets and smartphones. You should also keep in mind that these public IPs have a 1 user per public IP ratio so it is generally considered easier to track a user back to the OpenVPN tunnel using the public IP address they were assigned.

Read More
1 vpn user per tunnel

1 Person Per IP

With a dynamic VPN tunnel you do not have to worry about being penalized because of what others are doing while they are connected to the same server cluster as you.
No Server Side Firewall

Limited Firewall

With a dynamic IP you have 100% unrestricted internet access. There is no NAT firewall to protect you. Any virus, malware or backdoor could have complete access to your device. We recommend improving your VPN security with Comodo firewall.
VPN for Tablet

Ease of Use

Dynamic IPs will function almost exactly like your home connection. You will see very little difference then surfing from your normal broadband connection.
Privacy for your devices

Less Privacy

Because the VPN tunnel is 1 public IP per user it is in theory possible for a 3rd party to track traffic back to you.

Shared VPN Tunnel

Shared IP addresses are available in all locations. It is the default PPTP/L2TP/SSTP/OpenVPN topology. A VPN tunnel on a shared IP is protected from many incoming threats. It is great on mobile devices or when added security/privacy is needed.

When you use an OpenVPN configuration labeled “Shared” your encrypted VPN traffic will exit the VPN server on the same public IP address used for everyone else on that server currently connected to their own encrypted OpenVPN tunnel with a shared IP address. Every time you logon to that server you will use the same shared IP address.

Users that choose to connect to a VPN Tunnel with a shared IP address have the added benefit of being protected behind our servers NAT firewall. We recommend using a VPN tunnel with a shared IP address whenever you need to connect from a smartphone, tablet or any device without a built-in firewall to protect your data.

Read More
No Port Forwarding

No Forwarding

Many torrent clients or remote desktop software require open ports for the fastest connection. With a shared IP VPN tunnel many of these incoming connections have no path to get to your device. Meaning your download might not happen at full speed.
Server Firewall Included

Server Firewall

When you use a VPN connection with a shared IP address you connect to a private network with our firewall in front of it safeguarding your device from incoming scans, sweeps and probes. This is perfect for devices without a good firewall.
Bad Neighbor effect

Neighbor Effect

When 1 or more people connected to the private VPN network are doing things a search engine or popular website finds abusive (rapid search queries, comment spam, account creation) everyone on the shared IP will be penalized.
Increased VPN Privacy

Increased Privacy

By bundling your VPN traffic with the rest of the connected VPN users it makes it much harder for an attacker or the data center that hosts our servers to trace traffic back to any single LiquidVPN subscriber.

Modulating VPN Tunnel

Modulating addresses are available in most USA locations and EU locations. IP Modulation is only possible with OpenVPN. Anyone wanting enhanced privacy or access to lots of public IP addresses will like Modulating VPN connections.

Whenever you choose an OpenVPN configuration labeled “Modulating” the public IP your traffic exits from will modulate on new connections. To get a better idea of what will trigger your IP to modulate here is a list of some examples.

  • Every image loaded on a webpage.
  • Every external Javascript or CSS loaded on a webpage.
  • Every new HTML page loaded.
  • Every submit/on click event.
  • Every database query or external call.
  • Any other action that causes a new connection to be made.

Deciphering or recreating a LiquidVPN users session when they are using IP modulation and have followed safe browsing best practices would be impossible using any known detection methods.

Read More
VPN Tunnel

More Overhead

P Modulation 2.0 is much faster then version 1.0 but there is still quite a bit of overhead involved on our servers and on your CPU. Expect it to be 20%-40% slower then a non VPN connection. If you have a slow CPU the number could be higher.
High Security Certificate

Max Security

Modulating VPN connections enjoy all the benefits of having a server side firewall. Furthermore IP Modulation protects your device from any type of threat that requires knowledge of your remote IP address.
Multiple VPN protocols

Max Privacy

No VPN service can enhance internet anonymity like our exclusive modulating IP technology. Even ultra slow “double hop” VPN tunnels are easily traceable by internal staff. IP modulation is done at the router making it impossible for anyone (including us) to trace.
Web Target

Broken Websites

Not all websites play nice with IP modulation. On some sites you may find it impossible to login or to stay logged in. Other sites may think you are targeting them with some type of new attack but IP Modulation is usually a benefit to anyone seeking the most privacy possible.

Don't Let The Websites You Browse Browse You!