Supported VPN Tunnel Topologies

LiquidVPN supports multiple VPN tunnel topologies that our OpenVPN users can select from.

LiquidVPN Supports Four Different VPN Tunnel Topologies

Use the links below to navigate.
A VPN Tunnel Prevents Hackers From Stealing Your Data

Meet the OpenVPN Tunnel Topologies

Public IP VPN Topology

Dynamically assigned public IP addresses are available in many locations. We recommend  public IP connections for day to day web surfing, P2P downloading, gaming, VOIP and other general activities.

Whenever you choose an OpenVPN configuration labeled “Public” you are randomly assigned your own public IP address. Once you log off the public IP address goes back in the pool until it is assigned to someone else.

Because there is no NAT firewall in front of your device with this configuration we do not recommend using a Public VPN tunnel on tablets and smartphones. You should also keep in mind that these public IPs have a 1 user per public IP ratio so it is generally considered easier to track a user back to the OpenVPN tunnel using the public IP address they were assigned.

Read More
1 vpn user per tunnel

1 Person Per IP

With a dynamic VPN tunnel you do not have to worry about being penalized because of what others are doing while they are connected to the same server cluster as you.
No Server Side Firewall

Limited Firewall

With a dynamic IP you have 100% unrestricted internet access. There is no NAT firewall to protect you. Any virus, malware or backdoor could have complete access to your device. We recommend improving your VPN security with Comodo firewall.
VPN for Tablet

Ease of Use

Dynamic IPs will function almost exactly like your home connection. You will see very little difference then surfing from your normal broadband connection.
Privacy for your devices

Less Privacy

Because the VPN tunnel is 1 public IP per user it is in theory possible for a 3rd party to track traffic back to you.

Shared VPN Tunnel

Shared IP addresses are available in all locations. It is the default PPTP/L2TP/SSTP/OpenVPN topology. A VPN tunnel on a shared IP is protected from many incoming threats. It is great on mobile devices or when added security/privacy is needed.

When you use an OpenVPN configuration labeled “Shared” your encrypted VPN traffic will exit the VPN server on the same public IP address used for everyone else on that server currently connected to their own encrypted OpenVPN tunnel with a shared IP address. Every time you logon to that server you will use the same shared IP address.

Users that choose to connect to a VPN Tunnel with a shared IP address have the added benefit of being protected behind our servers NAT firewall. We recommend using a VPN tunnel with a shared IP address whenever you need to connect from a smartphone, tablet or any device without a built-in firewall to protect your data.

Read More
No Port Forwarding

No Forwarding

Many torrent clients or remote desktop software require open ports for the fastest connection. With a shared IP VPN tunnel many of these incoming connections have no path to get to your device. Meaning your download might not happen at full speed.
Server Firewall Included

Server Firewall

When you use a VPN connection with a shared IP address you connect to a private network with our firewall in front of it safeguarding your device from incoming scans, sweeps and probes. This is perfect for devices without a good firewall.
Bad Neighbor effect

Neighbor Effect

When 1 or more people connected to the private VPN network are doing things a search engine or popular website finds abusive (rapid search queries, comment spam, account creation) everyone on the shared IP will be penalized.
Increased VPN Privacy

Increased Privacy

By bundling your VPN traffic with the rest of the connected VPN users it makes it much harder for an attacker or the data center that hosts our servers to trace traffic back to any single LiquidVPN subscriber.

Don't Let The Websites You Browse Browse You!