WeVPN Connection Methods

In a land of protocols, it can sometimes be confusing on which protocol to use.

Virtual Private Networks (VPNs) and VPN protocols are not the same thing. WeVPN offers a range of VPN protocols for our users to connect with depending on their threat model and devices used.

A VPN provider transmits your online traffic through encrypted tunnels to VPN servers that assign your device a new IP address. VPN protocols are sets of programs and processes that determine how the connection is created. Each protocol offers a different solution to the problem of private and secure internet communication.

protocols-hero img


OpenVPN is open source and published under a GNU General Public License. This gives the community access to the source code so that any security flaws are identified and dealt with by a large collective community, rather than allowing potential flaws and backdoors to exist in the code.

SSL/TLS is used for pre-shared key exchange, adding to the security. The encryption utilized for OpenVPN is also open source, as it uses OpenSSL which supports up to 256-bit encryption. OpenVPN comes in two transmission protocols: OpenVPN TCP or OpenVPN UDP. WeVPN offers both connection methods and allows the users to choose between OpenVPN UDP or OpenVPN TCP.



OpenVPN UDP stands for User Datagram Protocol, which is another communications protocol for transmitting data between a client and the internet. Unlike OpenVPN TCP, which is designed to maximize reliability of data transmission, OpenVPN UDP is targeted at low-latency transmission of data, without the emphasis on the guaranteed delivery of data (so therefore reliability is sacrificed).



OpenVPN TCP stands for Transmission Control Protocol, which combined with the Internet Protocol (IP) creates a set of rules for how computers exchange data back and forth. TCP is a protocol that is connection oriented, and it creates and keeps this connection going while applications perform the exchange of their data.

OpenVPN Strength

Bypasses Most Firewalls

OpenVPN can easily be configured to bypass your firewall.

Open Source Code

Anyone can access and read the code. Advanced users contribute to the code to make it more secure.


OpenVPN offers an array of different encryption and traffic protocols, configured for different uses and can be balanced between secure and fast by the end user.

OpenVPN Weaknesses

Large Amount of Code

OpenVPN has over 600,000 lines of code at this point when coupled with the required OpenSSL. This means that OpenVPN is difficult to maintain due to the vast amount of code lines.


When Should I Use OpenVPN?

OpenVPN should be used when the primary concern is security. OpenVPN TCP is the best protocol when using public access WiFi such as in libraries or airports or accessing personal information online such as your bank account. OpenVPN UDP is the best protocol when security is a concern but speed is also advantageous. Such as for audio and video streaming tasks or gaming.


WireGuard is a newer open source VPN protocol which is easier to set up than OpenVPN, has a much smaller and simpler code base, and offers all kinds of technical advantages: up-to-date encryption standards, faster connection times, greater reliability and much faster speeds. However, it’s still considered developmental, so some VPN providers have opted to rebrand WireGuard capabilities.


WireGuard Strength

Open Source Code

Anyone can access and read the code. Advanced users contribute to the code to make it more secure.

Small Amount of Code

WireGuard has around 4000 lines of code, meaning it is easy to maintain and streamlined.

WireGuard Weaknesses


Wireguard is slated to be the next standard in VPN protocols, but its implementation is still in its early stages.

When Should I Use WireGuard?

WireGuard should be used when the primary concern is speed. WireGuard is ideal for streaming, gaming or downloading large files.


IKEv2 was developed by Cisco and Microsoft and creates a secure VPN connection by establishing an authenticated and encrypted connection. IKEv2 was designed to be fast, stable, and secure. It succeeds on all of these fronts, however is best at stability and as such is often used by VPN providers for mobile platforms.

IKEv2 Strength


IKEv2 works with leading encryption algorithms.


IKEv2 only utilises a small amount of bandwidth when active and its NAT traversal makes it connect and communicate faster.


IKEv2 usually uses the Mobility and Multihoming Protocol, which ensures a VPN connection as you move between internet connections.

IKEv2 Weaknesses


IKEv2 isn’t compatible with every system and devices may need to be configured to utilise IKEv2.


When Should I Use IKEv2?

IKEv2 should be used when the primary concern is stability. IKEv2 is ideal for mobile devices and when you are on the move.