FREQUENTLY ASKED QUESTIONS
VPN stands for “virtual private network” — a service that protects your internet connection and privacy online. VPNs create an encrypted tunnel for your data, protect your online identity by hiding your IP address, and allow you to use public Wi-Fi hotspots safely.
A VPN reroutes your traffic through a remote server, encrypting it in the process. Typically, when you try to access a website, your ISP (Internet Service Provider) receives the request and redirects you to your destination. But when you connect to a VPN, it redirects your internet traffic through a remote server before sending it over to your destination.
First of all, a VPN hides your data from snoopers — encryption is important when you want to protect your internet traffic and minimize your online footprint. This way, your internet service provider won’t be able to sell your entire browsing history to the highest bidder.
Your IP (and, therefore, your virtual location) is also hidden and you get a new one that belongs to the VPN server you’re connected to. This ensures extra security and significantly increases your privacy online — no one knows what city or country you’re browsing from.
These are common VPN functionalities, but FleetVPN aims higher. We want to protect not only your data but your devices as well. That’s why we’ve developed the Threat Protection Pro feature to keep your devices safe from common internet hazards: malware in downloaded files, web trackers, flashy ads, and malicious links. You don’t need to be connected to a VPN server to use it — just turn it on, and it will guard your device 24/7.
A VPN works by creating a secure encrypted connection between your device and a remote server. This way, your data can travel in secrecy instead of through your internet service provider. A VPN hides your real IP address and encrypts your internet connection to make your browsing safer and more private.
It’s worth finding out how a VPN works so you can make use of its full potential. Here’s what’s going on behind the scenes:
- Authentication. When you connect to a virtual private network service, it authenticates your client with a VPN server.
- Encryption. The server then applies an encryption protocol to all data you send and receive.
- Tunneling. The VPN service creates an encrypted “tunnel” over the internet. That secures the data traveling between you and the VPN server.
- Encapsulation. To ensure each data packet stays secure, a VPN wraps it in an outer packet, which is then encrypted through encapsulation. That is the core element of the VPN tunnel, keeping the data safe during transfer.
- Decryption. When the data arrives at the server, the outer packet is removed through a decryption process.
After the VPN tunnel is established, your device sends out encrypted information (like the website you want to visit) to the VPN server. It decrypts it and forwards the information to the designated web server. It also hides your real IP address before sending the data out. Instead, you will appear to have the IP address of the VPN server you’re connected to.
When the web server responds, the VPN server encrypts the data and sends it to you through your ISP. Your VPN client will decrypt the data once it reaches your device.
The VPN tunnel is created by first authenticating your client — a computer, smartphone, or tablet — with a VPN server. The server then uses one of several encryption protocols to make sure that no one can monitor the information traveling between you and your online destination.
Here you should remember that before being sent and received over the internet, any data needs to first be split into packets. To ensure each data packet stays secure, a VPN service wraps it in an outer packet, which is then encrypted through a process called encapsulation.
This exterior packet keeps the data secure during the transfer, and it is the core element of the VPN tunnel. When the data arrives at the VPN server, the outer packet is removed to access the data within, which requires a decryption process.