VPN passthrough and IPSec passthrough - Surfshark (2024)

VPN passthrough and IPSec passthrough - Surfshark (1)

What is a Virtual Private Network (VPN) passthrough? You may have heard about it on your online trail in search of a VPN. And yet, you still don’t know what it is? Fear not, for you have stumbled upon an article that will explain everything you need to know about it. Read ahead to find out what a VPN passthrough is, how it’s tied to router functionality, and how to enable it if needed.

Table of contents

    What is a VPN passthrough?

    A VPN passthrough is a router feature that allows VPN traffic to pass through your router using old VPN protocols. This software was built for VPN protocols such as IPSec and PPTP, which would otherwise not work with modern routers.

    Nearly all modern routers have built-in VPN passthrough functionality. Your only input should be activating or deactivating the passthrough for different protocols through router settings. It’s worth keeping in mind that most routers have a VPN passthrough enabled by default.

    A VPN passthrough is sometimes mistaken for having a VPN set up on a router, but these are entirely different:

    • A VPN router encrypts and protects data on all devices connected to its network;
    • A VPN passthrough allows VPN traffic to pass through the router.

    How does a VPN passthrough work?

    A VPN passthrough provides a solution for when a VPN and a router don’t work together. Typically, a VPN connection would go from your device, through your router, to the World Wide Web and connect to a VPN server.

    However, when a VPN protocol doesn’t give the router (or, to be more precise, the router’s Network Address Translation (NAT) — more on that in the next section) anything to work with, a connection becomes impossible.

    That’s where a VPN passthrough becomes necessary. It isn’t a single thing but a set of workarounds that make older tunneling protocols work with the router. And by “older protocols,” we mean PPTP, IPSec, and L2TP.

    VPN passthrough and IPSec passthrough - Surfshark (2)

    For example, a PPTP passthrough replaces GRE (a tunneling protocol used by PPTP) with enhanced GRE. That’s why when we’re talking about a VPN passthrough, we use an umbrella term encompassing PPTP, IPSec, and L2TP passthroughs.

    Surfshark VPN doesn’t use those ancient protocols as they no longer provide the security that would meet the industry standard. Instead, the app utilizes protocols like WireGuard, OpenVPN, and IKEv2, all accounting for NAT’s needs.

    What is an IPSec passthrough?

    As mentioned above, IPSec is an outdated protocol that doesn’t work with NAT routers. An IPSec passthrough uses a NAT-T (Network Address Transition-Traversal) technique to solve this issue.

    In other words, it makes an old protocol work with a modern router. The same goes for PPTP and L2TP passthroughs.

    Do you need a VPN passthrough?

    Likely, you won’t ever need to worry about a VPN passthrough. Here’s why:

    Modern routers are made with passthroughs

    Most routers you can buy these days come with a VPN passthrough already installed. Unless you’re using ancient systems, you should be fine.

    Only ancient protocols need it

    PPTP, L2TP, and IPSec aren’t the newest technologies on the block. More modern protocols like OpenVPN and IKEv2 are smart enough to deal with NAT without special provisions.

    Premium VPNs use newer protocols

    Take Surfshark as an example. Surfshark doesn’t even use PPTP, L2TP, or IPSec, as they no longer provide a satisfactory level of security. Instead, it runs on Wireguard, OpenVPN, or IKEv2.

    Only matters for older computers

    OpenVPN is supported on operating systems as ancient as Windows XP. So if you use something older — it’s probably because you work at a power plant, and the Windows 98 computer is the only one running the emulator for turbine software.

    A VPN passthrough: where does it come from?

    A VPN passthrough exists because of old technologies that can’t play nice with each other. Mainly, it’s because IPv4 had issues that required the development of NAT. Both technologies are still widely employed today.

    IPv4 is the fourth version of the Internet Protocol (IP), a system of communication rules that allows computers to exchange information over a network, thus giving rise to the internet. But for a computer to have a presence on the internet, it has to have an IP address — how else would the data know where to go?

    IP address exhaustion

    That’s where we run into a problem — address exhaustion. IPv4 uses 32-bit address space: it can only support 4.3 billion IP addresses. Even back in 1983, people understood that it wasn’t enough, and we ran out of them in 2015.

    And that’s why NAT was born. Instead of giving EVERY device — a computer, a smartphone, a baby camera, a fridge — a unique IP, you only give a unique IP to the router. That IP is called the “public IP.” The devices get fake IPs (“private IPs”) that are only used for communicating with the router. And that’s the NAT’s area of interest.

    VPN passthrough and IPSec passthrough - Surfshark (3)

    The NAT solution

    Network Address Translation is like a mail-aggregation-and-forwarding system that works in a router.

    It collects the data packages from connected devices, notes which fake IP sent what, slaps the router’s IP address, and forwards it onto the net. It then does the reverse for incoming data. That’s how the issue of address scarcity is avoided even when everyone has three network devices (plus a tablet for the cat).

    Here’s where the issues with a VPN arise. VPN tunneling protocols are a necessity if you want to create a private network that works via a public one. Those protocols re-package the data and encrypt it to make it private. However, this leaves the data package without the information NAT needs to forward it. That’s why a VPN passthrough exists as a technical solution that allows VPN tunneling protocols to traverse NAT.

    Did reading all this give you the impression that the internet is a complex web of systems that don’t want to work together? And that it is full of various fixes, patches, and kludges that barely keep it functional? Well, you’re absolutely right.

    How to enable a VPN passthrough

    So you need a VPN passthrough on your router. As a modern device, it’s likely to have it already. You may just need to turn it on. You can do it via the interface that controls all of the other functions of the router.

    Here’s how it looks on a TP-Link Archer 7 router:

    VPN passthrough and IPSec passthrough - Surfshark (4)

    Every manufacturer provides a different interface, so check their website or your router manual!

    In conclusion: VPN passthroughs — a thing of the past

    A VPN passthrough is a software capability that’s becoming less relevant with each passing day. It was necessary when old VPN protocols didn’t work with NAT, the data traffic resolving system in your router. That’s why a VPN passthrough was an essential functionality.

    Those old protocols are no longer the industry standard. Premium VPNs like Surfshark use newer, more secure protocols that work with NAT. Why not try it out yourself?

    Get a VPN that doesn’t need any passthroughs

    Get Surfshark

    FAQ

    Should a VPN passthrough be enabled?

    No, unless you’re dealing with old VPN protocols like PPTP and L2TP and old routers. And you shouldn’t be using such old protocols anyway.

    What is a VPN passthrough for IPSec?

    Old routers and basic IPSec don’t work together nicely, and a VPN passthrough makes them finally cooperate.

    How do I turn on a VPN passthrough?

    Modern routers allow you to enable a VPN passthrough via the router settings menu. You can access it via your browser by entering the router’s address.

    Should I enable L2TP passthrough?

    Only if you really need it (have an ancient router or can’t use newer protocols for some reason). L2TP is an outdated protocol.

    What’s the difference between a VPN passthrough and a VPN router?

    They are two completely different things that involve a router. A VPN passthrough allows VPN traffic to pass through a router. A VPN router is a router that has a VPN installed on it.

    VPN passthrough and IPSec passthrough - Surfshark (5)

    Written by

    Rokas Aniulis

    Here to provide simple explanations for difficult cybersecurity issues.

    Rate and share this article

    4.5/5

    VPN passthrough and IPSec passthrough - Surfshark (2024)

    FAQs

    Should I enable IPsec passthrough? ›

    Without IPsec Passthrough enabled, your traffic will be blocked if firewall restrictions are in place. This is not an issue if you have a modern router, but it can be an issue if you have an outdated router.

    What is the difference between VPN and VPN passthrough? ›

    A VPN router is a device that supports a VPN client, encrypting and protecting data and online traffic of devices connected to your network. Meanwhile, a VPN passthrough is a router functionality that allows VPN traffic generated by older VPN protocols to pass through the router.

    Does Surfshark support IPsec? ›

    Surfshark VPN uses IKEv2/IPsec, OpenVPN, and WireGuard with the AES-256-GCM algorithm, which is faster than only AES-256.

    What is the best encryption for Surfshark? ›

    The AES 256-bit cipher is considered the best encryption algorithm and is used by the US government, the NSA, and reliable VPN service providers, including Surfshark.

    What does IPsec passthrough do? ›

    IPsec passthrough establishes safe IP connections over gateways using a technique known as Network Address Translation-Traversal (NAT-T). NAT-T ensures that traffic is sent to the specified destination when a device does not have a public IP address.

    What is the major drawback of IPsec? ›

    While IPSec provides robust security for IP communications, its major drawback lies in its complexity and the administrative burden it places on network administrators.

    Which VPN connection mode is best? ›

    The best VPN protocol for you depends on a number of factors, including what device you're using, how much balance between security and speed you want, what type of activities you're doing online, and more. OpenVPN and WireGuard are generally considered the best VPN protocols for day-to-day use.

    What does bypassing VPN mean? ›

    Bypass VPN — allows you to block selected apps and websites from the VPN connection; Route via VPN — allows you to choose certain websites or apps that should be routed through the VPN server while all others remain unaffected.

    What happens if you double VPN? ›

    Double VPN is an advanced VPN security feature that routes your traffic through two VPN servers instead of one, encrypting your data twice. Now with Double VPN, your online activity hides behind two servers instead of one, which is known as VPN server chaining.

    Is IPsec a good VPN? ›

    IPsec is secure because it adds encryption* and authentication to this process. *Encryption is the process of concealing information by mathematically altering data so that it appears random. In simpler terms, encryption is the use of a "secret code" that only authorized parties can interpret.

    Is IPsec the same as VPN? ›

    IPsec is often used to set up virtual private networks (VPNs). A VPN is an Internet security service that allows users to access the Internet as though they were connected to a private network. VPNs encrypt Internet communications as well as providing a strong degree of anonymity.

    How secure is Surfshark VPN? ›

    Is the Surfshark VPN any good? Surfshark is a very good VPN and is among one of the best VPN services, with AES-256 bit encryption, a kill switch, split tunneling, Netflix, and torrenting access, plus a headquarters outside of the Five Eyes alliance.

    What is better than Surfshark? ›

    In short, NordVPN has a larger server network, offering over 6,000 servers in 111 countries, while Surfshark has 3200 servers in 100 countries. However, Surfshark allows unlimited simultaneous connected devices, while NordVPN caps the number of devices at ten. Pricing-wise, Surfshark costs less across all plans.

    What is the most hacked email provider? ›

    What is the most hacked email provider? Historically, large providers like Yahoo have experienced significant breaches, making them among the most hacked email services.

    Why is Surfshark blocking my internet? ›

    Our VPN application makes minor modifications to your connection settings, which may be flagged as a security threat by some antivirus software, resulting in a blocked connection attempt. Additionally, different VPN applications may use conflicting connection configurations, leading to connection cancellation.

    Which IPsec mode should you use? ›

    IPsec AH Tunnel Mode

    This is the most common mode to use when connecting to a VPN server. While the AH protocol establishes a VPN tunnel without encrypting data, it instead provides integrity of the data packets.

    Is it necessary to have IPsec? ›

    Security protocols like IPsec are necessary because networking methods are not encrypted by default. When sending mail through a postal service, a person typically would not write their message on the outside of the envelope.

    Should I enable L2TP passthrough? ›

    VPN protocols such as OpenVPN, SoftEther, and SSTP don't require VPN Passthrough to work effectively. But if you are using IKEv2, PPTP, L2TP, or IPSec, then you will need to turn on VPN Passthrough to allow VPN traffic through.

    Why do I need IPsec? ›

    IPsec guarantees the confidentiality and integrity of a flow, by encapsulating it within the network layer (“internet” layer in the TCP/IP stack or “network” layer in the OSI model). SSL/TLS comes in at a much higher level in the network stack, placing itself on top of the TCP transport layer.

    Top Articles
    Latest Posts
    Article information

    Author: Fr. Dewey Fisher

    Last Updated:

    Views: 6291

    Rating: 4.1 / 5 (42 voted)

    Reviews: 89% of readers found this page helpful

    Author information

    Name: Fr. Dewey Fisher

    Birthday: 1993-03-26

    Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

    Phone: +5938540192553

    Job: Administration Developer

    Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

    Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.