Get a powerful VPN you can trust

Download Norton VPN to encrypt your connection, secure the data you send and receive, and keep your online activity hidden.

Get a powerful VPN you can trust

Download Norton VPN to encrypt your connection, secure the data you send and receive, and keep your online activity hidden.

Norton VPN

Get a powerful VPN you can trust

Download Norton VPN to encrypt your connection, secure the data you send and receive, and keep your online activity hidden.

Norton VPN

Who's this for?

Answer 3 quick questions to get matched with the best protection. Firstly, choose who or what you need to cover below.

What are you most concerned about?

We'll suggest the best coverage for your concerns. Select all that apply.

How many devices do you need to protect?

For the best protection, cover every device you use online.

Creating your recommendation

norton:productquiz:iconturninggears
Did you know?
Norton technology blocks millions of cyberthreats every day.
Trusted by millions of customers around the globe.
Norton™ Mobile Security
Standard
£ 29.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • Protection for 1 iPhone® or iPad®
  • Scam Protection
  • Wi-Fi Security
  • Internet Security
  • Device Security
Norton AntiVirus
Plus
£ 34.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PC, Mac, tablet, or phone
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 2 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
Norton 360
Standard
£ 24.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 10 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
Norton Identity Advisor
Plus
£ 19.99/per yr

Payment method required.
When trial ends, paid subscription starts and automatically renews at {ar}/year, unless the renewal is cancelled. Price is subject to change. Subscription details below.*

  • Financial Monitoring​
  • Credit Report and Score​18
  • Credit Alerts​18
  • Identity Restoration Support
  • Social Media Monitoring17
  • Dark Web Monitoring​§
Norton 360
Deluxe
£ 89.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 50 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
Norton VPN
Standard
£ 59.99first yr

Automatically renews at {ar}/year, unless the renewal is cancelled. Price is subject to change.
Subscription details below.*

  • IP masking to hide your online activities
  • Access your favourite content across borders
  • Ad Blocker to browse without annoying ads14
  • No-log policy to ensure your privacy
  • Kill Switch to help prevent privacy exposure
  • IP Rotation and Double VPN for extra privacy
  • AI-powered protection against scams, phishing, and malware. 
  • Monitoring for your info on the dark web§
  • Password Manager to use strong passwords
  • 10 GB of Cloud Backup4 for valuable files
Norton
Small Business Premium
£ 219.99/first yr (Up to 5 employees)

Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Alerts on suspicious transactions on your company's bank accounts.
  • Social Media Monitoring to help you prevent admin account takeover.17
  • Business Tech Support on call 24/7, ready to assist with common tech issues and virus removal.
  • Secure VPN for a safer internet connection wherever work takes you.
  • 500 GB secure Cloud Backup for your business-critical data.21
  • Driver Updater for enhanced security and more reliable PC performance.21
Norton 360
Advanced
£ 149.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Scam Protection Pro
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 200 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
  • Identity Restoration Support
  • Credit Report and Score18
  • Credit Alerts18
  • Stolen Wallet Assist
  • Social Media Monitoring17
  • Financial Monitoring
Norton
Small Business
£ 129.99/first yr

 Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21
Norton
Small Business
£ 74.99/year

Automatically renews, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21

Your personalized matches

norton:productquiz:iconshieldnumber60
60-day money-back guarantee
  • Best choice

  • Better choice

  • Good choice

*Important subscription, pricing, and offer details:

  • By subscribing, you are purchasing a recurring subscription which will automatically renew.
  • The price quoted today is valid for the offered introductory term. After that, your subscription will be billed at the applicable monthly or annual renewal price here. The price is subject to change, but we will always send you a notification email in advance.

2 Requires an automatically renewing subscription for a product containing antivirus features. For further terms and conditions, please see norton.com/virus-protection-promise.
4 Only available on Windows systems (but not in S mode or on ARM processors).
21 Utilities Ultimate, Driver Updater, Software Updater, and Cloud Backup features are only available on Windows (excluding Windows in S mode and Windows running on ARM processor).
22 Private Browser is only available on Windows (excluding Windows in S mode and Windows running on ARM processor) and Mac.
Monitoring available on Windows™ PC, iOS, and Android™ devices. Not all features available on all platforms.
§ Monitoring not available in all countries and varies based on region.

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

What is a VPN tunnel and how does it work?

A VPN tunnel provides an encrypted channel for your internet data, helping to prevent hacking and eavesdropping. Keep reading to learn more about VPN tunnels and how they work. Then, get Norton VPN to access ultra-secure, flexible tunneling protocols to suit your needs.

An image of a new user selecting a protocol and configuring his VPN tunnel.

A VPN (virtual private network) tunnel is a secure, encrypted connection between your device and a remote server that helps protect the data you send and receive from interception.

“Full tunnels” encrypt all your internet traffic, whereas “split tunnels” let you choose to encrypt some data streams while keeping others open, which can be helpful while streaming. The level of protection provided by any VPN tunnel depends on the encryption protocols used and the security measures of the VPN service itself.

How does VPN tunneling work?

VPN tunneling works by using tunneling protocols to create a secure, encrypted connection between a device and a remote server. Internet traffic is then routed through this tunnel to protect data against packet sniffing or other forms of interception, helping to hide internet activity from hackers, snoops, and other third parties.

Once you turn on your VPN, it may prompt you to select a protocol if there are multiple options. Then, the VPN will establish an encrypted connection between your device and the server, hiding your IP address and allowing you to send and receive data privately and securely.

A diagram showing how VPN tunneling works.
A diagram showing how VPN tunneling works.
A diagram showing how VPN tunneling works.

Here’s a closer look at how the tunneling process works:

  1. Choose a VPN service: Subscribe to a VPN service like Norton VPN and install the app on your device.
  2. Select a VPN protocol: Many VPNs come with a default protocol you can’t change, but if prompted, choose one based on your security and speed requirements.
  3. Establish an encrypted channel: Turn on your VPN to create a secure, encrypted connection to a VPN server.
  4. Your IP address is hidden: Your real IP address is obscured behind the virtual IP assigned via the VPN server, making your session more anonymous.
  5. Transmit encrypted data: Now, you can privately browse, shop, stream, game, message, and more—all your internet traffic will be encrypted and sent through the secure VPN tunnel.
  6. The server receives data: The VPN server receives your encrypted data and decrypts it.
  7. The server sends data: The VPN server forwards the unencrypted data to the intended destination such as a website or file-sharing service.
  8. Return data is encrypted and sent to your device: Incoming data gets encrypted by the VPN server and sent back through the secure tunnel to your device.

Types of VPN tunneling protocols

The different types of VPN protocols include the Point-to-Point Tunneling Protocol (PPTP), the Layer 2 Tunneling Protocol (L2TP), the Secure Socket Tunneling Protocol (SSTP), OpenVPN, and WireGuard. VPNs use these to create secure tunnels that protect data during transmission.

A table overviewing different protocols’ performance and capabilities.
A table overviewing different protocols’ performance and capabilities.
A table overviewing different protocols’ performance and capabilities.

Each VPN tunneling protocol has strengths and drawbacks—some are fast, some are ultra-secure, and others are compatible with specific platforms and devices. Here’s a deeper dive into what each of them has to offer.

WireGuard

WireGuard is a free, lightweight, open-source VPN protocol. Unlike older protocols, WireGuard is known for its fast connection speeds, efficient resource usage, and straightforward configuration. It uses advanced cryptographic techniques to create a secure, encrypted data tunnel.

Already a popular VPN tunnel protocol, it continues to gain favour among mobile users. And, as it’s still in active development, its performance will likely only improve as it receives new updates.

  • Security: High
  • Speed: Fast
  • Type: Full tunnel or split tunnel

OpenVPN

OpenVPN is a widely used, open-source VPN protocol known for its strong security and flexibility. It’s currently considered one of the top VPN tunneling protocols because of its encryption strength, customisability, and ability to get past firewalls.

This protocol works with major operating systems like Linux, Windows, and Mac, and mobile operating systems such as Android and iOS. If you prefer independent operating systems, OpenVPN also works with systems such as FreeBSD, NetBSD, Solaris, and OpenBSD.

  • Security: High
  • Speed: Medium
  • Type: Full tunnel or split tunnel

Secure Socket Tunneling Protocol (SSTP)

SSTP (Secure Socket Tunneling Protocol) is a highly secure VPN protocol developed by Microsoft. It encapsulates data within an SSL/TLS encrypted tunnel and doesn’t use fixed ports, allowing it to provide strong protection and bypass firewalls, potentially including even the Great Firewall of China, which censors certain types of online content and blocks many VPN protocols.

The main drawback of the SSTP is limited compatibility—while it’s natively supported on Windows machines you need a third-party app that supports SSTP to use it on other devices.

  • Security: High
  • Speed: Medium
  • Type: Full tunnel

Layer 2 Tunneling Protocol (L2TP/IPsec)

L2TP/IPsec combines two protocols— the Layer 2 Tunneling Protocol and Internet Protocol Security—to establish a secure VPN connection. L2TP creates a tunnel for data transmission, while IPsec handles the encryption and authentication of that data. Together, they provide reliable VPN connections for various devices and operating systems.

While it’s still a widely supported protocol, there are several faster and more compatible options available.

  • Security: Moderate
  • Speed: Medium
  • Type: Full tunnel

Point-to-Point Tunneling Protocol (PPTP)

PPTP (Point-to-Point Tunneling Protocol) is one of the oldest VPN protocols and isn’t used much anymore. In its heyday, it was known for its extremely fast connection speeds and easy setup. But that speed comes at a cost, because its level of data encryption is weak compared to today's standards. That means it's easier for hackers to access user data in transit.

  • Security: Low
  • Speed: Fast
  • Type: Full tunnel

What is VPN split tunneling?

VPN split tunneling is a feature that allows you to choose which apps and processes should and shouldn’t have their internet traffic routed through the VPN. Anything not selected would bypass the VPN and travel outside the protection of the encrypted tunnel. This is helpful when you want to secure some of your traffic while ensuring that other app or connection traffic flows openly.

Send your data through a VPN if you’re:

Skip the encryption if you’re:

Shopping or banking online

Communicating between devices on your home network

Accessing work files

Checking a weather app

Opening files containing personal information

On a secure network and need to reduce latency

Logging into online accounts

Browsing nonsensitive websites

Bypassing content restrictions

Make your VPN work for you

The security, speed, and compatibility of a VPN ultimately come down to the strengths of its underlying protocols.

Norton VPN offers powerful encryption with fast connection speeds and a choice of several industry-leading tunneling protocols like WireGuard and OpenVPN, as well as Mimic, our proprietary VPN protocol that masquerades as a standard HTTPS connection for ultimate privacy, security, and accessibility.

FAQs about VPN tunnels

Still have questions about VPN tunnels? Here’s what you need to know.

What is the difference between a VPN, a VPN server, and a VPN tunnel?

A VPN is a service that protects your privacy by masking your IP address and online activity. It creates a secure, encrypted VPN tunnel between your device and a remote VPN server, safeguarding your online data from interception. The VPN server acts as an intermediary between your device and the wider internet, hiding your real location and identity.

Can VPN tunnels get hacked?

Yes, like any software, VPN tunnels can be hacked, especially if you’re using a low-quality cracked VPN. A VPN's hackability depends on factors like the protocol, its encryption strength, and the VPN provider's overall security practices. High-quality VPNs like Norton VPN use extremely powerful, bank-grade AES-256 encryption.

How do you set up a VPN tunnel?

Setting up a VPN tunnel typically involves choosing a VPN service, installing the necessary client software on your device, and selecting a VPN protocol and server location. Once connected, your internet traffic is encrypted and routed through the VPN server.

    Oliver Buxton
    Oliver Buxton, a staff editor for Norton, specializes in advanced persistent threats. His work on cyberterrorism has appeared in The Times, and his prior work includes writing digital safeguarding policies.

    Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 


    Want more?

    Follow us for all the latest news, tips, and updates.