mobile VPN (mobile virtual private network)

A mobile VPN is a network configuration in which mobile devices such as notebook computers or personal digital assistants (PDAs) access a virtual private network (VPN) or an intranet while moving from one physical location to another.

An effective mobile VPN provides continuous service to users and can seamlessly switch across access technologies and multiple public and private networks. The functioning of an effective mobile VPN is transparent to the end user without compromising security or privacy.

From an article on, Lisa Phifer, vice-president of Core Competence Inc., explains the special requirements of mobile VPNs and how they work:

PPTP, IPsec and SSL VPNs identify the device at the far end of the tunnel by IP address. This works well for users who tunnel from stationary devices: a home PC over residential broadband, a laptop over a hotel LAN, or even a PDA at a Wi-Fi hot spot. But put that device in motion, and physical connectivity, point of network attachment, and IP address are all likely to change. A conventional VPN client simply cannot survive such changes. The tunnel breaks, application sessions disconnect or time out, and the user must restart the business communication from scratch.

Mobile VPN solutions from such vendors as Columbitech, Ecutel, IBM, ipUnplugged, Motorola, NetMotion, Nokia, Padcom and Radio IP are designed to adapt transparently to these changes. In a mobile VPN, a VPN server still sits at the edge of your company network, enabling secure tunneled access by authenticated, authorized VPN clients. Mobile VPN tunnels are not tied to physical IP addresses, however. Instead, each tunnel is bound to a logical IP address. That logical IP address sticks to the mobile device no matter where it may roam. For example, a mobile VPN client can:

  • Roam from one wireless AP to another at a public Wi-Fi hot spot.
  • Leave Wi-Fi coverage and start using a 3G connection (e.g., EV-DO).
  • Leave 3G coverage and start using a slower 2G connection (e.g., 1xRTT).
  • Return to the office and start using a docked Ethernet LAN connection.

In this example, the mobile VPN client uses four or five different physical IP addresses while retaining one logical IP address. Applications running on the mobile device and inside the corporate network communicate through that one logical IP address, remaining blissfully unaware of the user's motion and associated physical/network transitions.

This was last updated in November 2006
Posted by: Margaret Rouse

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Mobile device security demands surpass reality, survey says

    It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products.

  • Fingerprint recognition and mobile security

    Fingerprint recognition technology for mobile devices is posed to become the preferred user authentication solution mobile device security. In this Technical Note from the Farpoint Group, you'll see why Fingerprint recognition is likely to become the methodology of choice for all aspects of mobile security across a broad range of applications and usage scenarios.

  • Traditional security threats coming soon to mobile device near you

    Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.

Do you have something to add to this definition? Let us know.

Send your comments to

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: