What Is a PPTP VPN? A Point-to-Point Tunneling Protocol Guide

Updated on Mar 6, 2026 by Georgii Chanturidze

PPTP is one of the oldest VPN protocols still in use today. Although you can still configure a PPTP-based VPN on some older devices and on Windows 10 and 11, PPTP is widely regarded as outdated, insecure, and unreliable, so much so that most VPN providers have dropped support for it.

This guide explains what a PPTP VPN is, how it works under the hood, and why it no longer meets modern security expectations. You’ll also learn how it compares to current protocols like OpenVPN and WireGuard.

What Is a PPTP VPN?

The Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols. It was created by Microsoft in the mid-1990s to give remote users access to corporate networks over the internet. At the time, it was fast and easy to set up, which made sense for the dial-up era.

Like any other VPN protocol, PPTP routes internet traffic through a tunnel to a VPN server before sending it on to its destination. In theory, that tunnel is encrypted. In practice, the encryption and authentication methods PPTP relies on are unsuitable for modern security needs.

PPTP uses MS-CHAPv2, a method that modern computers can break in hours, sometimes minutes. Once compromised, attackers can derive the encryption key used by Microsoft Point-to-Point Encrypted traffic and decrypt the traffic passing through the tunnel.

Because of these weaknesses, security experts recommend avoiding PPTP, and most VPN providers have dropped it entirely, including Private Internet Access. PIA only supports modern protocols that meet up-to-date encryption standards.

Microsoft has also moved away from PPTP in favor of more secure protocols like SSTP or IKEv2, though PPTP may still function in some legacy setups.

How PPTP Works

PPTP combines several older networking components to create a VPN tunnel. Together, they handle connection setup, authentication, encryption, and data transport:

  • Transmission Control Protocol (TCP) 1723: Handles PPTP control functions like session setup, configuration, and management between your device and the VPN server.
  • MS-CHAPv2: Authenticates your connection using a challenge-response mechanism that compares your hashed password response with what the server expects.
  • Microsoft Point-to-Point Encryption (MPPE): Encrypts your traffic, making it unreadable without a specific session key.
  • RC4: A cipher system that scrambles traffic one byte at a time using a single session key.
  • Point-to-Point Protocol (PPP): Encapsulates and structures your internet traffic, assigns a virtual IP address, and defines routing rules.
  • Generic Routing Encapsulation (GRE): Wraps PPP frames so they can travel through the VPN tunnel across standard IP networks, such as the public internet.
Screenshot showing a typical PPTP VPN connection flow.

Here’s exactly how your traffic travels when using a PPTP VPN:

  1. Connection start: Your device opens a control channel to the VPN server on TCP port 1723.
  2. Session negotiation: Over the TCP control channel, the VPN server and your device negotiate various parameters for the PPP session – for example, the frame size, compression, and error correction methods.
  3. Authentication challenge: Once the session basics are agreed on, the VPN server challenges your client to authenticate. The VPN server sends a random value; your device combines it with your password to create an MS-CHAP v2 hash and sends it back.
  4. Authentication response: The VPN server compares your response to what it expects (since it knows the correct password hash). If they match, you’re authenticated. At this stage, MS-CHAPv2 has verified your credentials. If authentication fails, the connection is denied.
  5. Key generation: If the hash matches, your device and the VPN server derive an RC4 session key for MPPE encryption. MPPE, using the RC4 cipher and this key, will encrypt all your VPN data. All PPTP traffic after this point is encrypted with RC4 using that key.
  6. Encapsulation: The VPN server assigns your device a virtual IP address (so your device now has an IP address on the VPN’s network) and your data is packed into PPP frames. PPP wraps around each network packet you send, preparing it for transport.
  7. Tunneling: Each PPP frame is wrapped in GRE packets to form the VPN tunnel. These GRE-encapsulated packets are what actually travel across the internet as the VPN tunnel.
  8. Routing: A router with PPTP passthrough forwards the GRE packets to the VPN server.
  9. Decryption & delivery: The VPN server decrypts the packets, unpacks the data, and sends it to the destination on the internet.

PPTP uses one of two modes. In a voluntary mode, your device initiates the VPN tunnel after it connects to the internet. In a compulsory mode, the network forces all traffic to go through a VPN tunnel before reaching the internet.

PPTP Pros

AdvantageExplanation
Compatible with legacy systemsPPTP was the default VPN option in older versions of Windows, macOS, and mobile platforms in the early 2000s. On some legacy devices that require a VPN, PPTP may be the only option.
Works on slow hardwarePPTP’s RC4 stream cipher requires little processing power. It runs smoothly even on aging laptops, routers, or embedded devices.
Simple to set upSetup usually only requires a server address, username, and password. You don’t need to install certificates or third-party software on supported platforms.
Usable for non-sensitive trafficPPTP’s fragile encryption makes it acceptable for isolating guest devices, testing VPN connections, or routing non-sensitive data over the internet.

PPTP Cons

DisadvantageExplanation
RC4 encryption is fragileRC4 has a 128-bit key, which should be strong, but weaknesses in its key-scheduling process leave clues in the encrypted data that attackers can use to break it, and the cipher produces biased, predictable output that reduces its effective strength. This makes PPTP vulnerable to brute-force attacks and modern statistical analysis.
MS-CHAPv2 is susceptible to cyber threatsAttackers can crack MS-CHAPv2 hashes using precomputed tables or brute-force tools, making this authentication method insecure by today’s standards.
No support for Perfect Forward SecrecyMPPE and RC4 use a single encryption key that’s not rotated or refreshed during the session. If this key is exposed, attackers could read most of your past and future web data.
Lack of NAT traversal supportRouters use Network Address Translation (NAT) to track outgoing connections using TCP or UDP port numbers. PPTP sends its data over GRE (which has no ports), so many routers require PPTP passthrough (GRE support) for the connection to work properly.

PPTP vs. Other VPN Protocols (L2TP, IKEv2, OpenVPN, WireGuard)

Compared to protocols like IKEv2, OpenVPN, and WireGuard, PPTP falls behind in nearly every category that matters today – from encryption strength and key management to firewall compatibility and long-term reliability.

ProtocolEncryptionPerfect Forward SecrecyNAT FriendlinessAverage ThroughputSecurity RatingSupported Devices
PPTPMPPE with RC4 (broken)NoNeeds GRE passthrough to workHigh on legacy systemsLowLegacy Windows, routers
L2TP + IPSecAES-256 (config-dependent)ConfigurableRequires UDP ports 500 and 4500MediumMediumBuilt into most OS
IKEv2 + IPSecAES-256-GCM / ChaCha20YesVery strong on roaming/mobileHighVery highMost OS, routers
OpenVPNAES-256-GCM / ChaCha20YesWorks on any port using TCP or UDPVery highVery highMost OS (needs client)
WireGuardChaCha20-Poly1305YesUses a single UDP port (51820)Very highVery highMost OS (newer adoption)

Here’s what these features mean in plain terms:

  • Encryption: Turns your online data into unreadable code that only someone with the correct key can decipher. Stronger encryption standards make the data far harder to crack.
  • Perfect forward secrecy: Generates unique encryption keys for each VPN session and changes them regularly, so even if one key is compromised, it won’t expose past or future sessions.
  • NAT friendliness: Describes how well a VPN protocol works with Network Address Translation (NAT), a system that most home routers and public networks use to let multiple devices share a single public IP address. NAT-friendly protocols connect more reliably through firewalls and routers without special configuration.
  • Throughput: Measures how much data the VPN can send or receive per second. Higher throughput delivers faster speeds for browsing, streaming, or file transfers.

When Should You Use a PPTP VPN?

The short answer is you shouldn’t, unless you don’t have another option, such as when:

  • You’re connecting an older device that doesn’t support modern VPN protocols.
  • You’re isolating non-sensitive traffic (like guest Wi-Fi devices) on a private network.
  • You’re testing VPN setup or troubleshooting compatibility.

Top-grade VPNs like PIA use highly secure and fast protocols that work on nearly any modern device or router nowadays. Best of all, you can try PIA with a 30-day money-back guarantee to see if it’s right for you.

How to Configure a PPTP VPN

If PPTP is the only option available, you can set it up using the built-in VPN client on your operating system. Here’s how:

It’s best to configure the VPN on secure, private networks. Ideally, it should be your home or an office Wi-Fi network. Public hotspots make PPTP’s weak encryption even easier to intercept, which can expose your activity to attackers on the same network.

1. Collect Your VPN Details

Get the server address (hostname or IP), username, password, and domain name if required. A domain name is an optional field (typically in corporate networks) to identify the set of login credentials associated with your account.

If you’re registering a PPTP VPN account, create a strong, unique password (with letters, numbers, and symbols). 

2. Open the Built-in VPN Settings

Use a built-in VPN client on your operating system (if it’s supported in your version):

The VPN tab in Windows 11’s Network & internet settings.
  • Windows: Settings > Network & internet > VPN > Add a VPN > PPTP.
  • macOS: System Preferences > Network > Add Interface > VPN > PPTP (not available on macOS 10.12 or later).
  • Android: Settings > Network and Internet > VPN > Add VPN > PPTP.
  • iOS: General > VPN > Add VPN Configuration > PPTP (not available on iOS 10 and later).

3. Enter PPTP VPN Connection Information

Fill in the credentials on your device. 

The Add a VPN connection settings window on Windows 11, with VPN type set to Point-to-Point Tunneling Protocol (PPTP)
  • Connection name: Name a connection any way you’d like.
  • Server name or address: The VPN server address provided by your provider or admin.
  • VPN type: Select Point to Point Tunneling Protocol (PPTP).
  • Username and password: Enter the username and password you collected earlier.

4. Save and Connect

Save the settings, select your VPN connection, and click Connect

The "VPN" settings page under "Network & internet" in Windows  11 settings. The highlighted section shows a PPTP VPN Connection with an option to connect to it.

Restrict usage to essential tasks, disconnect when you don’t need a VPN, and change your password regularly.

5. Configure Advanced Security Settings (Optional)

You can adjust settings in a PPTP connection to fit your needs. We advise setting authentication to MS-CHAPv2 and enabling encryption. 

PPTP VPN connection properties in Windows 11 showing security settings, including required encryption and MS-CHAP v2 authentication.

Windows: Settings > Network & internet > VPN > [Your PPTP Connection] > Advanced options > Edit > Security tab

  • Authentication: Select Microsoft CHAP Version 2 (MS-CHAP v2)
  • Encryption: Set to Require encryption (disconnect if server declines)

macOS: System Preferences > Network > [PPTP Connection] > Authentication Settings

  • Authentication: Choose MS-CHAPv2
  • Encryption: Check Send all traffic over VPN connection (for encryption enforcement)

Android: Settings > Network and Internet > VPN > [Your PPTP VPN] > Edit

  • Username & Password: Use your credentials
  • Encryption: Android automatically uses MPPE encryption with PPTP
  • Authentication: MS-CHAPv2 is used by default on most Android devices (no manual toggle)

iOS: Settings > General > VPN > [PPTP Connection] > Edit Configuration

  • Authentication: Set to Password (iOS uses MS-CHAPv2 behind the scenes)
  • Encryption: Enabled by default with MPPE

FAQs

What is a PPTP VPN, and how does it work? 

PPTP is an older VPN protocol that creates a secure connection by encapsulating your internet traffic using PPP and GRE, and encrypting it with Microsoft’s MPPE using the RC4 cipher. It uses TCP port 1723 for connection control and GRE for data transfer. While simple and relatively fast, its security is considered outdated by today’s standards.

Is PPTP VPN still secure for modern use? 

PPTP’s many flaws make it an insecure protocol for today’s standards. For example, it uses RC4 encryption and MS-CHAPv2 for login security, which are susceptible to brute-force attacks (guessing by trial and error) and have cryptographic flaws that allow decrypting data. This protocol also doesn’t refresh encryption keys for each session, so once cracked, attackers can read everything you sent over the VPN.

How do I set up a PPTP VPN server?

To set up a PPTP VPN server, go to your server’s network or sharing settings, enable incoming connections, choose PPTP as the protocol, create user accounts, and allow VPN access. Don’t forget to forward TCP port 1723 on your router and enable PPTP passthrough if needed.

Can I use PPTP VPN on Mac devices?

Yes, you can use a PPTP VPN on your Mac if it’s running macOS 10.11 (El Capitan) or earlier. Apple removed PPTP support starting with macOS 10.12 (Sierra). 

What is a point‑to‑point VPN tunnel?

A point-to-point VPN tunnel is a direct, encrypted connection between two devices or networks over the internet. It allows secure data transfer as if both were on the same local network. PPTP (Point-to-Point Tunneling Protocol) relies on basic encryption and authentication to create a private link, often between a user’s device and a VPN server.

How do I configure a point‑to‑point VPN connection? 

It depends on your operating system – the steps vary across Windows, macOS, Android, and iOS. You can follow our guide to configuring a PPTP VPN above.

What are the differences between PPTP and other VPN protocols? 

PPTP uses outdated encryption (RC4), relies on GRE, and struggles behind NAT routers or restrictive firewalls. Unlike other modern protocols, it doesn’t use TLS-based certificates or modern key-exchange mechanisms. Newer options like WireGuard or OpenVPN use safer encryption, support perfect forward secrecy, and connect better in complex network setups without needing passthrough settings.

Why is PPTP considered outdated by some security experts? 

PPTP is outdated because it relies on weak encryption and vulnerable authentication, both of which attackers can easily break. It also lacks perfect forward secrecy, meaning that if one session is compromised, past and future data using the same key may be exposed. More modern VPN protocols offer much stronger security.

Can a point‑to‑point VPN be used for site‑to‑site connections? 

Yes, technically you can use a point-to-point VPN like PPTP for site-to-site connections. However, PPTP lacks strong encryption and modern security features, so it’s not great for protecting sensitive business data. It also has problems with NAT support and is likely to break under modern firewall rules. It’s better to use IPSec, OpenVPN, or WireGuard instead.

What is PPTP passthrough?

PPTP passthrough is a router setting that allows TCP port 1723 and GRE protocol 47 to pass through your network. Without it, PPTP won’t connect properly behind most routers or firewalls.

Does PPTP still have a place in a modern network?

Only in rare cases. You can still use PPTP to test legacy systems, set up simple guest networks, or gather non-sensitive sensor data. Note that you should always isolate it from secure systems and avoid it anywhere privacy, authentication, or data security matters.