Skip to main content

Questions tagged [l2tp]

Layer 2 Tunneling Protocol (L2TP) is an encapsulation protocol used by VPN's. By itself it provides no encryption so it is often combined with IPSec.

0 votes
1 answer
469 views

Should users have access to the IPsec pre-shared key?

We are in the process of switching from Hamachi to Meraki VPN by Cisco. Hamachi was managed internally, but this new VPN solution is managed by an external party and they have set it up as L2TP/IPsec ...
Wouter's user avatar
  • 121
-3 votes
1 answer
2k views

Which VPN offers more security conceptually, SSL VPN or L2TP/IPSEC?

Aside from possible implementation bugs, which VPN concept aims to offer more protection by design? SSL VPN (implementation example - OpenVPN) L2TP/IPSEC (implementation example - Strong Swan) After ...
J. Doe's user avatar
  • 137
1 vote
1 answer
1k views

Why doesn't IKEv2 use L2TP?

My guess is that with IPSec/IKEv1, since it doesn't support NAT, you either have to manually configure routes from your machine, or use a layer 2 tunnel (such as l2tp) to talk with devices on the ...
chirond's user avatar
  • 31
1 vote
1 answer
674 views

What exactly does L2TP (over IPsec) mean?

I understand that one of the ways in which a VPN can be implemented is via L2TP over IPSEC. What does this mean exactly? I know that IPSEC is a network layer protocol. On the other hand L2TP is a data ...
Minaj's user avatar
  • 1,576
1 vote
1 answer
2k views

VPN / VPS and IP logs

Here's the situation: 1) I rent a VPS at a hoster and install VPN on it. 2) Completely disable all logs. Those logs that can not be disabled - permanently delete. 3) I connect to my VPS via VPN (...
ideloxew's user avatar
  • 507
0 votes
1 answer
573 views

Connected to my server through VPN. Should I change my key?

I am using an SSH key to connect to my server (I've got Pageant to authenticate my key) and I forgot that I had the VPN on so I connected to the server (SFTP) while I was on it. Should I change my ...
John's user avatar
  • 3
1 vote
0 answers
278 views

VPN chain in one machine without VM natively

Is it any way to make VPN chain in one machine (MAC or WIN) without VM natively (L2TP/IPsec)? I need this for obtain an extra layer of security. For example - if one VPN turns off I still have ...
ideloxew's user avatar
  • 507
4 votes
1 answer
647 views

Why L2TP is required over IPSec

IPsec facilitates encryption and authentication with ESP. With tunnel mode, IPSec is also providing tunnelling. More importantly, one can use IPsec in tunnel mode, along with transport mode (i.e. ...
Ajay's user avatar
  • 184
1 vote
1 answer
347 views

Does any VPN protocol authenticate the server?

When you connect to a server using SSL/TLS the client authenticates the server using the certificate that the server provides. If certificates mismatch an error page is shown instead. So you know you ...
Sedat Kapanoglu's user avatar
9 votes
3 answers
4k views

What is the difference between encrypted data and data sent through an encrypted tunnel?

I am looking at different VPN protocols. L2TP does not provide encryption so require IPSec to encrypt the data IPSec tunnel provide encryption to the tunnel What is the difference in terms of the ...
Terry's user avatar
  • 193