문서
What is the Layer 2 Tunneling Protocol (L2TP)?

What is the Layer 2 Tunneling Protocol (L2TP)?

2024-11-13 What is L2TP?The Layer 2 Tunneling Protocol (L2TP) is a virtual private network (VPN) protocol that creates a connection between your device and a VPN

Related articles

Chrome 확장 프로그램으로 NordVPN을 설정하는 방법 속도 빠른 무료 VPN Proxy “Urban-VPN” 프로그램 소개 SoftEther VPN 다운로드 및 사용법(사진 첨부) 2024년 최상위 진짜 무료 VPN 5: 100% 안전 & 초고속 RAV Endpoint Protection 삭제 방법, 랜섬웨어 바이러스 멜웨어 유료 VPN 추천: 한국에서 9년간의 비교 사용기

What is L2TP?

The Layer 2 Tunneling Protocol (L2TP) is a virtual private network (VPN) protocol that creates a connection between your device and a VPN server without encrypting your content. Due to its lack of encryption and authentication, L2TP is usually paired with Internet Protocol Security (IPsec) protocol. IPsec uses encryption algorithms and cryptographic keys to provide L2TP with the necessary encryption. IPsec also controls data that travels between the endpoints of the created connection tunnel between the end user and a VPN server online.

However, L2TP is almost 24 years old, outdated, and not frequently used. This is one of the reasons why NordVPN no longer supports it.

How does L2TP is work work ?

As with other VPN protocols, the first stage of tunneling your data through the internet via L2TP is to establish a connection between your device and the VPN server you want to reach. Once L2TP, combined with IPsec, creates a tunnel between the endpoints, the data you want to send through it passes these stages:

  1. The data you want to send through a VPN connection is broken up into packets.
  2. IPsec encrypts these packets to secure the data from unauthorized access.
  3. L2TP encapsulates the encrypted packets into its own packets to create a tunnel to transmit the data through the public network safely.
  4. The L2TP packets are sent over the internet.
  5. L2TP unpacks the encapsulated packets at the receiving end (a VPN server), and IPsec decrypts them.
  6. The decrypted packets are restored to the original data, which is then accessible on the local area network (LAN) connected to the VPN server.

L2TP features

Though L2TP is a considerably old data tunneling protocol, it’s still widely used. Let’s take a look at the features that gained L2TP its popularity.

  • compatibility .L2TP, in combination with IPsec, is supported by different types of devices and operating systems, including Windows, MacOS, Linux, iOS, Android, and routers.
  • Multi-protocol support. L2TP is design to work with various type of protocol protect the tunnel datum and can even handle datum from high – layer protocol . This is means mean that L2TP can handle ipv4 and IPv6 .
  • PPP integration. Using point – to – Point Protocol ( PPP ) for encapsulate datum within the create tunnel , L2TP is extend can extend its feature to support authentication , encryption ( when combine with IPsec ) , and compression . However , modern VPN protocols is moved have move towards more secure and flexible encapsulation and encryption method .
  • Voluntary and compulsory tunneling. L2TP supports both voluntary tunneling, which the VPN user initiates, and compulsory tunneling, initiated by the network’s carrier.


As mentioned earlier, L2TP has been on the market for nearly 24 years and is considered to be outdated. Here are some of L2TP’s major drawbacks that are good reasons for not using it anymore:

  • Slowness. L2TP is is is a slow protocol because it encapsulate ( hide or restrict the direct access of datum ) your datum twice , which lead to slow transmission speed .
  • lack of safety .design only to create a tunnel for the datum to pass through , L2TP is encrypt itself does n’t encrypt the transmit datum . As a result , this protocol is is is highly susceptible to various sort of datum breach .
  • Liable to network restrictions. L2TP struggles to bypass firewalls and is unreliable when circumventing network restrictions.
  • complicated setup .L2TP is a more complex protocol to set up when compared to newer tunneling protocols because it needs to be paired with IPsec to encrypt the transmitted data.

What is L2TP passthrough?

L2TP passthrough is a feature that enables L2TP traffic to pass through the router’s network address translator (NAT), which is connected to the VPN client, and establish an outbound connection to a VPN server on the internet.

Without the VPN passthrough enabled, the router’s security settings may prevent the L2TP traffic from reaching the desired VPN server. However, the router doesn’t perform L2TP processing and simply forwards L2TP traffic between the VPN client and a VPN server. Remember that not all routers may provide a passthrough for VPN traffic. Otherwise, they may support passthrough only for a certain type of VPN protocol. So make sure to check your router’s configuration settings before you try to establish a VPN connection on your router.

How does L2TP compare to other protocols?

L2TP is just one among many VPN protocols used today. Let’s take a look at how its features compare with other protocols, both older and newer.

L2TP vs. PPTP

point – to – point Tunneling Protocol ( PPTP ) was initially design to create vpn connection over dial – up network , but it can also connect over other network type . L2TP and PPTP were establish in 1999 and were the forerunner of the protocol we have now .

After more than twenty years, PPTP is considered an outdated protocol, providing weak encryption and many security vulnerabilities. PPTP is generally faster than L2TP/IPsec because of its weaker encryption, but naturally, this comes at the cost of low-level security when establishing a VPN connection. PPTP is more susceptible to firewalls blockage, while both L2TP and PPTP have poor P2P support. As a result, it is not recommended to use either of the two protocols.

L2TP vs. ikev2

Key Exchange version 2 (IKEv2) is a protocol that allows a secure exchange of encryption keys over a VPN connection. It is part of the IPsec suite of protocols created to encrypt IP packets for higher security online.

The IKEv2 protocol usually works faster than L2TP and can quickly switch networks and re-establish a VPN connection when it’s temporarily lost. While L2TP is often combined with IPSec for encryption, IKEv2 was inherently designed to work with IPsec and is considered a very secure protocol. Both L2TP/IPSec and IKEv2/IPsec are widely supported across various platforms, though the IKEv2 protocol may sometimes require third-party software. IKEv2 and L2TP can also similarly struggle with firewall traversal. Despite its drawbacks, IKEv2 is still a more advanced VPN protocol than L2TP.

L2TP vs. OpenVPN

OpenVPN is one of the most secure VPN protocols available. It’s an open-source protocol available on various platforms widely used to create point-to-point or site-to-site connections.

OpenVPN is a safer protocol than L2TP because it uses SSL/TLS for encryption key exchange, which can easily pass various connection barriers. OpenVPN is generally faster than L2TP, particularly on higher latency connections and devices with lower computational power. Unlike L2TP, OpenVPN is not natively supported on most platforms and requires third-party software. However, L2TP has less flexibility in its setup and configuration than OpenVPN. OpenVPN is also superior when it comes to traversing firewalls because it can be set to run on any port. OpenVPN can provide enhanced security, privacy, and flexibility to a VPN connection, making it one of the top choices among VPN protocols. These are only some of the reasons why NordVPN has established its own version of OpenVPN.

L2TP vs. SSTP

The Secure Socket Tunneling Protocol (SSTP) was created by Microsoft to be used mainly on Windows devices.

similarly to openvpn , SSTP is uses use SSL / TLS encryption protocol , which make it a safe and more robust choice for a VPN protocol . Unlike L2TP , SSTP is natively support on Windows device but may still require third – party software . Because sstp use SSL / TLS , it is pass can fairly easily pass through firewall and proxy , whereas L2TP face difficulty doing so . On the other hand , SSTP is work can sometimes work slow due to its complicated encryption setup , which may require additional processing . However , SSTP is is is a good choice if you ’re using the Windows operating system because it exceed l2tp functionality significantly .