Layer 2 Tunneling Protocol (L2TP)

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Layer 2 Tunneling Protocol (L2TP):

Layer 2 Tunneling Protocol (L2TP) is a hybrid of PPTP and Layer 2 Forwarding (L2F). It uses the same authentication mechanisms as PPTP but its tunneling protocol is advanced as it relies on IPSec for encryption. Like PPTP, it uses a single point-to-point connection per session. L2TP also provides encryption for IP, IPX, or NetBEUI traffic and transmits it over any medium that supports point-to-point datagram delivery, such as IP, X.25, Frame Relay, or ATM networks. This blending of L2TP and IPSec is known as L2TP/IPSec. When using IP as its datagram transport, L2TP can be used as a tunneling protocol over the Internet. L2TP tunnels must be authenticated by using the same authentication mechanisms as PPP connections. Because it doesn’t conform with the security requirements of L2TP, PPP encryption is not used. PPP encryption can provide confidentiality but not per packet authentication, integrity, or replay protection. In this case data encryption is provided by IPSec, which uses Data Encryption Standard (DES) or Triple DES (3DES) by using encryption keys produced by IPSec’s Internet Key Exchange (IKE) negotiation process.

L2TP/IPSec used the source and destination IP addresses for…

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?