![]() Layer 2 Tunneling Protocol L2TP is a computer networking protocol used by Internet service providers ISPs to enable virtual private network VPN operations. L2TP is similar to the Data Link Layer Protocol in the OSI reference model, but it is actually a session layer protocol. |
![]() As such, L2TP is only concerned with confidentiality, authenticity, and integrity of the L2TP packets between its tunnel endpoints the LAC and LNS, not unlike link-layer encryption being concerned only about protecting the confidentiality of traffic between its physical endpoints. |
![]() Because of the lack of confidentiality inherent in the L2TP protocol, it is often implemented along with IPsec. This is referred to as L2TP/IPsec, and is standardized in IETF RFC 3193. The process of setting up an L2TP/IPsec VPN is as follows.: |
![]() VPN protocols: L2TP/IPsec. Learn more about the benefits of using L2TP/IPsec. 30-day money-back guarantee. What is L2TP/IPsec? L2TP stands for Layer 2 Tunneling Protocol. L2TP was first proposed in 1999 as an upgrade to both L2F Layer 2 Forwarding Protocol and PPTP Point-to-Point Tunneling Protocol. Because L2TP does not provide strong encryption or authentication by itself, another protocol called IPsec is most often used in conjunction with L2TP. |
![]() Like the name implies, an L2TP VPN is a VPN service that offers users access to the L2TP protocol. Please be aware that you arent very likely to find a VPN provider who only offers access to L2TP on its own. |