security

PPTP vs. L2TP: Top 5 Differences | Spiceworks – Spiceworks News and Insights


  • The Point-to-Point Tunneling Protocol (PPTP) is defined as a network protocol that supports secure server-client data transfer by creating a VPN across TCP/IP-powered networks. PPTP supports multi-protocol, on-demand VPNs over public networks.
  • The Layer 2 Tunneling Protocol (L2TP) is defined as a tunneling protocol that supports VPN and ISP service delivery. This protocol only encrypts its control messages and is not responsible for encrypting or otherwise protecting other content by itself.
  • This article details the top five differences between PPTP and L2TP.

What Is Point-To-Point Tunneling Protocol (PPTP)?

The Point-to-Point Tunneling Protocol (PPTP) is one of the oldest active VPN protocols. It has been in use since the days of Microsoft Windows 95 and is a standard protocol compatible with all versions of the operating system since.

Microsoft developed PPTP as part of an initiative to encapsulate the Point-to-Point Protocol (PPP). The protocol operates on TCP port 1723 and is one of the most popular tunneling protocols even today.

PPTP is fairly simple to set up and one of the fastest protocols available. However, it is subject to certain security vulnerabilities. For instance, its underlying authentication protocols — generally MS-CHAPv1 and MS-CHAPv2 — are intrinsically non-secure, a fact repeatedly highlighted by cybersecurity personnel since the introduction of PPTP.

This makes the Point-to-Point Tunneling Protocol common in applications where speed is critical but security is not, such as video and audio streaming. It is also useful for older devices that have more constrained processors.

Nevertheless, these are not the only applications of PPTP. Despite its security shortcomings, several corporations with offices worldwide leverage PPTP to deploy VPNs in the form of large LANs using WAN architecture, such as the network of a public ISP or a telecom company. This is generally more economical than establishing enterprise network infrastructure across long geographic distances.

By constructing a VPN across a TCP/IP-powered network, such as the internet, PPTP enables users to transfer data securely and remotely from a client to a server within a private network. This is typically used by employees and contractors to securely access enterprise networks remotely over the internet as if they were present on the network itself.

See More: What Is Web Real-Time Communication (WebRTC)? Definition, Design, Importance and Examples

What Is Layer Two Tunneling Protocol (L2TP)?

The Layer 2 Tunneling Protocol (L2TP) is the merger of two protocols: Microsoft’s PPTP and Cisco’s Layer 2 Forwarding. It is known as the Virtual Dial-up Protocol as it services the PPP extension over the internet. This tunneling protocol is used by ISPs to enable VPN services.

L2TP has two key components: the L2TP access concentrator (LAC) for physically terminating a call and the L2TP network server (LNS) for terminating a call and authenticating the PPP stream. These two components work together to secure communications between internet networks.

L2TP leverages an encryption protocol to pass within the tunnel to ensure security and privacy. This protocol can transfer most L2 data types over an L3 or IP network. The process deploys a tunnel connecting LAC and LNS via the internet. This enables a PPP link layer that is encapsulated and transferred online.

L2TP is useful for reducing dial-up costs and overheads for users connected remotely to an enterprise network. Let’s assume a user in Silicon Valley is linked to a traditional dial-up modem. This user seeks to communicate with another user in London, get a connection, and deploy a dedicated link from Silicon Valley to London. This dedicated dial-up link will leverage a public switched telephone network (PSTN), giving our user the lowest data transfer speed due to shared PSTN media. The best-expected speed is around 33 Kbps, as thousands of other users would occupy the same medium at the time.

Needless to say, this speed is far too low for today’s ‘Gbps-savvy’ world. Our user has another option: to use L2TP with PPP configured at both the ISP and user sites. Once the user request is successfully authenticated, a tunnel is created to transmit user data, and the users can start their communication. A PPP connection to an ISP can be initiated by the user either through a PSTN service or an Integrated Services Digital Network (ISDN).

See More: What Is Unified Communication? Definition, System, Cloud Service, Best Practices, and Examples

PPTP vs. L2TP: 5 Leading Differences

The Point-to-Point Tunneling Protocol supports secure server-client data transfer by creating a VPN across TCP/IP-powered networks. PPTP supports multi-protocol, on-demand VPNs over public networks.

On the other hand, the Layer 2 Tunneling Protocol supports VPN and ISP service delivery. This protocol only encrypts its control messages and is not responsible for encrypting or protecting other content by itself.

pptp vs l2tp top differences

PPTP vs. L2TP Overview

Sources: VPN UnlimitedOpens a new window