Layer 2 Tunneling Protocol

L2TP is developed by combining characteristics of the Layer 2 Forwarding Protocol (L2F), designed by Cisco, with those of  PPTP, designed by Microsoft. As L2TP does not offer confidentiality and encryption features on its own, another protocol called IPSec is used along with it to secure the connection. For end host clients, software installation is not required since almost all operating systems offer inbuilt VPN clients. 256 bit encryption is a mandatory addition to the L2TP VPN. L2TP is a CPU processor that is intensive due to double encapsulation. The first encapsulation takes place when the L2TP VPN functions and it is then topped off with the second IPSec encapsulation.

Let's look at Windows 10 inbuilt VPN ...

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.