What Is the L2TP VPN Protocol?

What Is the L2TP VPN Protocol? Layer 2 Tunneling Protocol Explained in 2025

Last update: October 22, 2024

What Is the L2TP VPN Protocol?

L2TP is a VPN protocol that provides secure connections when paired with IPsec, and it’s compatible with Windows, Linux, macOS, Android, iOS and routers. It’s one of the most cost-effective VPN protocols, which is why it’s used for remote access.

With so many VPN protocols available, it’s easy to get confused about how each one works. One example that many VPN users may find obscure is the Layer 2 Tunneling Protocol (L2TP). Today, I’ll answer the question, “What is L2TP VPN?” and explain why some of the best VPNs are still using this protocol.

Compared to widely used protocols like WireGuard, OpenVPN and IKEv2, L2TP is a little outdated. Created over 20 years ago, it was one of the first VPN protocols. However, it’s still usable — and useful — due to some features and capabilities that go beyond regular VPN protocols. 

This article will cover the meaning of L2TP, along with its protocols, components and features. We’ll discuss how it works and what it’s used for, and we’ll explore its strengths and weaknesses. Read on if you want to crack open the L2TP mystery. We’ve also got a whole article on VPN protocols that provides key background information.


Meaning: What Is L2TP?

l2tp meaning
Some virtual private networks (VPNs) still offer the L2TP/IPsec VPN protocol, but ExpressVPN has phased it out.

L2TP is an acronym for Layer 2 Tunneling Protocol, a VPN protocol that creates a connection between devices and VPN servers without encryption. Cisco and Microsoft developed it over two decades ago to replace the Point-to-Point Tunneling Protocol (PPTP).

The world switched from PPTP to L2TP because L2TP supports tunneling over different media, while PPTP is limited to tunnels over IP. Additionally, PPTP supports one tunnel between endpoints, but L2TP can work with multiple tunnels. In short, L2TP was a vast improvement over PPTP on all types of VPNs.

L2TP isn’t widely used today. There are better options like Secure Socket Tunneling Protocol (SSTP) and OpenVPN. Some VPN services, like ExpressVPN and CyberGhost, have even discontinued L2TP support — see our ExpressVPN review and CyberGhost review to learn what they offer instead.

When L2TP is used, it’s usually paired with the Internet Protocol Security (IPsec) suite, which provides data integrity checks and authentication. That’s how we get L2TP/IPsec, where IPsec handles the creation of a secure channel for encapsulating L2TP traffic. IPsec supports different types of encryption, including AES 256-bit — one of the most secure ciphers. 


L2TP Protocols & Components

l2tp meaning
L2TP relies on a combination of other protocols and components to function properly.

Since the L2TP protocol lacks native encryption, it must be combined with other components and protocols to compensate for it. When Microsoft and Cisco collaborated to make L2TP usable and secure, they integrated features from other tunneling protocols.

L2TP uses Microsoft’s PPTP to work with dial-up networks, and it uses Cisco’s Layer 2 Forwarding to establish secure connections over the internet and IP-based networks. 

L2TP also adds two key components. The first is L2TP Access Concentrator (LAC), which receives packets from a remote client and forwards them to the second component, L2TP Network Server (LNS). LNS is the termination and authentication point for Point-to-Point Protocol (PPP) streams. 

PPP is a data link layer protocol that facilitates communication between devices that can’t transmit IP packets. For example, ISPs used PPP to give customers dial-up internet access over phone networks. In the case of L2TP, PPP acts as the gateway that allows encrypted traffic to access necessary network assets.


How Does L2TP Work? 

How L2TP VPN Works
L2TP follows a step-by-step process to secure your traffic.
  1. L2TP establishes a connection between your device and the VPN server you intend to use. It combines with IPsec to create a secure tunnel between the LNS and LAC endpoints through which data is transmitted.
  2. The LNS and LAC negotiate their relationship and assign IP addresses to all the devices in the chain before any data transmission occurs. 
  3. With the endpoints clearly defined, the data being sent through this tunnel is broken into packets. L2TP enables a PPP link layer for encapsulating data packets, preparing them for transfer.
  4. The L2TP packets are transferred over the internet.
  5. When they reach the other endpoint — the VPN server — L2TP unpacks these encapsulated packets, and IPsec immediately decrypts them. This restores the packets to their original readable format and makes them accessible on the local area network linked to the VPN server.

What Is L2TP Over IPsec?

L2TP Over IPsec (L2TP/IPsec) is what you get when you combine Layer 2 Tunneling Protocol with IPsec — a Layer 3 authentication and encryption protocol. This protects any transmitted traffic against external interference, which isn’t possible with L2TP alone.


Layer 2 Tunneling Protocol (L2TP) Features

The following are some key features that have allowed L2TP to remain relevant.


What Is L2TP Used For?

l2tp public wifi
One of L2TP’s roles is to set up and manage public WiFi connections.

L2TP’s original purpose was to replace remote network dial-up connections to save on costs. Over time, people have found many uses for L2TP, including the following: 

L2TP as a VPN

As mentioned, L2TP allows you to connect to a private server. When combined with IPsec, it’s regarded as a reliable protocol, ensuring that your VPN is safe enough to protect your online traffic.

L2TP/IPsec VPN tunnels are especially effective for remote access networks. They securely connect employees to their central offices from anywhere in the world. All they need is a stable internet connection. You won’t need to install new L2TP/IPsec VPN connection software, as operating systems like Windows, macOS and Linux come with built-in clients.

Delivering Cable & DSL Services

Since L2TP can securely connect to multiple points at once, internet service providers use it to deploy broadband services directly to multiple consumers simultaneously. It has proven to be quite effective for providing virtual private LAN services (VPLS) and virtual private wire services (VPWS). 

VPLS provides a way to set up an ethernet-based LAN to connect devices that aren’t in the same physical area. VPWS is a tool for point-to-point communication over Multiprotocol Label Switching (MPLS) networks, which route data based on identified quick paths instead of IP addresses alone.

Additionally, ISPs with spare capacity can sell their surplus bandwidth to other providers, who can then use L2TP to route traffic from their customers without interference from the main host ISP. The IPsec encryption makes it impossible for the host ISP to see any customer information.

Setting Up Public Access WiFi

If you’ve ever wondered how the WiFi is configured at your airport or library, L2TP may have been involved. Rather than arranging individual connections for each WiFi access point, which can be overwhelming, L2TP helps organizations maintain a network of WiFi access points. A customer device can then use any of those to start a session.

Extending a Local Area Network

Companies can use L2TP tunnels to bundle various LANs, and link different branches and departments from other locations. L2TP creates a stable tunnel between the central LAN and all the remote devices.


What Is L2TP Passthrough?

vpn passthrough
A VPN passthrough is necessary for older router models.

This feature allows L2TP traffic to pass through a router’s Network Address Translator (NAT) and connect to a VPN client to establish an outbound VPN server connection. NAT lets private IP networks use the internet by translating private IP addresses into public IP addresses before sending the packets to an external network. 

L2TP passthrough is vital for making this happen. Without it, the router’s security settings may block L2TP traffic from reaching the intended VPN server. This is especially common on outdated routers, since most modern routers have built-in VPN passthrough features and support common VPN protocols like PPTP and IPsec.

Though it’s necessary for outdated routers, L2TP passthrough presents two problems. First, it puts strain on the CPU since all the data packets that are passing through must be encrypted and decrypted, increasing computational time. Second, enabling a passthrough can transfer vulnerabilities existing at the IP level to the central network.


What Does L2TP Use for Encryption? 

L2TP gains all of its encryption through IPsec, which supports a wide range of symmetric and asymmetric ciphers. L2TP doesn’t provide any form of encryption or authentication on its own. It creates a stable tunnel between devices but lacks safeguards for maintaining data integrity. 

IPsec also adds data integrity checks, which ensure that data hasn’t been tampered with during transit. There are also reliable authentication frameworks to confirm that the parties on either endpoint have authorized access.


L2TP VPN Pros and Cons

L2TP has survived for this long because it still has some effective aspects. At the same time, like any other protocol, it does have some weaknesses. Here are some of the pros and cons of L2TP.

Advantages of L2TP Connection

Disadvantages of L2TP Connection


How Does L2TP Differ From Other VPN Protocols?

L2TP vs PPTP vs OpenVPN vs IKEv2 vs SSTP
L2TP compares favorably to PPTP, but it’s less advanced than IKEv2, OpenVPN, SSTP or WireGuard.

As one of the oldest VPN protocols, L2TP is rarely the best choice, falling behind IKEv2, OpenVPN and SSTP. However, it’s more secure than PPTP and most older tunneling protocols.

L2TP vs PPTP

LT2P was designed to address the flaws present in PPTP, a now-defunct protocol created for dial-up networks. L2TP/IPsec is more secure as it offers AES 256-bit encryption, while PPTP is limited to a 128-bit implementation of a Microsoft protocol called Microsoft Point-to-Point Encryption (MPPE). MPPE is now considered insecure, and PPTP is unsafe by extension.

L2TP vs OpenVPN

L2TP and OpenVPN use the same encryption standard, so you can rely on both to protect your traffic. However, OpenVPN is an open-source protocol and is less likely to be blocked than L2TP. OpenVPN can use any port, allowing it to bypass NAT firewalls without needing extra configurations.

L2TP can be blocked by firewalls unless you set up a VPN passthrough. It relies strongly on User Datagram Protocol (UDP) port 500 for IPsec to conduct key exchanges; if that’s blocked, you’ll frequently be out of luck unless you implement extra settings.

L2TP vs IKEv2

Like L2TP, IKEv2 uses the IPsec suite to exchange encryption keys over a VPN connection. IKEv2 is faster than L2TP and can quickly switch networks to reestablish VPN connections when it’s temporarily interrupted. Both protocols are vulnerable to firewall blocks.

L2TP vs SSTP

SSTP is more secure than L2TP as it uses SSL/TLS on top of AES-256 encryption, and it can bypass firewalls. However, SSTP was mainly designed for Windows devices, making it less flexible than L2TP. Furthermore, you may still need third-party software to run it effectively. L2TP is also faster than SSTP since the latter uses complicated encryption setups.


Conclusion

L2TP is trying to evolve to keep up with the rapidly changing security and privacy landscape. To sum up, L2TP must be combined with IPsec, which delivers the encryption and authentication needed to secure traffic. Additionally, L2TP works with major operating systems like Windows, macOS and Linux, making it very convenient.

However, it’s still vulnerable to firewall blocks, and it experiences slow speeds when paired with IPsec. If you don’t fancy dealing with these issues, switch to protocols that offer more options, like WireGuard.

Have you encountered the L2TP protocol when using VPNs? Did you manually configure it, or was it built into the VPN app? Tell us all about your experiences in the comments below, and thanks for reading our blog.


FAQ: L2TP VPN Security

Leave a Reply

Your email address will not be published. Required fields are marked *