Cisco CloudCenter: Get the Hybrid IT Advantage

Layer 2 Tunneling Protocol (L2TP)

Definition - What does Layer 2 Tunneling Protocol (L2TP) mean?

Layer 2 Tunneling Protocol (L2TP) is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations. L2TP is similar to the Data Link Layer Protocol in the OSI reference model, but it is actually a session layer protocol.

A User Datagram Protocol (UDP) port is used for L2TP communication. Because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as Internet Protocol security (IPsec) is often used with L2TP.

This term is also known as Virtual Dialup Protocol.

Techopedia explains Layer 2 Tunneling Protocol (L2TP)

Officially published in 1999, L2TP is an extension of Point-to-Point Tunneling Protocol (PPTP). It is the merger of two protocols, one from Microsoft (PPTP) and one from Cisco. L2TP saves the dial-up cost and overhead for any user willing to remotely connect with a site office. L2TP is known as Virtual Dialup Protocol because of its service of the Point-to-Point Protocol (PPP) extension over Internet.

For example, suppose that a user in New York is connected with a traditional dial-up modem and is looking to communicate with someone in Sydney. For this purpose, the user gets a connection and establishes a dedicated link from New York to Sydney. This dedicated dial-up link will use a public switched telephone network (PSTN) and provide the lowest data transfer speed because of shared PSTN media. Thousands of other users are using the same medium, so the user will have an overall speed of 33 Kbps or worse.

Instead, the user could use L2TP where PPP is used and configured at both ends (the ISP and the user site). Following the successful authentication of a user request, a tunnel is created for user data. When the tunnel is created, the user is open to start communication.

Advantages of L2TP include:

  • High data security is provided for critical applications.
  • High-level encryption is used so that critical information is always safe and remains personal.
  • It provides excellent and efficient connectivity.
  • It is cost-effective and does not have overhead cost after implementation.
  • It is reliable, scalable, fast and flexible.
  • It is an industry-standard best for the corporate sector.
  • It has the best authorization policy for users with VPN authentication.
Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.