To implement remote access VPNs, I want to install a Cisco 3015 concentrator in one office and configure Cisco...
3002 VPN hardware clients in the other. As the network administrator, I have designed the whole structure, but I am confused about tunneling protocols (L2TP & PPTP) and security protocol (IPsec). Can you please explain how these protocols differ, and which is a better choice for secure communication?
As you mentioned, Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) are two different tunneling protocols. You'll often find three different options for setting up VPN tunnels: PPTP, IPsec and IPsec over L2TP. In general, IPsec is the most secure option because, when properly implemented, it provides confidentiality, integrity and authentication services for your network traffic. Microsoft Windows does not natively support straight IPsec, so administrators setting up VPNs to support Windows clients often offer IPsec over L2TP connectivity.
That said, the Cisco gear you describe all natively supports IPsec tunneling. To set up simple site-to-site VPNs between different Cisco devices, you can't go wrong with IPsec.
- Visit our IPsec resource center and learn how enterprises can use this protocol to solve remote access issues.
Related Q&A from Mike Chapple
The updated HITRUST Common Security Framework allows organizations to manage privacy, security and compliance with one framework. Here's how it works...continue reading
A HIPAA audit covers privacy compliance, and organizations need to be prepared. Expert Mike Chapple discusses privacy in the audits.continue reading
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.