[2023 October Tips & Tricks] Why deprecate L2TP over IPSec in the USG FLEX H Series? (2024)

Why deprecate L2TP over IPSec in the USG FLEX H Series?

L2TP over IPSec was a popular VPN protocol in the past, but it has become less common and is often deprecated and discouraged for several reasons:

Security Concerns: It does NOT provide encryption or confidentiality to traffic passing through it. It relies on other protocols like IPsec for encryption and security.

Limited Platforms: Not all platforms and devices support L2TP/IPSec. For example, some mobile devices and operating systems have moved away from supporting this protocol in favor of more modern and secure alternatives. Android has removed L2TP VPN in its version 12 onward so that consumers can enjoy better security, performance, and interoperability with other systems.

Performance: L2TP over IPSec can be less efficient in terms of performance compared to newer VPN protocols. The additional overhead introduced by the combination of L2TP and IPSec can result in reduced throughput, which may be a concern in high-speed or high-bandwidth scenarios.

Zyxel is determined to deprecate the L2TP over IPSec in favor of a more modern and secure VPN protocol like IKEv2 in our USG FLEX H series, while keeping L2TP over IPSec in the ZLD-based product lines USG FLEX series and ATP series. IKEv2 is a VPN protocol known for its security, reliability, and efficiency. The best part is it’s widely adopted and provides outstanding interoperability, working with different types of VPN clients, OS, and VPN gateway.

To help our customers migrate to IKEv2, we provide Remote VPN Wizard in every product (ZLD, uOS, Nebula firewall, and future SCR), which generates a VPN script for use with free OS native- IKEv2 VPN clients e.g., Windows, macOS, iOS, Android (StrongSwan) in just a few clicks. As a result, our customers can enjoy the benefits of IKEv2 without the additional cost of purchasing IKEv2 client software.

With the subscription-based Zyxel SecuExtender VPN client, we take a step further allowing customers to enjoy auto-provisioning by simply retrieving the VPN settings right from our firewalls.

[2023 October Tips & Tricks] Why deprecate L2TP over IPSec in the USG FLEX H Series? (2024)

FAQs

Why use L2TP over IPsec? ›

L2TP over IPsec allows you, while providing the same functions as PPTP, to give individual hosts access to your network through an encrypted IPsec tunnel.

Which is better IKEv2 or IPsec or L2TP? ›

IKEv2 and L2TP/IPsec provide the same level of security as they both work around IPsec. IKEv2 is, however, supported by fewer systems and software, though this shouldn't be a main concern to most users.

Is L2TP outdated? ›

L2TP over IPSec was a popular VPN protocol in the past, but it has become less common and is often deprecated and discouraged for several reasons: Security Concerns: It does NOT provide encryption or confidentiality to traffic passing through it. It relies on other protocols like IPsec for encryption and security.

What is the weakness of L2TP? ›

L2TP struggles to bypass firewalls and is unreliable when circumventing network restrictions. Complicated setup. L2TP is a more complex protocol to set up when compared to newer tunneling protocols because it needs to be paired with IPsec to encrypt the transmitted data.

Is L2TP without IPsec secure? ›

L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity.

Why might you choose an L2TP IPsec VPN over SSL TLS or vice versa? ›

The major difference between IPsec and SSL/TLS lies in the network layers where the authentication and encryption steps are performed. IPsec guarantees the confidentiality and integrity of a flow, by encapsulating it within the network layer (“internet” layer in the TCP/IP stack or “network” layer in the OSI model).

Is IPsec obsolete? ›

IPsec, once a stalwart in secure communications, is now facing its reckoning. As a complex and aging technology, its shortcomings have become increasingly apparent. This protocol, developed decades ago, involves intricate configurations, leading to complexities in setup, management, and maintenance.

What is the best VPN protocol in 2024? ›

In our 2024 speed tests, NordVPN solidified itself as the fastest VPN, edging out both Surfshark and ExpressVPN with an average speed loss of just 11.1%. Using its NordLynx VPN protocol, we measured an average internet speed loss of just 3.2% with Windows and 12.6% on MacOS.

What is the strongest VPN security protocol? ›

In other words, OpenVPN is the most secure protocol. WireGuard uses state-of-the-art cryptography. It doesn't support AES encryption, but it substitutes it with ChaCha20. It's less complex, but still very secure.

What is better than L2TP? ›

PPTP is simpler and easier to use, and faster than L2TP. It also comes with lower overheads and greater cost-effectiveness. PPTP does not need Public Key Infrastructure (PKI). It uses 128-bit encryption.

What are the limitations of L2TP? ›

Disadvantages of L2TP:
  • Problems with firewalls. L2TP operates on port 500, which can lead to issues when traversing firewalls and NAT gateways. ...
  • Speed drops with IPSec. The speed advantages of raw L2TP may disappear when IPSec encryption is applied. ...
  • Instability.

Should I enable L2TP? ›

While PPTP is easy to configure and fast, L2TP is much more secure. As a result, L2TP is the better choice between these two protocols. Nevertheless, when thinking about security and performance, you should consider using the OpenVPN tunneling protocol.

What is the major drawback of IPsec? ›

While IPSec provides robust security for IP communications, its major drawback lies in its complexity and the administrative burden it places on network administrators.

What is a disadvantage of a VPN that uses SSL instead of IPsec? ›

With SSL VPNs, if a bad actor gains control of the tunnel they have access to only the specific application or operating systems that the SSL is connected to. IPsec protocol, while secured with encryption as part of the TCP/IP suite, can give hackers full access to an entire corporate network if access is gained.

Can L2TP be blocked? ›

L2TP is a decent VPN protocol that provides a satisfactory level of encryption for your data. Sometimes L2TP could get blocked for unknown reasons, and that means your VPN won't work. Since having a non-functional VPN can be critical to your privacy, you must fix it as soon as possible.

What is the advantage of L2TP? ›

Benefits of L2TP

Reliable Security: With the incorporation of IPsec, L2TP ensures robust security, making it a solid choice for users focused on data protection. Stable Connections: L2TP offers reliable connections, which is crucial for users who require consistent and uninterrupted VPN services.

Why use TLS over IPsec? ›

SSL/TLS VPN products protect application traffic streams from remote users to an SSL/TLS gateway. In other words, IPsec VPNs connect hosts or networks to a protected private network, while SSL/TLS VPNs securely connect a user's application session to services inside a protected network.

Why would we enable L2TP on your router? ›

Layer Two Tunneling Protocol or L2TP passthrough is another type of VPN passthrough that is similar to the PPTP passthrough because it adds a tunnel to any device that you would like to connect to your VPN network. It is a more secure protocol than its predecessors.

Why SSL VPN is better than IPsec? ›

IPsec provides network-layer security, encrypting entire data packets, making it a popular choice for full network communications. On the other hand, SSL VPNs focus on application-layer security, ensuring only specific application data is encrypted. The "more secure" label depends on the context.

Top Articles
Latest Posts
Article information

Author: Rob Wisoky

Last Updated:

Views: 6195

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Rob Wisoky

Birthday: 1994-09-30

Address: 5789 Michel Vista, West Domenic, OR 80464-9452

Phone: +97313824072371

Job: Education Orchestrator

Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.