Solved

VPN choice on a Macbook

Posted on 2014-12-10
1
208 Views
Last Modified: 2014-12-11
Setting up VPN on my Macbook, I have 3 choices for VPN type: (1) L2TP over IPSec, (2) PPTP, and
(3) Cisco IPSec.   What is the difference between these choices, and what are the reasons I would choose one over another?
0
Comment
Question by:rudy201
1 Comment
 
LVL 8

Accepted Solution

by:
Wilder_Admin earned 500 total points
ID: 40491387
For a beginner in this topic i will explain the differences between. All 3 doing mainly the same. You create technally a tunnel between to end points and send pakages through. The difference is how the the tunnel is secured against break ins or better to say if someone is able to mirror this and afterwards to try to decrypt.

You have to decide which you can use (depends on the other side too) and how important is the performance. classical pptp came from windows so normaly you would choose this if the other end is a windows server/client. l2tp ocer ipsec is a quite of standard and Cisco Ipsec only a few can do.

If i had to choose i would choose the l2tp over ipsec, not because of any security reasons only because of the future and the need of any change.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Firewall report connections 8 76
7 camera surveillance system hacked 6 52
Windows Folder Permissions 9 46
Admin account lockout 10 39
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question