Solved

VPN choice on a Macbook

Posted on 2014-12-10
1
216 Views
Last Modified: 2014-12-11
Setting up VPN on my Macbook, I have 3 choices for VPN type: (1) L2TP over IPSec, (2) PPTP, and
(3) Cisco IPSec.   What is the difference between these choices, and what are the reasons I would choose one over another?
0
Comment
Question by:rudy201
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 8

Accepted Solution

by:
Wilder_Admin earned 500 total points
ID: 40491387
For a beginner in this topic i will explain the differences between. All 3 doing mainly the same. You create technally a tunnel between to end points and send pakages through. The difference is how the the tunnel is secured against break ins or better to say if someone is able to mirror this and afterwards to try to decrypt.

You have to decide which you can use (depends on the other side too) and how important is the performance. classical pptp came from windows so normaly you would choose this if the other end is a windows server/client. l2tp ocer ipsec is a quite of standard and Cisco Ipsec only a few can do.

If i had to choose i would choose the l2tp over ipsec, not because of any security reasons only because of the future and the need of any change.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Ready for our next Course of the Month? Here's what's on tap for June.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question