Tuesday, October 2, 2012

Let's talks about L2TP/IPsec

It may sound a lot like techno jargon, but if you have ever used your phone for the internet then you have definitely used the L2TP/IPSec. What this little mix of letters and numbers means is simple. It is only a replacement for the standard point-to-point control networks used by computers (or PPTP as they are normally called) due to which secure data is encrypted and sent across the wires to different work stations. L2TP/IPSec takes that module and uses it in a better, more adaptable form for your phone. Unlike the Microsoft version of PPTP, the L2TP/IPSec is pretty secure with no major breaches of security to date, which is why everything from Android to the iOS (that means the iPhone and the iPad, for these are the ones which use the internet most frequently) uses it. Most new versions of computers also have the option to use L2TP/IPSec – such as Windows XP and Mac. 

There’s a lot to be said about how L2TP/IPSec is better and different from the PPTP. One of the major differences is that L2TP/IPSec begins to encrypt your data as soon as the connection process is under way, which means that your authentication process can also be encrypted. PPTP does not do this, which may be why it has so many vulnerabilities and breaches of security. There is also the fact that PPTP requires merely an authentication by the user, whereas with L2TP/IPSec the computer needs to authenticate it too, either with a certificate of a shared key you may have in possession. Only after this is the user authentication required. You can see why the L2TP/IPSec is more secure than the PPTP. 

Another way the L2TP/IPSec is better off is because it gives authentication that the data in question has not been tampered with or modified. It protects the confidentiality of the data, by giving an authentication to every packet through four stages – by first checking the data was sent by an authorized user, then checking it was not tampered with during the send-receive transit time, then checking the data was not hijacked by checking against the encryption key on the other end. 

Because the L2TP/IPSec needs two authentications as well, neither one can function independently without the other, which makes it difficult for data to be messed with if someone else tries to enter a key or if your computer itself is infected. A two way security systems keeps this more secure. The L2TP/IPSec has been released with Microsoft as well, so all computers with Windows 98 and above can create and manage their own L2TP/IPSec for higher security. 

Author's Bio: Samantha Kirk of mytechhelp.com, a site that offers savings and current information on RemoteTech Support.

No comments:

Post a Comment