PPTP vs. OpenVPN vs. L2TP/IPsec vs. SSTP

Which is the Best VPN Protocol? PPTP vs. OpenVPN vs. L2TP/IPsec vs. SSTP

Want to use a VPN? If you’re looking for a VPN provider or setting up your own VPN, you’ll need to choose a protocol. Some VPN providers may even provider you with a choice of protocols.

This isn’t the final word on any of these VPN standards or encryption schemes. We’ve tried to boil everything down so you can grasp the standards, how they’re related to each other — and which you should use.

Pick Your VPN Protocol the Easy Way with StrongVPN

You don’t need to settle for just using a single VPN protocol — while PPTP isn’t as secure as OpenVPN, it’s a whole lot faster, which can be really useful if you are only using a VPN to watch geo-blocked videos or access websites from another country. If you’re trying to keep yourself secure, you can use OpenVPN.

StrongVPN is a great VPN service that not only has really strong security (hence the name), but they let you choose your level of encryption based on what you’re trying to do. Just one click in the client and you can choose between protocols with a really helpful explanation for each.

If you’re looking for a new VPN service, definitely consider StrongVPN — they have plans as low as $5.83 per month.

PPTP

RELATED ARTICLE

What Is a VPN, and Why Would I Need One?

Don’t use PPTP. Point-to-point tunneling protocol is a common protocol because it’s been implemented in Windows in various forms since Windows 95. PPTP has many known security issues, and it’s likely the NSA (and probably other intelligence agencies) are decrypting these supposedly “secure” connections. That means attackers and more repressive governments would have an easier way to compromise these connections.

Yes, PPTP is common and easy to set up. PPTP clients are built into many platforms, including Windows. That’s the only advantage, and it’s not worth it. It’s time to move on.

In Summary: PPTP is old and vulnerable, although integrated into common operating systems and easy to set up. Stay away.

OpenVPN

OpenVPN uses open-source technologies like the OpenSSL encryption library and SSL v3/TLS v1 protocols. It can be configured to run on any port, so you could configure a server to work over TCP port 443. The OpenSSL VPN traffic would then be practically indistinguishable from standard HTTPS traffic that occurs when you connect to a secure website. This makes it difficult to block completely.

It’s very configurable, and will be most secure if it’s set to use AES encryption instead of the weaker Blowfish encryption. OpenVPN has become a popular standard. We’ve seen no serious concerns that anyone (including the NSA) has compromised OpenVPN connections.

OpenVPN support isn’t integrated into popular desktop or mobile operating systems. Connecting to an OpenVPN network requires a a third-party application — either a desktop application or a mobile app. Yes, you can even use mobile apps to connect to OpenVPN networks on Apple’s iOS.

In Summary: OpenVPN is new and secure, although you will need to install a third-party application. This is the one you should probably use.

L2TP/IPsec

Layer 2 Tunnel Protocol is a VPN protocol that doesn’t offer any encryption. That’s why it’s usually implemented along with IPsec encryption. As it’s built into modern desktop operating systems and mobile devices, it’s fairly easy to implement. But it uses UDP port 500 — that means it can’t be disguised on another port, like OpenVPN can. It’s thus much easier to block and harder to get around firewalls with.

IPsec encryption should be secure, theoretically. There are some concerns that the NSA could have weakened the standard, but no one knows for sure. Either way, this is a slower solution than OpenVPN. The traffic must be converted into L2TP form, and then encryption added on top with IPsec. It’s a two-step process.

In Summary: L2TP/IPsec is theoretically secure, but there are some concerns. It’s easy to set up, but has trouble getting around firewalls and isn’t as efficient as OpenVPN. Stick with OpenVPN if possible, but definitely use this over PPTP.

SSTP

Secure Socket Tunneling Protocol was introduced in Windows Vista Service Pack 1. It’s a proprietary Microsoft protocol, and is best supported on Windows. It may be more stable on Windows because it’s integrated into the operating system whereas OpenVPN isn’t — that’s the biggest potential advantage. Some support for it is available on other operating systems, but it’s nowhere near as widespread.

It can be configured to use very secure AES encryption, which is good. For Windows users, it’s certainly better than PPTP — but, as it’s a proprietary protocol, it isn’t subject to the independent audits OpenVPN is subject to. Because it uses SSL v3 like OpenVPN, it has similar abilities to bypass firewalls and should work better for this than L2TP/IPsec or PPTP.

In Summary: It’s like OpenVPN, but mostly just for Windows and can’t be audited as fully. Still, this is better to use than PPTP. And, because it can be configured to use AES encryption, is arguably more trustworthy than L2TP/IPsec.



OpenVPN seems to be the best option. If you have to use another protocol on Windows, SSTP is the ideal one to choose. If only L2TP/IPsec or PPTP are available, use L2TP/IPsec. Avoid PPTP if possible — unless you absolutely have to connect to a VPN server that only allows that ancient protocol.

转自:https://www.howtogeek.com/211329/which-is-the-best-vpn-protocol-pptp-vs.-openvpn-vs.-l2tpipsec-vs.-sstp/

时间: 2024-10-11 23:32:20

PPTP vs. OpenVPN vs. L2TP/IPsec vs. SSTP的相关文章

通过使用 L2TP/IPsec VPN 协议连接到 VPN Gate

本文档描述了如何使用 L2TP/IPsec VPN 客户端连接到 VPN Gate 的一个 VPN 中继服务器. L2TP/IPsec VPN 客户端在 Windows.Mac.iOS 和安卓上的插件.这比 使用 OpenVPN 容易配置.在您尝试使用 OpenVPN 之前,推荐使用 L2TP/IPSec VPN.然而,一些网络或防火墙拦截 L2TP/IPSec 数据包.如果 L2TP/IPsec 失败,请尝试 OpenVPN. L2TP/IPsec VPN 的连接参数 如果您知道如何安装,通过

在 CentOS 架設 L2TP/IPsec VPN

之前嘗試過PPTP和OpenVPN,但PPTP太弱,而OpenVPN太依賴第三方軟體,因此想說來試試看L2TP/IPsec 架設的軟體使用epel上的strongSwan和xl2tpd,不用openSwan是因OSX在連線的時候會遇到伺服器端錯誤,據說是openSwan本身的問題 安裝前先把必要套件補完 yum install strongswan xl2tpd strongSwan裝完之後可以在/etc/strongswan設定,裏頭的strongswan.conf沒特別設定不需要去動,預設是

l2tp ipsec centos7

PPTP.L2TP和IPsec的区别及优缺点 1.PPTP协议是点对点隧道协议: 其将控制包与数据包分开,控制包采用TCP控制,用于严格的状态查询及信令信息:数据包部分先封装在PPP协议中,然后封装到GRE V2协议中. 2.L2TP是国际标准隧道协议: 它结合了PPTP协议以及第二层转发L2F协议的优点,能以隧道方式使PPP包通过各种网络协议,包括ATM.SONET和帧中继.但是 L2TP没有任何加密措施,更多是和IPSec协议结合使用,提供隧道验证. 3.两者的联系与区别: 联系:PPTP和

架设基于StrongSwan的L2tp/IPSec VPN服务器

架设基于StrongSwan的L2tp/IPSec VPN服务器 参考: http://agit8.turbulent.ca/bwp/2011/01/setting-up-a-vpn-server-with-ubuntu-1004-and-strongswan/ 以下操作基于Debian 6 安装StrongSwan apt-get install libgmp3-dev libssl-dev make cd /tmp wget http://download.strongswan.org/st

Centos安装L2TP+IPSec完整教程

Centos安装L2TP+IPSec完整教程 L2TP相比PPTP是另外一种隧道协议方式,部分网络下PPTP无法连接,可以尝试L2TP,一般而言在PC上,两者使用体验没什么不同,技术原理上的不同请参照这里. 建议PC电脑上优先使用PPTP,无法使用可以尝试L2TP,移动端推荐使用L2TP: 安装方式: 一.一键脚本安装(推荐,安装简单) 安装的软件包版本分别是openswan-2.6.38.xl2tpd-1.2.4 VPS是需要基于Xen或KVM的. 注意:基于 OpenVZ 虚拟化技术的 VP

基于Linux的 L2TP+IPSec VPN服务器搭建

一.硬件说明服务器采用两张网卡eth0用于连接内网eth1用于VPN网关. 基本网络环境定义内网网段192.168.100.0/24 VPN网段192.168.200.0/24 eth0IP192.168.100.101/24   网关192.168.100.1 eth1IP192.168.90.200.1/24  网关留空 二.系统CentOS 6.5 (使用最小化安装) 三.软件 1. openswan:提供IPSec加密 2. lsof:用于数据访问 3. ppp:提供用户名.密码 认证

六步搞定centos 6下l2tp + ipsec VPN服务器配置

近年来最累的一次折腾.有必要好好记录一下.跟了网上N个教程,有好几个都走不通.最后自己彻底整理了一次.把自己的经验和配置分享出来. 首先隆重感谢一下至今素未谋面的老熊,真是好人啊.06年的时候就在plesk服务器换ip的事上,帮了我好大的忙.没想到这次在我卡在第6步,最绝望的时候,这只熊的婀娜身影再一次出现在了我的生活中.还在漆黑的深夜中陪伴在我的身边.以下隆重公布一下他的QQ,造福广大网友!QQ: 499******* (后几位号码,为符合当地莫名其妙的“相关法规”,被系统自动屏蔽...) 其

ROS+L2TP+IPSEC

在WIN7X64,WIN8.1,WIN10,MACBOOK和苹果的IOS10调试L2TP/IPSEC通过 请注意IPSEC,要求客户端IP必须唯一,不可以有重复,那么访问VPN服务器的客户端IP,就不可以多用户同时通过NAT去访问外部的VPN服务器!!!这点要注意,如果想多用户在一个NAT访问VPN服务器,必须先让本地的路由器跟VPN服务器建立GRE隧道,然后访问VPN服务器的客户端,不可以使用NAT或者伪装访问VPN服务器,必须使用静态路由的方式访问,这样在VPN服务器那端,看到客户端的IP就

RouterOS Openswan l2tp ipsec

Centos 配置文件目录 vi /etc/ipsec.conf vi  /etc/ipsec.secrets vi /etc/xl2tpd/xl2tpd.conf vi /etc/ppp/options.xl2tpd vi /etc/ppp/chap-secrets 安装 1. yum 更新 yum upgrade 1.2安装 bind-utiles 开发包 yum install wget bind-utils 1.2添加EPEL源 wget http://mirror.nl.leasewe