Recommended textbooks for you Show
Computer Networking: A Top-Down Approach (7th Edi... ISBN:9780133594140 Author:James Kurose, Keith Ross Publisher:PEARSON Computer Organization and Design MIPS Edition, Fi... ISBN:9780124077263 Author:David A. Patterson, John L. Hennessy Publisher:Elsevier Science Network+ Guide to Networks (MindTap Course List) ISBN:9781337569330 Author:Jill West, Tamara Dean, Jean Andrews Publisher:Cengage Learning Concepts of Database Management ISBN:9781337093422 Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last Publisher:Cengage Learning Prelude to Programming ISBN:9780133750423 Author:VENIT, Stewart Publisher:Pearson Education Computer Networking: A Top-Down Approach (7th Edi... ISBN:9780133594140 Author:James Kurose, Keith Ross Publisher:PEARSON Computer Organization and Design MIPS Edition, Fi... ISBN:9780124077263 Author:David A. Patterson, John L. Hennessy Publisher:Elsevier Science Network+ Guide to Networks (MindTap Course List) ISBN:9781337569330 Author:Jill West, Tamara Dean, Jean Andrews Publisher:Cengage Learning Concepts of Database Management ISBN:9781337093422 Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last Publisher:Cengage Learning Prelude to Programming ISBN:9780133750423 Author:VENIT, Stewart Publisher:Pearson Education 48 48 people found this article helpful A now-obsolescent protocol that helped pave the way for modern VPNsPoint-to-Point Tunneling Protocol is a network protocol mostly used with Windows computers. Nowadays, it's considered obsolete for use in virtual private networks because of its many known security deficiencies. Nevertheless, PPTP is still in use in some networks. Getty Images/lvcandyA Brief History of PPTPPPTP is a network tunneling protocol that was developed in 1999 by a vendor consortium formed by Microsoft, Ascend Communications (today part of Nokia), 3Com, and other groups. PPTP was designed to improve on its predecessor Point-to-Point Protocol, a data link layer (Layer 2) protocol designed to connect two routers directly. While it's considered a fast and stable protocol for Windows networks, PPTP is no longer considered secure. PPTP has been superseded by safer and more secure VPN tunneling protocols, including OpenVPN, L2TP/IPSec, and IKEv2/IPSec. How PPTP WorksPPTP is an outgrowth of PPP, and as such, is based on its authentication and encryption framework. Like all tunneling technologies, PPTP encapsulates data packets, creating a tunnel for data to flow across an IP network. PPTP uses a client-server design (the technical specification is contained in Internet RFC 2637) that operates at Layer 2 of the OSI model. Once the VPN tunnel is established, PPTP supports two types of information flow:
People usually obtain the PPTP VPN server address information from their server administrator. Connection strings can either be a server name or an IP address. PPTP ProtocolsPPTP uses General Routing Encapsulation tunneling to encapsulate data packets. It uses TCP port 1723 and IP port 47 through the Transport Control Protocol. PPTP supports up to 128-bit encryption keys and Microsoft Point-to-Point Encryption standards. Tunneling Modes: Voluntary and CompulsoryThe protocol supports two types of tunneling:
Is PPTP Still Being Used?In spite of its age and security shortcomings, PPTP is still used in some network implementations—mostly internal business VPNs in older offices. The advantages of PPTP are that it's easy to set up, it's fast, and because it's built-in on most platforms, you don't need any special software to use it. All you need to set up a connection are your login credentials and a server address. However, the fact that it's easy to use doesn't mean you should use it, especially if having a high level of security is important to you. In that case, you should use a more secure protocol for your VPN network, such as OpenVPN, L2TP/IPSec, or IKEv2/IPSec. Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Which transport protocol does PPTP use?Typical PPTP Scenario
(Network access servers are also referred to as front-end processors (FEPs), dial-in servers, or point-of-presence (POP) servers.) Once connected, the client can send and receive packets over the Internet. The network access server uses the TCP/IP protocol for all traffic to the Internet.
Does PPTP use TCP or UDP?Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP protocol 47 Generic Routing Encapsulation (GRE). PPTP provides a low-cost, private connection to a corporate network through the Internet.
Which layer does PPTP work at?PPTP VPN is the process of creating and managing VPN connections or services using point-to-point tunneling protocol (PPTP). It is one of the most common ways of creating a VPN connection, and operates at layer 2 of the OSI model.
Does PPTP use TCP?PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality.
|