Understanding IPSec, L2TP, IKEv1, and IKEv2

I’m learning about IPSec at the moment. Unfortunately there’s a few roadblocks to my understanding:

  • Vague explanations
  • Not enough detail
  • No practical wisdom
  • Lack of examples

I’ve made a lot of progress, but I’m sure I don’t understand some things completely since I can’t answer these questions:

  • I don’t understand why you would require L2TP over IPSec when you can just use raw IPSec with IKE (What are some scenarios for each, advantages, disadvantages, and scenarios where IPSec/IKE wouldn’t work)
  • Does an IPSec/L2TP VPN use IKE or IKEv2 to set up IPSec, to then tunnel L2TP over it
  • I can’t think of any scenarios where L2TP would be useful
  • I don’t understand why you can use IPSec with IKEv2 as a vpn, but not with IKEv1

If you can help me fill in the gap/s on why this is the case.


IPSec vs L2TP question 1 – in my opinion not answered: What’s are the advantages of L2TP/IPSEC over plain IPSEC?

IPSec vs L2TP question 2 – in my opinion not answered: why use L2TP/IPsec insted of just IPsec

NordVPN on the value of IKEv2 (touches on L2TP): https://nordvpn.com/blog/ikev2ipsec/

Cisco Next-Generation Encryption (NGE): https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html

Juniper docs on IPSec and IKE: https://www.juniper.net/documentation/en_US/junos/topics/concept/vpn-security-overview.html

Article on IPSec: https://cromwell-intl.com/networking/what-is-ipsec.html

Continue reading Understanding IPSec, L2TP, IKEv1, and IKEv2

IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear

A team of researchers has found vulnerabilities in implementations of the Internet Key Exchange version 1 (IKEv1) protocol in firewalls and other networking gear that support IPsec VPN tunnels. If exploited, the flaw can allow attackers to bypass auth… Continue reading IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. Continue reading Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw