Security designed in at the protocol level

ProL2TP implements the full range of security mechanisms called out by the L2TP RFCs. These include AVP hiding, control message digests, and transport message numbering.

ProL2TP integrates seamlessly with standard Linux IPSec implementations for full on-the wire encryption. This configuration is often used to implement a Linux VPN server.

Developed using industry-leading tools and techniques to catch bugs early

Our experienced development team makes full use of the most up to date systems and tooling to ensure that ProL2TP is robust and secure. Our source code is routinely scanned using static analysis and runtime validation tools designed to catch memory leaks, buffer access problems, and other coding errors. We build ProL2TP source code against a wide range of compilers to capture warnings and ensure standards compliance.

Any system is only as strong as its weakest component. We maintain a comprehensive test suite for ProL2TP and regularly probe for the weakest link using stress testing and fuzzing to subject ProL2TP to unusual or unexpected events similar to those that might occur in the real world.

Learn more about ProL2TP's full feature set.