PPTP (Point-To-Point Tunneling Protocol) Features, Advantages, and Disadvantages
PPTP, after encapsulating frames, uses TCP port 1723 to create a tunnel. It uses GRE port 47 to encapsulate PPP frames going through this tunnel. Additionally, it uses a username and password to verify the connection at the local and remote destinations.
GRE tunnel is used to transport encapsulated PPP frames and also allows tunneling of any protocol that can be carried within PPP, including IP, NetBEUI, and IPX.
Data traffic passing through the PPP tunnel in Microsoft operating systems can be authenticated with PAP, CHAP, and MS-CHAP v1/v2.
The PPTP started acting as a VPN service in the 1990s after many improvements by Microsoft Corporation. The birth of this protocol came to the market due to the inability of PPP to create a tunnel.
Basically, it protects the data flow and online connection between client and server, securing the transactions.
In short, the main task of using the tunneling protocol is to establish a private virtual network, ie VPN connection. A VPN connection is a secure virtual network established between your Internet service provider and another VPN service provider.
So when you use a VPN, all your online activities are encrypted and your private and confidential information cannot be obtained by attackers.
This tunneling protocol is easy to configure and is one of the easiest VPN types and is also preinstalled on most devices with Windows, macOS, Android, and iOS operating systems. In fact, Microsoft has used this protocol in Windows NT and Windows 95.
Additionally, it is faster than protocols used in other VPN connectivity such as L2TP/IPSec, SSTP, and IKEv2.
Thanks to this protocol, many institutions or organizations applied an additional layer of security to their network systems. But later, vulnerabilities were found in the cryptography of this protocol, and its encryption was easily cracked.
Therefore, if performance is preferred over security when making a virtual private network connection, PPTP can be chosen. However, if security is at the forefront, much more secure protocols such as OpenVPN, L2TP/IPSec, SSTP or IKEv2 can be chosen.
The advantages of PPTP protocol over L2TP are as follows;
It is fully compatible with Windows systems.
A PPTP VPN connection can be easily created, even on any version of Windows.
It is very easy to install and use it.
A virtual network connection configured with a strong encryption algorithm offers less performance, while PPTP performance is higher because the security is simpler.
The disadvantages of PPTP protocol over L2TP or other protocols are as follows;
Since it uses a simple encryption algorithm, security is insufficient.
It uses 128 Bit encryption.
There is a high risk of data being stolen on connections between local and remote networks.