1. Ports
  2. Port 1701

Port 1701 carries L2TP traffic. Every time a remote worker in the late 1990s connected to their corporate network from a dial-up modem in a hotel room, port 1701 was there, silently extending the illusion of physical presence across the telephone network and the nascent Internet.

What Port 1701 Does

L2TP, the Layer 2 Tunneling Protocol, operates on UDP port 1701.1 It establishes control connections between two endpoints: an L2TP Access Concentrator (LAC) on one end and an L2TP Network Server (LNS) on the other.2 The LAC receives your connection and forwards it through a tunnel to the LNS, which terminates the session as if you had physically plugged into the corporate network.

The protocol encapsulates PPP (Point-to-Point Protocol) frames, wrapping them for transport across packet-switched networks.3 This means L2TP doesn't replace PPP; it extends it. Your dial-up connection doesn't end at your ISP. It continues, tunneled through the Internet, all the way to your destination network.

Think of it as a pneumatic tube system for network packets. The tube itself is transparent. Anyone watching can see the capsules pass by. The contents? Visible, unless you wrap them in something opaque.

The Marriage of Rivals

In the mid-1990s, two companies were fighting for the future of virtual private networking. Microsoft had PPTP (Point-to-Point Tunneling Protocol). Cisco had L2F (Layer 2 Forwarding). Both protocols did similar things in incompatible ways.4

Rather than let the market fragment, Microsoft and Cisco did something remarkable: they collaborated. They combined the best features of both protocols into L2TP.5 In August 1999, RFC 2661 was published, authored by engineers from both companies along with representatives from Ascend Communications and Redback Networks.6

The authors were:

  • W. Mark Townsley (Cisco Systems)
  • Andrew J. Valencia (Cisco Systems)
  • Allan Rubens (Ascend Communications)
  • Gurdeep-Singh Pall (Microsoft Corporation)
  • Glen Zorn (Microsoft Corporation)
  • William Palter (Redback Networks)

This was corporate diplomacy encoded in an RFC. Two rival protocols became one standard, and port 1701 became the meeting point.

How the Tunnel Works

L2TP operates in two phases. First, a control connection establishes the tunnel itself. The LAC sends a Start-Control-Connection-Request (SCCRQ) to the LNS on port 1701. The LNS responds, and they exchange Attribute-Value Pairs (AVPs) containing protocol versions, framing capabilities, and authentication credentials.7

Once the control connection exists, individual sessions can be established within it. Multiple sessions can share a single tunnel, each identified by a unique Session ID.8 This multiplexing makes L2TP efficient for service providers handling thousands of simultaneous connections.

The data flow looks like this:

  1. A remote user initiates a PPP connection
  2. The LAC (often at an ISP) receives the connection
  3. The LAC tunnels the PPP frames to the LNS over port 1701
  4. The LNS terminates the PPP session and grants access to the destination network
  5. To the user, it feels like a direct connection

The tunnel is transparent. The user doesn't know (or need to know) that their packets are being encapsulated, transported across an IP network, and de-encapsulated at the other end.

The Security Problem

Here's what L2TP doesn't do: encrypt anything.9

The protocol provides a tunnel. It does not provide confidentiality. Control messages can optionally be hidden using a pre-shared secret, but data packets flow through the tunnel in whatever state they arrived. If you send plaintext, plaintext traverses the tunnel.

This is a feature, not a bug. L2TP was designed to be protocol-agnostic, carrying any Layer 2 traffic. Encryption was supposed to come from another layer. In practice, this meant IPsec.

L2TP/IPsec became the standard deployment. IPsec wraps the entire L2TP tunnel in AES-encrypted packets, providing the confidentiality L2TP lacks.10 This combination uses three ports:

  • UDP 500: IKE (Internet Key Exchange) for negotiating security associations
  • UDP 4500: NAT-T (NAT Traversal) when clients are behind NAT
  • UDP 1701: L2TP itself, carried inside the IPsec tunnel11

The irony is that once IPsec is active, you don't actually need to open port 1701 on your firewall. The L2TP traffic is encapsulated inside IPsec packets and decrypted at the endpoints.12

The Snowden Shadow

In 2013, Edward Snowden's disclosures cast a long shadow over L2TP/IPsec.

Documents suggested the NSA had been working to compromise IPsec since at least 2006, with claims of success against IKEv1 by 2007.13 John Gilmore, EFF co-founder and security researcher, stated his belief that IPsec was "deliberately weakened during its design phase."14

Whether L2TP/IPsec was actually compromised at scale remains unclear. What is clear is that the revelations destroyed trust. Security professionals began recommending OpenVPN and later WireGuard as alternatives, protocols without the taint of possible government interference.15

The additional problem: many VPN providers implement L2TP/IPsec poorly. Pre-shared keys published on websites. Weak cipher suites for compatibility. Configuration errors that leak traffic. The protocol itself might be secure; the deployments often weren't.16

The Deprecation

On October 8, 2024, Microsoft announced the deprecation of both PPTP and L2TP in Windows Server.17 The protocols will still function for outgoing connections, but Windows Server will no longer accept incoming VPN connections using these protocols.18

Microsoft's recommended alternatives are SSTP (Secure Socket Tunneling Protocol) and IKEv2, both offering stronger encryption and improved reliability.19 For those outside the Microsoft ecosystem, WireGuard and OpenVPN are the modern standards.

L2TP served for 25 years. It connected road warriors to their offices. It let ISPs offer virtual private network services. It tunneled countless PPP sessions across the Internet. Now it joins PPTP in the category of "legacy technology," still functioning but no longer recommended for new deployments.20

NCC-1701

The port number 1701 is almost certainly a coincidence. The IANA port assignment process doesn't typically consider pop culture references.

But the coincidence delights. NCC-1701 is the registry number of the USS Enterprise from Star Trek, a number chosen by art director Matt Jefferies because the digits were "easily identifiable from a distance."21 The Enterprise explored strange new worlds. Port 1701 let you virtually explore your corporate network from strange new locations.

Every network engineer who ever configured an L2TP tunnel has quietly smiled at the port number. It's the kind of accidental poetry the Internet occasionally produces.

The Port's Neighbors

L2TP exists in a cluster of VPN-related ports:

PortProtocolDescription
500UDPIKE (Internet Key Exchange)
1194UDP/TCPOpenVPN
1701UDPL2TP
1723TCPPPTP
4500UDPIPsec NAT-T

Port 1723 is L2TP's elder sibling, PPTP, also deprecated, with known security vulnerabilities that make L2TP look robust by comparison. Port 500 and 4500 are IPsec's ports, often used in conjunction with 1701. Port 1194 is OpenVPN, the protocol that largely replaced L2TP/IPsec for security-conscious users.

What Flows Through It

Port 1701 carries the abstraction of presence.

When L2TP was designed, being "at work" meant physical presence. Your computer plugged into a wall jack. The network administrator could see which port you occupied. Corporate resources assumed you were inside the building, inside the firewall, inside the trusted perimeter.

L2TP dissolved that assumption. It made "at work" a virtual state. You could be in a hotel in Singapore, in your home office, in a coffee shop. The LNS didn't know the difference. To the network, you were just another PPP session, physically present at a port that didn't physically exist.

This was the first draft of remote work. Before Slack, before Zoom, before the pandemic made "work from home" a universal concept, L2TP was quietly making physical location irrelevant to network access.

Every time a sales representative updated a CRM from an airport. Every time an engineer fixed a production issue from their bedroom at 2am. Every time a contractor accessed internal systems without ever visiting the office. Port 1701 was there, extending the illusion of presence, making the Internet invisible between you and your destination.

Frequently Asked Questions

Was this page helpful?

😔
🤨
😃