DrayTek routers support various VPN protocols, and each of them uses different encryption methods. This results in different levels of security and speed transmission. Listed below are the VPN protocols which DrayTek Router offers and their relative security strength and performance to help you decide which VPN protocol is best for your network.
VPN Type | Security Strength | Performance | NAT Traversal | Ease of Use |
IKEv2 | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
IPsec (IKEv1) | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() |
IPsec Xauth | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
L2TP over IPsec | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() |
SSL VPN | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
PPTP | ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
L2TP | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
OpenVPN | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
VPN Type | Security Strength | Performance | NAT Traversal | Ease of Use |
IKEv2 | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
IPsec (IKEv1) | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() |
IPsec Xauth | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
L2TP over IPsec | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() |
![]() ![]() |
SSL VPN | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
PPTP | ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
L2TP | ![]() |
![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
OpenVPN | ![]() ![]() ![]() ![]() ![]() |
![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
VPN Type | Security Strength | Performance | NAT Traversal | Ease of Use |
IKEv2 EAP | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() |
IPsec Xauth | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
IKEv2 | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
IPsec (IKEv1) | ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
OpenVPN | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
SSL VPN | ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
L2TP over IPsec | ![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() |
![]() ![]() |
PPTP | ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
L2TP | ![]() |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
![]() ![]() |
Note: The performance is based on LAN-to-LAN VPN throughput, different OS platforms and computer specifications could influence the Teleworker VPN performance.
Based on the performance and security strength, below are the protocols recommend to use when creating a Remote Access VPN to Vigor Router from each operating system
Operating System | DrayOS | Vigor 3910 / Vigor 2962 | Vigor3900 / Vigor2960 |
Windows | L2TP over IPsec, SSL VPN | IKEv2 EAP, SSL VPN | SSL VPN |
MacOS | IKEv2, IPsec Xauth | IKEv2, IPsec Xauth | IKEv2, IPsec Xauth |
iOS | IKEv2, IPsec Xauth | IKEv2, IPsec Xauth | IKEv2, IPsec Xauth |
Android | IPsec Xauth | IPsec Xauth | IPsec Xauth |
How do you rate this article?