Introducing PureSquare – for security beyond VPNs

Visit our website

Don’t worry about forgetting your passwords ever again with the all-new password manager. Try PureKeep

How to Setup L2TP on macOS

Feb 02, 2022
Dec 01, 2022
0 Comments
Download PDF

In this tutorial, we will show you how to set up a VPN on a macOS device with L2TP protocol but first let’s see what are our requirements and recommendations. 

Things to Consider:

  1. You have a working internet connection
  2. macOS Supported Device.
  3. A Premium PureVPN account (If you haven’t bought yet click 👉here to buy)
Find your VPN credentials for manual configuration.

To find your VPN credentials log into the PureVPN member area. Click 👉 here to visit member area.

  • Login to the Member area using your PureVPN registered email address and password.
  • On subscriptions tab scroll down to be able to view your VPN credentials.
  • You will be able to see and copy your VPN credentials.
  • Note down your PureVPN username and click on Eye icon to make your password visible and use it in the manual configuration.
How to connect L2TP manually on Mac.
  • From the top left corner click Apple icon and select system preferences.
  • Click Network.
  • To add a new VPN configuration, first click on the Lock to make changes.
  • Type your mac admin username and password to confirm.
  • Click + to add a VPN configuration.
  • Select L2TP over IPSec VPN from the drop-down menu.
  • Once done you will need to enter the following details.
    1. Server Address: Please refer to the above note to get the servers.
    2. Account Name: Type your VPN Credentials. Here is how you can find your 👉VPN credentials.
  • Click Authentication settings and insert the following information and click OK.
    1. Password: Use the VPN Credential password here.
    2. Shared Secret: 12345678
  • Click Advanced… and mark check on Send all traffic over VPN connection.
  • Click OK.
  • Click Connect and Apply.
  • You are now Connected.
Was this article helpful? Rate and share your comments below. Your input matters to us and everyone else in the Cyber Security Community.

How helpful did you find this answer?

Comments (0 )