OpenVPN is light years better than L2TP. UDP carrier vs TCP? (TCP is too bloody slow) Certificate based security that can be hardened with a password or just a password? (Single factor is for idiots)
As far as I'm concerned the IPSec module's L2TP feature doesn't exist, and you shouldn't consider it either. You're signing up to use known broken VPN clients built into various operating systems that will make your phone ring.
Or, you can use OpenVPN...
Now, I'll throw out here the massive catch to OpenVPN on Untangle. The default configurations enable compression, this is a known security issue as compression and encryption at the same time is known to be a general problem. OpenVPN's devs have said they plan to phase out compression from the product over time.
So if you pull out an Untangle right now, and setup the OpenVPN module with all defaults, and then deploy a client to a mobile device... it will connect, but not actually move traffic. Why? Because the mobile clients will not enable compression as instructed by the deployed configuration file from the Untangle server without the user manually going into his client settings and enabling it. For this reason, I advise all Untangle admins on new installs to go into OpenVPN's Advanced tab, and tick the exclude box next to the compress lz4 line in both the client, and server configuration sections.
This will disable compression, and allow OpenVPN to operate in a more secure fashion that doesn't make your mobile devices pitch a fit.
If your OpenVPN module doesn't have a compress lz4 line, and has something else... you may have other issues. Especially if you see comp-lzo. If you have comp-lzo, you need to enable SSH, log into Untangle via the command line and run this command: openssl x509 -text -noout -in /usr/share/untangle/settings/openvpn/server.crt | grep "Signature Algo"
If that spits back MD5 instead of SHA, you've got a server that needs pushed over. The only way to fix that certificate is to remove the OpenVPN module, reinstall it from defaults, recreate your OpenVPN clients, and redistribute them. Old Untangle installs will have an MD5 based certificate chain that's based on a cracked algorithm. There is no upgrade, there is no fix, it must be ripped and replaced.
Which illustrates the largest problem with OpenVPN, the need to maintain an acceptable version of VPN client on the end point, as well as a functional configuration, and a secure certificate chain for authentication. None of this is trivial... but I find all of it is EASIER to manage than the constant drum beat of stupidity caused by the Windows L2TP client!
If you have AAD involved, SSTP and move on.