For sure I can imagine use cases for l2tp between two devices with public addresses too, but these are scenarios where building a symmetrical tunnel is impossible for some reason.
OK, but what you write is relevant for L2TP
without IPsec, because it is the only one of "only tunneling" (i.e. without encryption) protocols which can traverse NAT nicely (leaving pptp aside because only one PPTP client of a given server can connect from behind each public IP). Once you add IPsec into the picture, you don't need L2TP to traverse the NAT any more, because IPsec can take care about it itself, so you can have IPIP, GRE, EoIP between a client behind a NAT and the VPN server. For all the gadgets you have listed (where IPIP, GRE, EoIP are unlikely to be supported), IKEv2 can be used without wasting part of the MTU for the L2TP encapsulation. And L2TP, the way it has been glued with IPsec (i.e. using transport mode of the SA), suffers from the same issue like PPTP - only one client of a given server can be connected from behind the same public IP. This limitation doesn't exist for L2TP without IPsec, and doesn't exist for IPsec without L2TP
So all in all, I do not see the need to traverse NAT as a reason to use L2TP/IPsec.
Instead of writing novels, post /export hide-sensitive. Use find&replace in your favourite text editor to systematically replace all occurrences of each public IP address potentially identifying you by a distinctive pattern such as my.public.ip.1.