O'Reilly logo

Comparing, Designing, and Deploying VPNs by Mark Lewis, - CCIE No. 6280

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

In Chapter 2, “Designing and Deploying L2TPv3-Based Layer 2 VPNs (L2VPN),” you saw how Layer Two Tunneling Protocol version 3 (L2TPv3) can be used to transport a number of Layer 2 protocols in a site-to-site configuration. This chapter shows how L2TPv2 (RFC2661) and L2TPv3 (RFC3931) can be used to provide home workers, telecommuters, or “road warriors” with access to a corporate or other organization network.

Figure 8-1 depicts L2TP remote access VPNs.

L2TP Remote Access VPNs

Figure 8-1. L2TP Remote Access VPNs

L2TP can be used to provide remote access in two different ways:

  • Voluntary/client-initiated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required