O'Reilly logo

Layer 2 VPN Architectures by Anthony Chan, Dmitry Bokotey, Carlos Pignataro, Wei Luo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Layer 2 VPN Architectures

This chapter covers the following topics:

Legacy Layer 2 virtual private network (VPN)

Any Transport over MPLS (AToM)

Layer 2 Tunnel Protocol version 3 (L2TPv3)

The previous chapter highlighted different Layer 2 VPN architectures proposed by the network industry and Internet Engineering Task Force (IETF) working groups. In the past few years, significant progress has been made both in designing the Layer 2 VPN protocol specifications and realizing such innovations in a suite of new products. Pseudowire emulation serves as the fundamental building block for different Layer 2 VPN architectures.

A handful of network equipment vendors have developed products that support various levels of pseudowire emulation. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required