O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Studies

In the case studies that follow we will look into how L2TP can be setup in a couple of commonly utilized real life scenarios. While the first case study is a plain vanilla L2TP setup, the second one is more involved in that it uses IPsec to protect L2TP connections. This is a setup which has recently come into vogue for L2TP setups because of the need for a well managed encryption mechanism in L2TP. IPsec seems to fill these shoes well.

Setting up Compulsory L2TP Tunneling

This case study shows a compulsory tunneling L2TP setup. In this scenario, the LAC is aware of L2TP and sets up a tunnel with the LNS. The client is unaware of the presence of L2TP and simply dials up to the LAC using PPP. Then it is tunneled over to the LNS.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required