Summary

This chapter discussed L2TP as one of the protocols used to create VPNs. L2TP is a useful protocol in some situations, because it allows a simulated PPP connection to the LNS device to be set up. This is a suitable means of creating a VPN, provided that a means of encryption is used to protect the L2TP tunnel. Because it operates at Layer 2, L2TP can carry almost any Layer 3 protocol. This is unlike Layer 3 VPN protocols such as IPsec. However, L2TP has major shortcomings in that it does not provide encryption, integrity, and authentication mechanisms on a per-packet basis. This shortcoming is often overcome by combining L2TP with another protocol, such as IPsec. L2TP was discussed in this chapter using local authentication and authorization ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.