X hits on this document

Powerpoint document

Virtual Private Networks (VPN) - page 17 / 21

59 views

0 shares

0 downloads

0 comments

17 / 21

http://sce.uhcl.edu/yang/teaching/.../VPN.ppt

17

Layer 2 Tunneling Protocol

From Access Concentrator to Network Server

The "L2TP Access Concentrator" (LAC) encapsulates PPP frames with L2TP headers and sends them over the Internet as UDP packets (or over an ATM, frame relay or X.25 network).

At the other end, the "L2TP Network Server" (LNS) terminates the PPP session and hands the IP packets to the LAN. L2TP software can also be run in the user's PC.

Carriers also use L2TP to offer remote points of presence (POPs) to smaller ISPs. Users in remote locations dial into the carrier's local modem pool, and the carrier's LAC forwards L2TP traffic to the ISP's LNS.

L2TP and IPsec

L2TP does not include encryption (as does PPTP), but is often used with IPsec in order to provide virtual private network (VPN) connections from remote users to the corporate LAN.

Document info
Document views59
Page views59
Page last viewedMon Nov 28 19:59:41 UTC 2016
Pages21
Paragraphs353
Words1851

Comments