25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EAP typically runs over the link layer <strong>and</strong> has a number of deployment solutions<br />

including:<br />

► EAP MD5<br />

► EAP-Tunneled TLS (EAP-TTLS)<br />

► Lightweight EAP (LEAP)<br />

► Protected EAP (PEAP)<br />

When used in wireless communications, IEEE 802.1x defines how EAP is<br />

encapsulated in LAN frames. The wireless EAP solution is typically activated<br />

when a user connects to wireless access point (AP) <strong>and</strong> enters in authentication<br />

credentials. The AP verifies the identity of the user through a RADIUS server<br />

<strong>and</strong>, if the credentials are approved, access is granted to the user.<br />

For further EAP details, refer to Chapter 23, “Port based network access control”<br />

on page 889.<br />

22.14 Layer 2 Tunneling Protocol (L2TP)<br />

L2TP permits the tunneling of PPP. Any protocol supported by PPP can be<br />

tunneled. This protocol extends the span of a PPP connection. Instead of<br />

beginning at the remote host <strong>and</strong> ending at a local ISP's point of presence (PoP),<br />

the virtual PPP link now extends from the remote host all the way back to the<br />

corporate gateway. L2TP tunneling is currently supported over <strong>IP</strong>/UDP. The<br />

specification is in RFC 2661.<br />

L2TP is a consensus st<strong>and</strong>ard that came from the merging of two earlier<br />

tunneling protocols: Point-to-Point Tunneling Protocol (PPTP) <strong>and</strong> Layer 2<br />

Forwarding (L2F, described in RFC 2341). These earlier protocols did not<br />

provide as complete a solution as the L2TP protocol; one addresses tunnels<br />

created by ISPs <strong>and</strong> the other addresses tunnels created by remote hosts. L2TP<br />

supports both host-created <strong>and</strong> ISP-created tunnels.<br />

L2TP adds the ability to create a virtual private network where multiple protocols<br />

<strong>and</strong> privately addressed <strong>IP</strong>, <strong>IP</strong>X, <strong>and</strong> AppleTalk (AT) are allowed. In addition,<br />

L2TP gives remote users the ability to connect to a local ISP <strong>and</strong> tunnel through<br />

the Internet to a home network, avoiding long distance charges. It also provides<br />

a mechanism on which to solve the multiple box PPP multilink problem. (Calls<br />

connecting to different physical routers that are destined for the same MP bundle<br />

can be tunneled to the same endpoint where MP can be terminated for all links.)<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 875

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!