25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22.14.2 Protocol overview<br />

Because the host <strong>and</strong> the gateway share the same PPP connection, they can<br />

take advantage of PPP's ability to transport protocols other than just <strong>IP</strong>. For<br />

example, L2TP tunnels can support remote LAN access as well as remote <strong>IP</strong><br />

access. Figure 22-53 outlines a basic L2TP configuration.<br />

Internet<br />

LNS LAC<br />

ISP<br />

L2TP Tunnel<br />

PPP Connection<br />

Figure 22-53 Layer 2 Tunnel Protocol (L2TP) scenario<br />

Dial<br />

Connection<br />

Referring to Figure 22-53, the following actions occur:<br />

1. The remote user initiates a PPP connection.<br />

2. The NAS accepts the call.<br />

3. The NAS identifies the remote user using an authorization server.<br />

4. If the authorization is OK, the NAS/LAC initiates an L2TP tunnel to the desired<br />

LNS at the entry to the enterprise.<br />

5. The LNS authenticates the remote user through its authentication server <strong>and</strong><br />

accepts the tunnel.<br />

6. The LNS confirms acceptance of the call <strong>and</strong> the L2TP tunnel.<br />

7. The NAS logs the acceptance.<br />

8. The LNS exchanges PPP negotiation with the remote user.<br />

9. End-to-end data is now tunneled between the remote user <strong>and</strong> the LNS.<br />

L2TP is actually another variation of an <strong>IP</strong> encapsulation protocol. As shown in<br />

Figure 22-54 on page 878, an L2TP tunnel is created by encapsulating an L2TP<br />

frame inside a UDP packet, which in turn is encapsulated inside an <strong>IP</strong> packet<br />

whose source <strong>and</strong> destination addresses define the tunnel's endpoints. Because<br />

the outer encapsulating protocol is <strong>IP</strong>, clearly <strong>IP</strong>Sec protocols can be applied to<br />

this composite <strong>IP</strong> packet, thus protecting the data that flows within the L2TP<br />

tunnel. AH, ESP, <strong>and</strong> ISAKMP/Oakley protocols can all be applied in a<br />

straightforward way.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 877

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!