Nortel Networks L2TP manual Bay Networks, Inc. Software License Agreement

Page 3

Bay Networks, Inc. Software License Agreement

NOTICE: Please carefully read this license agreement before copying or using the accompanying software or installing the hardware unit with pre-enabled software (each of which is referred to as “Software” in this Agreement).

BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS UNDER WHICH BAY NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE. If you do not accept these terms and conditions, return the product, unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price.

1.License Grant. Bay Networks, Inc. (“Bay Networks”) grants the end user of the Software (“Licensee”) a personal, nonexclusive, nontransferable license: a) to use the Software either on a single computer or, if applicable, on a single authorized device identified by host ID, for which it was originally acquired; b) to copy the Software solely for backup purposes in support of authorized use of the Software; and c) to use and copy the associated user manual solely in support of authorized use of the Software by Licensee. This license applies to the Software only and does not extend to Bay Networks Agent software or other Bay Networks software products. Bay Networks Agent software or other Bay Networks software products are licensed for use under the terms of the applicable Bay Networks, Inc. Software License Agreement that accompanies such software and upon payment by the end user of the applicable license fees for such software.

2.Restrictions on use; reservation of rights. The Software and user manuals are protected under copyright laws.

Bay Networks and/or its licensors retain all title and ownership in both the Software and user manuals, including any revisions made by Bay Networks or its licensors. The copyright notice must be reproduced and included with any copy of any portion of the Software or user manuals. Licensee may not modify, translate, decompile, disassemble, use for any competitive analysis, reverse engineer, distribute, or create derivative works from the Software or user manuals or any copy, in whole or in part. Except as expressly provided in this Agreement, Licensee may not copy or transfer the Software or user manuals, in whole or in part. The Software and user manuals embody Bay Networks’ and its licensors’ confidential and proprietary intellectual property. Licensee shall not sublicense, assign, or otherwise disclose to any third party the Software, or any information about the operation, design, performance, or implementation of the Software and user manuals that is confidential to Bay Networks and its licensors; however, Licensee may grant permission to its consultants, subcontractors, and agents to use the Software at Licensee’s facility, provided they have agreed to use the Software only in accordance with the terms of this license.

3.Limited warranty. Bay Networks warrants each item of Software, as delivered by Bay Networks and properly installed and operated on Bay Networks hardware or other equipment it is originally licensed for, to function substantially as described in its accompanying user manual during its warranty period, which begins on the date Software is first shipped to Licensee. If any item of Software fails to so function during its warranty period, as the sole remedy Bay Networks will at its discretion provide a suitable fix, patch, or workaround for the problem that may be included in a future Software release. Bay Networks further warrants to Licensee that the media on which the Software is provided will be free from defects in materials and workmanship under normal use for a period of 90 days from the date Software is first shipped to Licensee. Bay Networks will replace defective media at no charge if it is returned to Bay Networks during the warranty period along with proof of the date of shipment. This warranty does not apply if the media has been damaged as a result of accident, misuse, or abuse. The Licensee assumes all responsibility for selection of the Software to achieve Licensee’s intended results and for the installation, use, and results obtained from the Software. Bay Networks does not warrant a) that the functions contained in the software will meet the Licensee’s requirements, b) that the Software will operate in the hardware or software combinations that the Licensee may select, c) that the operation of the Software will be uninterrupted or error free, or d) that all defects in the operation of the Software will be corrected. Bay Networks is not obligated to remedy any Software defect that cannot be reproduced with the latest Software release. These warranties do not apply to the Software if it has been (i) altered, except by Bay Networks or in accordance with its instructions; (ii) used in conjunction with another vendor’s product, resulting in the defect; or (iii) damaged by improper environment, abuse, misuse, accident, or negligence. THE FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Licensee is responsible for the security of

303532-A Rev 00

iii

Image 3
Contents Configuring L2TP Services Copyright 1998 Bay Networks, Inc Bay Networks, Inc. Software License Agreement Rev Contents Chapter Starting L2TP Appendix B Configuration Examples Page Figures Page Tables Page Before You Begin PrefaceItalic text Text ConventionsAcronyms Bay Networks Technical Publications How to Get HelpTopic Chapter L2TP OverviewL2TP Benefits What Is Tunneling?L2TP Sessions Remote Host Components of an L2TP NetworkL2TP Access Concentrator LAC Remote Access Server RASTunnel Management Server TMS Radius Server L2TP Network Server LNSExamples of L2TP Networks L2TP Network Using a LACPacket Encapsulation Process L2TP Packet EncapsulationMaking a Connection Across an L2TP Network Security in an L2TP Network Bay Networks L2TP Implementation Tunnel Management Tunnel AuthenticationShows tunnel authentication Radius User Authentication L2TP IP Interface Addresses Radius AccountingRemote Router Dialing the LNS Remote Router ConfigurationIf you want to Go to Where to Go NextPage Chapter Starting L2TP Tunnel Authentication Passwords Planning Considerations for an L2TP NetworkRadius Server Information Choose Local File , Remote File , or Preparing a Configuration FileSite Manager Procedure You do this System responds Tools Choose Configuration ManagerSubnet Mask Enabling L2TP on an Unconfigured WAN InterfaceEnabling L2TP on an Existing PPP Interface Choose Edit CircuitChoose Add/Delete Configuring L2TP Services Enabling L2TP on an Existing Frame Relay Interface Configuration is completed Choose Group Protocols Site Manager ProcedureEnabling L2TP on an Existing ATM Interface You do this System respondsChoose Protocols Choose Service AttributesChapter Customizing L2TP Services Choose L2TP Configuration Modifying the L2TP Protocol ConfigurationRadius Server on Modifying Radius Server InformationChanging the LNS System Name Modifying the Number of L2TP Sessions Permitted Set the Remove Domain Name Keeping the Remote User’s Domain NameSet the Domain Name Delimiter Changing the Domain Name DelimiterChoose Tunnel Authentication Enabling Tunnel AuthenticationChoose L2TP IP Interface Modifying L2TP IP Interface AddressesDisabling L2TP Disabling RIPDeleting L2TP from a PPP Interface Customizing L2TP ServicesDeleting L2TP from a Frame Relay Interface Deleting L2TP from an ATM Interface Site Manager Procedure Topic Appendix a L2TP ParametersFigure A-1. L2TP Configuration List Window L2TP Configuration ParametersParameter Enable L2TP Parameter Max L2TP SessionsParameter Receive Window Size Parameter Retransmit Timer seconds Parameter Hello Timer secondsParameter Maximum Retransmit Parameter Ack Timeout milliseconds Parameter LNS System NameParameter Radius Primary Server IP Address Parameter Radius Primary Server Password Parameter Radius Client IP AddressParameter Tunnel Flow Control Parameter Domain Name Delimiter Parameter Remove Domain NameFigure A-2. L2TP Tunnel Security List Window L2TP Tunnel Security ParametersParameter Tunnel Authentication Password Parameter Enable Tunnel AuthenticationFigure A-3. L2TP IP Interface List Window L2TP IP Interface ParametersParameter Subnet Mask Parameter L2TP IP Interface AddressParameter RIP Enable Example 1 Remote PC Calling the Corporate Network Appendix B Configuration ExamplesFigure B-1. L2TP Network with PCs at the Remote Site Configuring the Remote HostsParameter Name Value IP Address 192.32.16.55 Configuring the LACs and the TMSConfiguring the LNS Domain name baynetworks.comL2TP IP Interface window, enter the L2TP IP address Data Path Through the NetworkFigure B-2. L2TP Network with Routers at the Remote Site Example 2 Remote Router Calling the Corporate NetworkConfiguring the Dial-on-Demand Circuit Configuring the PPP InterfaceParameter Name Value RFC1661 Compliance Enable Problem What to Do Appendix C TroubleshootingTable C-1 Common L2TP Network Problems and Solutions L2TP IndexIndex-2