Nortel Networks manual Enabling L2TP on an Existing ATM Interface, Site Manager Procedure

Page 43

Starting L2TP

Enabling L2TP on an Existing ATM Interface

To enable L2TP on an interface with ATM and IP already enabled, you can enable L2TP in two ways. If your interface uses a COM connector, complete the tasks in the following table. If your interface uses an ATM connector, go to page 2-10.

 

 

 

Site Manager Procedure

 

 

 

 

You do this

System responds

 

 

 

 

 

1.

In the Configuration Manager window,

The Edit Connector window opens.

 

 

choose a WAN connector.

 

 

 

 

 

 

2.

Choose Edit Circuit.

The Circuit Definition window opens.

 

 

 

 

 

3.

Choose Group Protocols.

The Group Protocols menu opens.

 

 

 

 

 

4.

Choose Add/Delete.

The Select Protocols window opens.

 

 

 

 

 

5.

Choose L2TP, then click on OK.

The L2TP Configuration window opens.

 

 

 

 

 

6.

Set the following parameters:

 

 

 

RADIUS Primary Server IP Address

 

 

 

RADIUS Primary Server Password

 

 

 

RADIUS Client IP Address

 

 

 

 

Click on Help or see the parameter

 

 

 

 

descriptions beginning on page A-5.

 

 

 

 

 

 

7.

Click on OK.

The L2TP Tunneling Security window

 

 

 

 

opens.

 

 

 

 

 

8.

Click on OK.

The L2TP IP Interface List window opens,

 

 

 

 

followed by the L2TP IP Configuration

 

 

 

 

window.

 

 

 

 

 

9.

Set the following parameters:

Site Manager displays a message

 

 

L2TP IP Interface Address

alerting you of the time delay to create

 

 

Subnet Mask

the L2TP tunnel circuits.

 

 

 

Click on Help or see the parameter

 

 

 

 

descriptions beginning on page A-11.

 

 

 

 

 

10. Click on OK.

You return to the L2TP IP Interface List

 

 

 

 

window, which displays the IP interface

 

 

 

 

address and the subnet mask. A

 

 

 

 

message window opens that reads, L2TP

 

 

 

 

Configuration is completed.

 

 

 

 

11. Click on OK.

 

 

 

 

 

 

 

 

 

 

(continued)

 

 

 

 

 

303532-A Rev 00

 

 

2-9

Image 43
Contents Configuring L2TP Services Copyright 1998 Bay Networks, Inc Bay Networks, Inc. Software License Agreement Rev Contents Chapter Starting L2TP Appendix B Configuration Examples Page Figures Page Tables Page Before You Begin PrefaceItalic text Text ConventionsAcronyms Bay Networks Technical Publications How to Get HelpTopic Chapter L2TP OverviewL2TP Benefits What Is Tunneling?L2TP Sessions Remote Host Components of an L2TP NetworkRemote Access Server RAS L2TP Access Concentrator LACTunnel Management Server TMS Radius Server L2TP Network Server LNSExamples of L2TP Networks L2TP Network Using a LACPacket Encapsulation Process L2TP Packet EncapsulationMaking a Connection Across an L2TP Network Security in an L2TP Network Bay Networks L2TP Implementation Tunnel Management Tunnel AuthenticationShows tunnel authentication Radius User Authentication L2TP IP Interface Addresses Radius AccountingRemote Router Dialing the LNS Remote Router ConfigurationIf you want to Go to Where to Go NextPage Chapter Starting L2TP Planning Considerations for an L2TP Network Tunnel Authentication PasswordsRadius Server Information Choose Local File , Remote File , or Preparing a Configuration FileSite Manager Procedure You do this System responds Tools Choose Configuration ManagerSubnet Mask Enabling L2TP on an Unconfigured WAN InterfaceChoose Edit Circuit Enabling L2TP on an Existing PPP InterfaceChoose Add/Delete Configuring L2TP Services Enabling L2TP on an Existing Frame Relay Interface Configuration is completed Choose Group Protocols Site Manager ProcedureEnabling L2TP on an Existing ATM Interface You do this System respondsChoose Protocols Choose Service AttributesChapter Customizing L2TP Services Choose L2TP Configuration Modifying the L2TP Protocol ConfigurationRadius Server on Modifying Radius Server InformationChanging the LNS System Name Modifying the Number of L2TP Sessions Permitted Set the Remove Domain Name Keeping the Remote User’s Domain NameSet the Domain Name Delimiter Changing the Domain Name DelimiterChoose Tunnel Authentication Enabling Tunnel AuthenticationChoose L2TP IP Interface Modifying L2TP IP Interface AddressesDisabling L2TP Disabling RIPDeleting L2TP from a PPP Interface Customizing L2TP ServicesDeleting L2TP from a Frame Relay Interface Deleting L2TP from an ATM Interface Site Manager Procedure Topic Appendix a L2TP ParametersFigure A-1. L2TP Configuration List Window L2TP Configuration ParametersParameter Max L2TP Sessions Parameter Enable L2TPParameter Receive Window Size Parameter Hello Timer seconds Parameter Retransmit Timer secondsParameter Maximum Retransmit Parameter LNS System Name Parameter Ack Timeout millisecondsParameter Radius Primary Server IP Address Parameter Radius Client IP Address Parameter Radius Primary Server PasswordParameter Tunnel Flow Control Parameter Domain Name Delimiter Parameter Remove Domain NameFigure A-2. L2TP Tunnel Security List Window L2TP Tunnel Security ParametersParameter Tunnel Authentication Password Parameter Enable Tunnel AuthenticationFigure A-3. L2TP IP Interface List Window L2TP IP Interface ParametersParameter Subnet Mask Parameter L2TP IP Interface AddressParameter RIP Enable Example 1 Remote PC Calling the Corporate Network Appendix B Configuration ExamplesFigure B-1. L2TP Network with PCs at the Remote Site Configuring the Remote HostsParameter Name Value IP Address 192.32.16.55 Configuring the LACs and the TMSConfiguring the LNS Domain name baynetworks.comL2TP IP Interface window, enter the L2TP IP address Data Path Through the NetworkFigure B-2. L2TP Network with Routers at the Remote Site Example 2 Remote Router Calling the Corporate NetworkConfiguring the PPP Interface Configuring the Dial-on-Demand CircuitParameter Name Value RFC1661 Compliance Enable Problem What to Do Appendix C TroubleshootingTable C-1 Common L2TP Network Problems and Solutions L2TP IndexIndex-2

L2TP specifications

Nortel Networks L2TP, or Layer 2 Tunneling Protocol, is a widely recognized networking protocol that enables the tunneling of data over various networks. Initially developed as an extension of the Point-to-Point Tunneling Protocol (PPTP), L2TP integrates components from both PPTP and Layer 2 Forwarding (L2F). Nortel Networks played a significant role in the development and implementation of L2TP, making it a prominent choice for service providers and enterprise networks seeking secure and efficient connectivity.

One of the primary features of L2TP is its ability to encapsulate data packets, allowing the transport of PPP (Point-to-Point Protocol) frames without necessitating the traditional point-to-point connections. This means L2TP can operate across different networks, facilitating remote access connections and VPNs (Virtual Private Networks). As a result, organizations can achieve greater flexibility in managing their communications infrastructure.

Another key characteristic of L2TP is its support for both IPv4 and IPv6, ensuring compatibility with current and future networking environments. L2TP operates at the link layer of the OSI model, which means it functions between the data link and network layers, making it versatile for various applications. By using UDP (User Datagram Protocol) as a transport protocol, L2TP ensures efficient data transmission while maintaining lower latencies.

Security is a critical aspect of L2TP. While L2TP itself does not provide encryption, it is often paired with IPSec (Internet Protocol Security) for enhanced security protocols. This combination offers both tunneling and encryption, creating a secure framework for transmitting sensitive information across potentially insecure networks, such as the Internet.

L2TP also features various authentication methods, allowing for robust access control. It supports various schemes like PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol), giving network administrators a range of options to ensure the legitimacy of users accessing the network.

In summary, Nortel Networks L2TP is a powerful tunneling protocol known for its flexibility, compatibility, and security features. Its ability to encapsulate data for efficient transport makes it ideal for remote access and VPN applications. As organizations continue to demand secure, seamless connectivity, L2TP remains a resilient choice within the shifting landscape of networking technologies.