L2TP Overview

Multiple users can communicate through a single tunnel between the same LAC and LNS pair. Each user transmits and receives data in an individual L2TP session.

The LAC brings down the tunnel for any one of the following reasons:

A network failure occurs.

The LAC or other equipment at the ISP is not op erating properly. If the LAC fails, all tunnel users are disconnected.

There are no active sessions inside the tunnel.

An individual session ends when a remote user disconnects the call, but multiple sessions can run inside a single tunnel.

The system administrator at the ISP terminates the user connection.

The LAC is not responding to a Hello packet from the LNS.

For the LAC to reestablish a tunnel, the remote user has to place a new call.

L2TP Sessions

Packets are exchanged across an L2TP tunnel during an L2TP session. An L2TP session is created when an end-to-end WAN connection is established between the remote host and the LNS.

The L2TP portion of the packets sent through the tunnel contains a header with a call ID field (also called a session ID) and a tunnel ID field. The call ID field, which indicates the session that the WAN packet belongs to, is negotiated between the LAC and the LNS when the L2TP call is set up. The tunnel ID specifies the tunnel that the L2TP session is using.

In addition to the fields in the header, the L2TP packet contains a call serial number, which is a unique number for each L2TP call. This number matches the call to the L2TP session.

For an L2TP session, you can enable flow control. Flow control manages congestion across the connection, ensures that packets are not lost, and makes sure the devices at each end of the connection are communicating properly.

To enable flow control, see Chapter 3, “ Customizing L2TP Services.”

303532-A Rev 00

1-3

Page 19
Image 19
Nortel Networks manual L2TP Sessions

L2TP specifications

Nortel Networks L2TP, or Layer 2 Tunneling Protocol, is a widely recognized networking protocol that enables the tunneling of data over various networks. Initially developed as an extension of the Point-to-Point Tunneling Protocol (PPTP), L2TP integrates components from both PPTP and Layer 2 Forwarding (L2F). Nortel Networks played a significant role in the development and implementation of L2TP, making it a prominent choice for service providers and enterprise networks seeking secure and efficient connectivity.

One of the primary features of L2TP is its ability to encapsulate data packets, allowing the transport of PPP (Point-to-Point Protocol) frames without necessitating the traditional point-to-point connections. This means L2TP can operate across different networks, facilitating remote access connections and VPNs (Virtual Private Networks). As a result, organizations can achieve greater flexibility in managing their communications infrastructure.

Another key characteristic of L2TP is its support for both IPv4 and IPv6, ensuring compatibility with current and future networking environments. L2TP operates at the link layer of the OSI model, which means it functions between the data link and network layers, making it versatile for various applications. By using UDP (User Datagram Protocol) as a transport protocol, L2TP ensures efficient data transmission while maintaining lower latencies.

Security is a critical aspect of L2TP. While L2TP itself does not provide encryption, it is often paired with IPSec (Internet Protocol Security) for enhanced security protocols. This combination offers both tunneling and encryption, creating a secure framework for transmitting sensitive information across potentially insecure networks, such as the Internet.

L2TP also features various authentication methods, allowing for robust access control. It supports various schemes like PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol), giving network administrators a range of options to ensure the legitimacy of users accessing the network.

In summary, Nortel Networks L2TP is a powerful tunneling protocol known for its flexibility, compatibility, and security features. Its ability to encapsulate data for efficient transport makes it ideal for remote access and VPN applications. As organizations continue to demand secure, seamless connectivity, L2TP remains a resilient choice within the shifting landscape of networking technologies.