Configuring L2TP Services

After tunnel authentication is complete, it does not need to be repeated for other calls to the same LAC.

RADIUS User Authentication

RADIUS user authentication is enabled by default on the Bay Networks LNS; you must configure this feature so that the LNS can validate the remote user’s identity before allowing access to the network.

The network administrator at the corporate site must configure a RADIUS server with the names and passwords of authorized users. When the LNS receives a call, it forwards an authentication request with the user information to the RADIUS server, which verifies whether the user is authorized. If the user is permitted access to the network, the RADIUS server replies with an acknowledgment message and the appropriate IP address for that user to make a connection.

The IP address that the RADIUS server assigns is essential because many remote hosts may not have their own addresses. The LNS uses the address to identify the remote host and send data to the remote user. After the session ends, the IP address becomes available for another user.

If the corporate network uses an existing RADIUS database for L2TP connections, you do not have to reconfigure the names in the database. The LNS automatically removes the domain portion of the user name that is included as part of the call from the LAC to the LNS. If you want to keep the domain name, you can disable this feature. For instructions, see Chapter 3, “ Customizing L2TP Services.”

For more information about configuring Bay Networks routers as RADIUS servers, see Configuring RADIUS.

1-14

303532-A Rev 00

Page 30
Image 30
Nortel Networks L2TP manual Radius User Authentication

L2TP specifications

Nortel Networks L2TP, or Layer 2 Tunneling Protocol, is a widely recognized networking protocol that enables the tunneling of data over various networks. Initially developed as an extension of the Point-to-Point Tunneling Protocol (PPTP), L2TP integrates components from both PPTP and Layer 2 Forwarding (L2F). Nortel Networks played a significant role in the development and implementation of L2TP, making it a prominent choice for service providers and enterprise networks seeking secure and efficient connectivity.

One of the primary features of L2TP is its ability to encapsulate data packets, allowing the transport of PPP (Point-to-Point Protocol) frames without necessitating the traditional point-to-point connections. This means L2TP can operate across different networks, facilitating remote access connections and VPNs (Virtual Private Networks). As a result, organizations can achieve greater flexibility in managing their communications infrastructure.

Another key characteristic of L2TP is its support for both IPv4 and IPv6, ensuring compatibility with current and future networking environments. L2TP operates at the link layer of the OSI model, which means it functions between the data link and network layers, making it versatile for various applications. By using UDP (User Datagram Protocol) as a transport protocol, L2TP ensures efficient data transmission while maintaining lower latencies.

Security is a critical aspect of L2TP. While L2TP itself does not provide encryption, it is often paired with IPSec (Internet Protocol Security) for enhanced security protocols. This combination offers both tunneling and encryption, creating a secure framework for transmitting sensitive information across potentially insecure networks, such as the Internet.

L2TP also features various authentication methods, allowing for robust access control. It supports various schemes like PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol), giving network administrators a range of options to ensure the legitimacy of users accessing the network.

In summary, Nortel Networks L2TP is a powerful tunneling protocol known for its flexibility, compatibility, and security features. Its ability to encapsulate data for efficient transport makes it ideal for remote access and VPN applications. As organizations continue to demand secure, seamless connectivity, L2TP remains a resilient choice within the shifting landscape of networking technologies.