1

What types of networks can L2TPv3-based L2VPNs be deployed over?

Answer:

L2TPv3-based L2VPNs can be deployed over any IP-enabled network.

2

What are some of the main advantages of VPWS L2VPNs (including those that are L2TPv3 based)?

Answer:

They allow service providers to consolidate legacy and IP infrastructures, decommission legacy infrastructure, and save both capex and opex; they allow enterprises to have complete control of routing, transport non-IP protocols, and can also help the migration from IPv4 to IPv6.

   
3

Name five types of Layer 2 protocols that L2TPv3 can tunnel over packet-switched networks.

Answer:

Ethernet, ATM, Frame Relay, HDLC, and PPP.

4

Which L2TPv3 deployment model applies in a pseudowire configuration?

Answer:

LAC-to-LAC deployment model.

5

What functions does the L2TPv3 control connection perform?

Answer:

Setting up the control connection itself; dynamically establishing L2TPv3sessions; providing a keepalive mechanism for the control connection and sessions;signaling circuit status changes; tearing down L2TP sessions; and tearing down the control connection itself.

6

If an LCCE wants to request that an L2TPv3 session be torn down, what type of control message does it send?

Answer:

An LCCE sends a Call-Disconnect-Notify (CDN) message.

7

What are some drawbacks of the deployment of static L2TPv3 sessions?

Answer:

Management of more than a small number is often impractical; PMTUD forL2TPv3 pseudowires is not supported.

8

What types of control connection authentication can be used with L2TPv3?

Answer:

CHAP-like authentication and digest secret authentication.

9

Which Cisco IOS command enables you to bind attachment circuits to L2TPv3 pseudowires?

Answer:

The xconnect command.

10

When an L2TPv3 pseudowire is used to transport PPP traffic, what part do the LACs take in PPP negotiation?

Answer:

They take no part in PPP negotiation. PPP negotiation takes place between CE devices over the pseudowire.


Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions



Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net