This chapter showed you the basics of L2TP and PPTP VPNs. Both have their roots in Microsoft's VPN initiative. PPTP was Microsoft's first VPN implementation, and mostly was an enhanced version of PPP. However, PPTP lacked many security features and thus was combined with the Cisco L2F into L2TP.
Because L2TP doesn't provide for security services such as confidentiality and packet authentication and validation, IPsec is used as a transport. I'll discuss more about how to implement L2TP/IPsec and PPTP remote access VPNs in Chapter 8, "Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN" and Chapter 13, "Windows VPN Client."
Next up is Chapter 5, "SSL VPNs," in which I discuss SSL and its use in implementing VPNs.
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index