Pseudowire technologies such as Layer Two Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) enable service providers to converge their existing legacy (ATM, Frame Relay, and leased line) and IP/Multiprotocol Label Switching (MPLS) networks; these technologies also enable them to offer point-to-point Ethernet services.
A Virtual Private LAN Service (VPLS) takes advantage of point-to-point pseudowire technologies to enable multipoint emulated Ethernet LAN services over a metropolitan-area network (MAN) or wide-area network (WAN). An IP-only Private LAN Service (IPLS) provides similar multipoint emulated Ethernet LAN service but for IP-only traffic.
This appendix discusses the operation of VPLS and IPLS.
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions