Knowing that AToM pseudowires do a similar job to L2TPv3 pseudowires, you will not be surprised to learn that AToM-based L2VPNs share many advantages and disadvantages with L2TPv3-based L2VPNs.
Some of the main advantages for service providers implementing AToM-based L2VPNs are as follows:
Some of the main advantages of AToM-based L2VPNs for enterprises are as follows:
Now that you understand the motivations behind the deployment of AToM-based L2VPNs, it is time to move on to a discussion of their underlying operation.
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions