For service providers, some of the main benefits and drawbacks of deploying L2TPv3-based L2VPNs are as follows:
For example by moving customer ATM and Frame Relay circuits from legacy networks to L2TPv3 pseudowires over an IP-enabled backbone, the service provider can decommission those legacy networks and, therefore, substantially reduce capital and operational expenditure (the service provider now only has to maintain a single network infrastructure, rather than multiple network infrastructures).
For enterprises, on the other hand, the main advantages and disadvantages of deploying L2TPv3-based L2VPNs are as follows:
In contrast, if an enterprise chooses to connect sites using an MPLS Layer 3 VPN (L3VPN), CE devices exchange routing information with PE devices, and PE routers participate in the enterprise's routing.
So, L2TPv3 pseudowires are one solution for connecting sites requiring non-IP connectivity.
You should now have a pretty good understanding of the benefits and drawbacks of L2TPv3-based L2VPNs. The sections that follow cover L2TPv3 pseudowire operation, pseudowire configuration, and pseudowire design and deployment considerations.
L2TPv3 Pseudowire Operation |
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions