Configuring and Verifying L2TPv3 Pseudowires

Review Questions


What types of networks can L2TPv3-based L2VPNs be deployed over?


What are some of the main advantages of VPWS L2VPNs (including those that are L2TPv3 based)?


Name five types of Layer 2 protocols that L2TPv3 can tunnel over packet-switched networks.


Which L2TPv3 deployment model applies in a pseudowire configuration?


What functions does the L2TPv3 control connection perform?


If an LCCE wants to request that an L2TPv3 session be torn down, what type of control message does it send?


What are some drawbacks of the deployment of static L2TPv3 sessions?


What types of control connection authentication can be used with L2TPv3?


Which Cisco IOS command enables you to bind attachment circuits to L2TPv3 pseudowires?


When an L2TPv3 pseudowire is used to transport PPP traffic, what part do the LACs take in PPP negotiation?

Designing and Implementing AToM Based Layer 2 VPNs

Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions

Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis © 2008-2020.
If you may any questions please contact us: