Layer 2 VPNs (L2VPN) can be used to provide site-to-site Layer 2 connectivity. As discussed in Chapter 1, "What Is a Virtual Private Network?" L2VPNs can be built using technologies and protocols such as the Layer Two Tunneling Protocol version 3 (L2TPv3, RFC3931) and Any Transport over MPLS (AToM) and can fall into three categories:
A common question asked about L2VPNs (including L2TPv3-based L2VPNs) is why they might be preferred over Layer 3 site-to-site VPNs and when their deployment might be suitable.
L2TPv3 pseudowire (emulated circuit)-based L2VPNs are typically deployed by service providers in order to consolidate legacy and newer IP network infrastructure and offer newer Ethernet-based WAN connectivity to their customers. Figure 2-1 illustrates an L2TPv3-based L2VPN. Figure 2-1 shows L2TPv3 sessions over an IP backbone network between service Provider Edge (PE) routers: London.PE, Birmingham.PE, and Amsterdam.PE. The L2TPv3 sessions in Figure 2-1 are transporting the following Layer 2 protocol connections:
Figure 2-1. L2TPv3-Based L2VPN
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions