L2TP ArchitectureThe L2TP protocol defines two message types: control messages and data messages that are transmitted between an LAC and an LNS. L2TP uses these two types of messages to expand PPP applications. Show
Figure 1-3 illustrates the relationship between PPP packets, control messages, and data messages. Figure 1-3 L2TP architecture Control messages encapsulated with L2TP headers are transmitted over a reliable L2TP control channel on an IP network. Data messages carrying PPP frames are transmitted over an unreliable data channel. PPP frames are encapsulated using L2TP and then transmitted over an IP network. The well-known UDP port for L2TP is 1701, which is only used in initial stage of tunnel setup. The L2TP tunnel initiator randomly selects an idle port to forward packets to port 1701 of the receiver. After receiving the packets, the receiver randomly selects an idle port to forward packets to the port selected by the initiator. Both ends use the selected ports to communicate until the tunnel is disconnected. L2TP Packet StructureFigure 1-4 shows the format of an L2TP packet, which is generated by encapsulating a PPP frame initiated by a remote dial-up user. Figure 1-4 Format of an L2TP packet After L2TP encapsulation, an L2TP packet has 38 bytes more than the original packet. (If an L2TP packet carries sequence number information, it has 42 bytes more than the original packet.) If the length of the encapsulated packets exceeds the MTU of the outbound interface, the device must be able to fragment the IP packets because L2TP does not support packet fragmentation. The receiver end reassembles fragmented packets into L2TP packets. L2TP Packet EncapsulationAs an expansion to PPP, L2TP allows PPP packets to be transmitted through tunnels over the public network. If only PPP is deployed on the network, dial-up calls initiated by PPP terminals can only reach the edge node NAS of the dial-up network. The NAS is the termination point of PPP sessions. When L2TP is deployed, PPP packets can be transparently transmitted over the public network and reach the LNS in the enterprise headquarters. In this case, the LNS is the termination point of PPP sessions. Figure 1-5 L2TP packet encapsulation As shown in Figure 1-5, packets are sent from a branch to the headquarters following the process as follows:
When the destination host sends response packets to the branch device, the LNS searches the routing table for the outbound interface and encapsulated the packet with L2TP in a similar process. L2TP Packet TransmissionL2TP tunnel connections and session connections must be set up before PPP packets can be transmitted. L2TP connections are initiated for the first time according to the following procedure:
What two different types of encryption can be used by IPsec during data transfer?Each method is accompanied by a key, and these keys keep your data scrambled as it travels toward its destination. IPsec also uses two types of encryptions: symmetric and asymmetric. Symmetric encryption shares one key between users, whereas asymmetric encryption relies on both private and public keys.
Which file transfer protocol has no authentication or security for transferring files uses UDP and requires very little memory use?aaaaaaaaaa borger. At what layer of the OSI model does the IPsec encryption protocol operate?The IPsec protocol suite operates at the network layer of the OSI model. It runs directly on top of IP (the Internet Protocol), which is responsible for routing data packets. Meanwhile, SSL operates at the application layer of the OSI model.
What term is used to describe a space that is rented at a data center facility?A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware. Typically, a colo provides the building, cooling, power, bandwidth and physical security, while the customer provides servers and storage.
|