Virtual Private Network To Carry Protocol-l2tp To Achieve | Posted on:2004-07-16 | Degree:Master | Type:Thesis | Country:China | Candidate:X X Jia | Full Text:PDF | GTID:2208360095960233 | Subject:Signal and Information Processing | Abstract/Summary: | PDF Full Text Request | Now VPN technology has been used in everywhere。With the technology development,the tunneling technology become very important。In this article,we give all kinds of tunneling technology overview and implement the L2TP tunneling。We give the protocol's operation procedure. VPN is a very important technology and widely used. Through building the VPN on the internet,a enterprise can reduce the spending and have a privacy communication。For VPN provider,it will provide many kinds of service for user. Comparing all kinds of tunneling protocol,L2TP protocol has many virtue. So we choose the L2TP protocol to implement。At first,we describe the L2TP protocol and give the whole description about the protocol。We use many state machine in the implementing. It is very convenient to use the state table for the state machine implementing. Through the state table,we dissolve many problem and finished the implement. | Keywords/Search Tags: | VPN, Tunnel, L2TP, IP in IP Encapsulation, L2F, PPTP, IPSec, PPP, Implement | PDF Full Text Request | Related items |
| |
|