Scenario: Protect an L2TP voluntary tunnel with IPSec

In this scenario, you learn how to setup a connection between a branch office host and a corporate office that uses L2TP protected by IPSec. The branch office has a dynamically assigned IP address, while the corporate office has a static, globally routable IP address.

Situation

Suppose your company has a small branch office in another state. Throughout any given workday the branch office may require access to confidential information about an iSeries™ system within your corporate intranet. Your company currently uses an expensive leased line to provide the branch office access to the corporate network. Although your company wants to continue providing secure access to your intranet, you ultimately want to reduce the expense associated with the leased line. This can be done by creating a Layer 2 Tunnel Protocol (L2TP) voluntary tunnel that extends your corporate network, such that the branch office appears to be part of your corporate subnet. VPN protects the data traffic over the L2TP tunnel.

With an L2TP voluntary tunnel, the remote branch office establishes a tunnel directly to the L2TP network server (LNS) of the corporate network. The functionality of the L2TP access concentrator (LAC) resides at the client. The tunnel is transparent to the remote client's Internet Service Provider (ISP), so the ISP is not required to support L2TP. If you want to read more about L2TP concepts, see Layer 2 Tunnel Protocol (L2TP).

Important: This scenario shows the security gateways attached directly to the Internet. The absence of a firewall is intended to simplify the scenario. It does not imply that the use of a firewall is not necessary. Consider the security risks involved any time you connect to the Internet.

Objectives

In this scenario, a branch office system connects to its corporate network through a gateway system with an L2TP tunnel protected by VPN.

The main objectives of this scenario are:

Details

The following figure illustrates the network characteristics for this scenario:


Network diagram depicting this and that

iSeries-A

iSeries-B

In L2TP terms, iSeries-A acts as the L2TP initiator, while iSeries-B acts as the L2TP terminator.

Configuration tasks

Assuming that TCP/IP configuration already exists and works, you must complete the following tasks: