ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaja_5.4.0.1/rzajal2tp_pres.htm

61 lines
3.7 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="VPN L2TP Flash Text" />
<meta name="DC.Relation" scheme="URI" content="rzajavpnprotocols.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2000, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2000, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzajal2tp_pres.dita" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>VPN L2TP Flash Text</title>
</head>
<body id="rzajal2tp_pres.dita"><a name="rzajal2tp_pres.dita"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">VPN L2TP Flash Text</h1>
<div><p>A virtual private network (VPN) allows your company to securely extend
its private intranet over the existing framework of a public network, such
as the Internet. VPN supports Layer 2 Tunnel Protocol (L2TP). L2TP solutions
provide remote users with secure, and cost-efficient access to the corporate
network. By establishing a voluntary tunnel to the L2TP network
server (LNS), the remote client actually becomes an extension of the corporate
network.</p>
<p>This conceptual scenario shows a remote client system connecting to its
corporate network by creating an L2TP voluntary tunnel protected by VPN.</p>
<p>To begin, the remote client establishes a connection to the Internet through
the Internet Service Provider (ISP). The ISP assigns the client a globally
routable IP address.</p>
<p>Unknown to the ISP, the client initiates a VPN connection with the corporate
VPN gateway. The gateway authenticates the client system which wants to access
the corporate network.</p>
<p>After the client receives authentication from the gateway (making the connection
secure), the client establishes the L2TP tunnel. The client is still using
the IP address assigned by the ISP. The L2TP tunnel will eventually enable
data to travel between the client system and the corporate gateway.</p>
<p>Once the L2TP tunnel (shown in yellow) is established, the LNS assigns
the client an IP address within the corporate network's address scheme. There
is no physical line assoc- iated with the connection, so a virtual line is
created to allow PPP traffic to tunnel through the L2TP tunnel.</p>
<p>Now IP traffic can flow between the remote client system and any system
within the corporate network.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzajavpnprotocols.htm" title="It is important that you have at least a basic knowledge of standard VPN technologies. This topic provides you with conceptual information about the protocols VPN uses in its implementation.">VPN concepts</a></div>
</div>
</div>
</body>
</html>