×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

PPP and L2TP: Remote Access Communications
     

PPP and L2TP: Remote Access Communications

by Uyless D. Black, Uyless Black
 

In this detailed guide, respected communications consultant Uyless Black gives networking professionals crucial information for designing large-scale remote access solutions, including state-of-the-art Virtual Private Networks (VPNs) and business DSL implementations. You'll find detailed coverage of both the PPP and L2TP protocols, including real-world help with

Overview

In this detailed guide, respected communications consultant Uyless Black gives networking professionals crucial information for designing large-scale remote access solutions, including state-of-the-art Virtual Private Networks (VPNs) and business DSL implementations. You'll find detailed coverage of both the PPP and L2TP protocols, including real-world help with configuration, security, and management. Coverage includes all this, and more:

  • PPP and L2TP: goals, benefits, and components
  • PPP negotiation model and protocol support (IP, IPX, Appletalk)
  • High-Level Data Link Control (HDLC), Link Control Protocol (LCP), and Network Control Protocol (NCP)
  • PPP security: encryption keys, PAP, CHAP, RADIUS, and the latest IPSec standards
  • L2TP tunnel sessions, messages, traffic accounting, and security considerations
  • Integrating L2TP with other protocols and services: ATM, Frame Relay, and Mobile PPP

Secure, Internet-based remote access can deliver unprecedented flexibility and cost savings to companies and professionals who know how to take advantage of it-and with this authoritative guide, you will too.

Product Details

ISBN-13:
9780130224620
Publisher:
Pearson Education
Publication date:
11/16/1999
Series:
Prentice Hall Series in Advanced Communications Technologies
Pages:
219
Product dimensions:
7.31(w) x 9.58(h) x 0.84(d)

Read an Excerpt

PREFACE:

Preface

This book is one in a series of books called, "Emerging Communications Technologies." As the name of the book implies, the focus is on the Point-to-Point Protocol, and the Layer 2 Tunneling Protocol (L2TP).

The subject matter of this book is vast and my approach is to provide a system view of the topic. In consonance with the intent of this series, this general survey also has considerable detail, but not to the level of detail needed to design a system. For that, I leave you to your project team and the various specifications that establish the standards.

This book is considered to be at an intermediate-to-advanced level. As such, it assumes the reader has a background in data communications and the internet protocol suite. Notwithstanding, for the new reader, I have provided several tutorials and guide you to them in the appropriate parts of the book.

I hope you find this book a valuable addition to your library.

CREDITS

I have relied on several Internet Request for Comments (RFCs) and Internet Drafts in certain chapters in this book. In some cases, I have summarized the RFCs with a short tutorial, and in other cases, I have extracted key points from the documents. I have so noted these instances in the appropriate part of the book.

Keep in mind that the Internet Drafts are works in progress, and should be viewed as such. You should not use the drafts with the expectation that they will not change. Notwithstanding, if used as general tutorials, the Drafts discussed in this book are "final enough" to warrant their explanations.

For all the internet standards and draft standards thefollowing applies:

Copyright The Internet Society (1998). All Rights Reserved.

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included in all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.

The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.

Meet the Author


Uyless Black is a widely known and respected consultant and lecturer on computer networks and data communications. He is the author of all the books in his Prentice Hall Series in Advanced Communications Technologies, including Voice Over IP, Residential Broadband Networking, ATM: Foundation for Broadband Networks, and Advanced Internet Technologies.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews