Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
L2TP: Implementation and Operation (The Addison-Wesley Networking Basics Series)

L2TP: Implementation and Operation (The Addison-Wesley Networking Basics Series)

List Price: $19.95
Your Price: $13.96
Product Info Reviews

Description:

With its inherent support for the IPSec specifications, Layer 2 Transport Protocol (L2TP) has become a powerful tool for developers of Virtual Private Networks (VPNs). It allows for secure transmissions over an open network, and, unlike Point-to-Point Tunneling Protocol (PPTP), allows for connections to the Internet by both SLIP and PPP links. L2TP: Implementation and Operation shines a bright light on this flexible tunneling protocol that traces its lineage to both PPTP and Cisco's Layer 2 Forwarding (L2F) protocol.

The book is more than adequate as an academic and strategic overview of L2TP technologies for people thinking about deploying them on a VPN. It's also a valuable resource for programmers planning to implement L2TP in their software.

VPN administrators will appreciate author Richard Shea's presentations on various architectures for VPNs running L2TP. Presented both as clip-art diagrams that illustrate relationships among machines and as schematics that show the relationships among various protocols, the network-design material is thorough. So is Shea's dissection of the protocol--he picks each kind of L2TP message apart, explaining what the control messages say and how the data messages present their contents. With byte listings and state diagrams, he tells programmers what they need to know about L2TP behavior under various circumstances. You might want to back this book with the IPSec coverage in IPSec. --David Wall

Topics covered: Strategic advantages of L2TP, strategies for implementing L2TP on VPNs, L2TP states and transitions, control channels, session management, and security.

© 2004, ReviewFocus or its affiliates