Configuring and Verifying L2TPv3 Pseudowires
Review Questions
1 |
What types of networks can L2TPv3-based L2VPNs be deployed over? |
2 |
What are some of the main advantages of VPWS L2VPNs (including those that are L2TPv3 based)? |
3 |
Name five types of Layer 2 protocols that L2TPv3 can tunnel over packet-switched networks. |
4 |
Which L2TPv3 deployment model applies in a pseudowire configuration? |
5 |
What functions does the L2TPv3 control connection perform? |
6 |
If an LCCE wants to request that an L2TPv3 session be torn down, what type of control message does it send? |
7 |
What are some drawbacks of the deployment of static L2TPv3 sessions? |
8 |
What types of control connection authentication can be used with L2TPv3? |
9 |
Which Cisco IOS command enables you to bind attachment circuits to L2TPv3 pseudowires? |
10 |
When an L2TPv3 pseudowire is used to transport PPP traffic, what part do the LACs take in PPP negotiation? |
Designing and Implementing AToM Based Layer 2 VPNs
|