Configuring and Verifying L2TPv3 Pseudowires
Review Questions
| 1 |
What types of networks can L2TPv3-based L2VPNs be deployed over? |
| 2 |
What are some of the main advantages of VPWS L2VPNs (including those that are L2TPv3 based)? |
| 3 |
Name five types of Layer 2 protocols that L2TPv3 can tunnel over packet-switched networks. |
| 4 |
Which L2TPv3 deployment model applies in a pseudowire configuration? |
| 5 |
What functions does the L2TPv3 control connection perform? |
| 6 |
If an LCCE wants to request that an L2TPv3 session be torn down, what type of control message does it send? |
| 7 |
What are some drawbacks of the deployment of static L2TPv3 sessions? |
| 8 |
What types of control connection authentication can be used with L2TPv3? |
| 9 |
Which Cisco IOS command enables you to bind attachment circuits to L2TPv3 pseudowires? |
| 10 |
When an L2TPv3 pseudowire is used to transport PPP traffic, what part do the LACs take in PPP negotiation? |
Designing and Implementing AToM Based Layer 2 VPNs
|