Integrating L2TP Remote Access VPNs with MPLS VPNs
Review Questions
1 |
What are the two modes of operation for L2TP remote access VPNs? |
2 |
What are some of the main advantages and disadvantages of L2TP VPNs? |
3 |
How can security be configured for voluntary tunnel mode L2TP remote access VPNs? |
4 |
What is the purpose of the accept-dialin command? |
5 |
What is split tunneling, and why is it a potential security risk? |
6 |
IPsec can be used to secure L2TP tunnels, and digital certificates can be used to authenticate IPsec peers. On the VPN 3000 concentrator, what are the two basic methods of enrolling and obtaining digital certificates from a CA? |
7 |
When deploying Cisco IOS L2TP client-initiated tunneling (voluntary tunnel mode), what is the main advantage of L2TPv3 over L2TPv2? |
8 |
How can you debug IKE negotiation packet by packet on a Windows 2000/XP client (examining packet detail)? |
9 |
In compulsory tunnel mode, how is PPP authentication typically performed on the LAC? |
10 |
What are the two methods of configuring tunnel definitions on a RADIUS server? |
Designing and Deploying IPsec Remote Access and Teleworker VPNs
|