Está en la página 1de 5

Layer 2 Tunneling Protocol

In computer networking, Layer 2 Tunneling Protocol egorized as either control packets or data packets. L2TP
(L2TP) is a tunneling protocol used to support virtual provides reliability features for the control packets, but no
private networks (VPNs) or as part of the delivery of reliability for data packets. Reliability, if desired, must
services by ISPs. It does not provide any encryption be provided by the nested protocols running within each
or condentiality by itself. Rather, it relies on an session of the L2TP tunnel.
encryption protocol that it passes within the tunnel to pro- L2TP allows the creation of a virtual private dialup net-
vide privacy.[1] work (VPDN)[3] to connect a remote client to its corpo-
rate network by using a shared infrastructure, which could
be the Internet or a service providers network.
1 History
Published in 1999 as proposed standard RFC 2661, L2TP 3 Tunneling models
has its origins primarily in two older tunneling protocols
for point-to-point communication: Cisco's Layer 2 For- A L2TP tunnel can extend across an entire PPP session or
warding Protocol (L2F) and Microsoft's[2] Point-to-Point only across one segment of a two-segment session. This
Tunneling Protocol (PPTP). A new version of this proto- can be represented by four dierent tunneling models,
col, L2TPv3, appeared as proposed standard RFC 3931 namely:
in 2005. L2TPv3 provides additional security features,
improved encapsulation, and the ability to carry data links
other than simply Point-to-Point Protocol (PPP) over an voluntary tunnel
IP network (for example: Frame Relay, Ethernet, ATM, compulsory tunnel incoming call
etc.).
compulsory tunnel remote dial

L2TP multihop connection[4]


2 Description
The entire L2TP packet, including payload and L2TP
header, is sent within a User Datagram Protocol (UDP)
4 L2TP packet structure
datagram. It is common to carry PPP sessions within an
L2TP tunnel. L2TP does not provide condentiality or An L2TP packet consists of :
strong authentication by itself. IPsec is often used to se- Field meanings:
cure L2TP packets by providing condentiality, authenti-
cation and integrity. The combination of these two proto-
cols is generally known as L2TP/IPsec (discussed below). Flags and version control ags indicating data/control
packet and presence of length, sequence, and oset
The two endpoints of an L2TP tunnel are called the elds.
LAC (L2TP Access Concentrator) and the LNS (L2TP Net-
work Server). The L2TP LNS waits for new tunnels. Length (optional) Total length of the message in bytes,
Once a tunnel is established, the network trac between present only when length ag is set.
the peers is bidirectional. To be useful for networking,
higher-level protocols are then run through the L2TP tun- Tunnel ID Indicates the identier for the control con-
nel. To facilitate this, an L2TP session (or 'call') is es- nection.
tablished within the tunnel for each higher-level protocol
such as PPP. Either the LAC or LNS may initiate ses- Session ID Indicates the identier for a session within a
sions. The trac for each session is isolated by L2TP, tunnel.
so it is possible to set up multiple virtual networks across Ns (optional) sequence number for this data or control
a single tunnel. MTU should be considered when imple- message, beginning at zero and incrementing by one
menting L2TP. (modulo 216 ) for each message sent. Present only
The packets exchanged within an L2TP tunnel are cat- when sequence ag set.

1
2 6 L2TP/IPSEC

Nr (optional) sequence number for expected message to


be received. Nr is set to the Ns of the last in-order
message received plus one (modulo 216 ). In data
messages, Nr is reserved and, if present (as indicated
by the S bit), MUST be ignored upon receipt..

Oset Size (optional) Species where payload data is


located past the L2TP header. If the oset eld is
present, the L2TP header ends after the last byte of
the oset padding. This eld exists if the oset ag
is set.

Oset Pad (optional) Variable length, as specied by


the oset size. Contents of this eld are undened.

Payload data Variable length (Max payload size = Max


size of UDP packet size of L2TP header)

6 L2TP/IPsec

5 L2TP packet exchange Because of the lack of condentiality inherent in the


L2TP protocol, it is often implemented along with IPsec.
This is referred to as L2TP/IPsec, and is standardized
in IETF RFC 3193. The process of setting up an
At the time of setup of L2TP connection, many control L2TP/IPsec VPN is as follows:
packets are exchanged between server and client to es-
tablish tunnel and session for each direction. One peer 1. Negotiation of IPsec security association
requests the other peer to assign a specic tunnel and ses- (SA), typically through Internet key ex-
sion id through these control packets. Then using this change (IKE). This is carried out over
tunnel and session id, data packets are exchanged with UDP port 500, and commonly uses ei-
the compressed PPP frames as payload. ther a shared password (so-called "pre-
The list of L2TP Control messages exchanged between shared keys"), public keys, or X.509 cer-
LAC and LNS, for handshaking before establishing a tun- ticates on both ends, although other key-
nel and session in voluntary tunneling method are ing methods exist.
3

2. Establishment of Encapsulating Security 8 L2TP in ISPs networks


Payload (ESP) communication in trans-
port mode. The IP protocol number for L2TP is often used by ISPs when internet service over
ESP is 50 (compare TCPs 6 and UDPs for example ADSL or cable is being resold. From the
17). At this point, a secure channel has end user, packets travel over a wholesale network service
been established, but no tunneling is tak- providers network to a server called a Broadband Remote
ing place. Access Server (BRAS), a protocol converter and router
3. Negotiation and establishment of L2TP combined. On legacy networks the path from end user
tunnel between the SA endpoints. The customer premises equipment to the BRAS may be over
actual negotiation of parameters takes an ATM network. From there on, over an IP network,
place over the SAs secure channel, an L2TP tunnel runs from the BRAS (acting as LAC) to
within the IPsec encryption. L2TP uses an LNS which is an edge router at the boundary of the
UDP port 1701. ultimate destination ISPs IP network. See example of
reseller ISPs using L2TP.
When the process is complete, L2TP packets between the
endpoints are encapsulated by IPsec. Since the L2TP
packet itself is wrapped and hidden within the IPsec 9 See also
packet, no information about the internal private network
can be garnered from the encrypted packet. Also, it is not IPsec
necessary to open UDP port 1701 on rewalls between
the endpoints, since the inner packets are not acted upon Layer 2 Forwarding Protocol
until after IPsec data has been decrypted and stripped, Point-to-Point Tunneling Protocol
which only takes place at the endpoints.
A potential point of confusion in L2TP/IPsec is the use Point-to-Point Protocol
of the terms tunnel and secure channel. The term tun- Shortest Path Bridging
nel refers to a channel which allows untouched packets
of one network to be transported over another network.
In the case of L2TP/PPP, it allows L2TP/PPP packets
to be transported over IP. A secure channel refers to a
10 References
connection within which the condentiality of all data is
[1] IETF (1999), RFC 2661, Layer Two Tunneling Protocol
guaranteed. In L2TP/IPsec, rst IPsec provides a secure
L2TP
channel, then L2TP provides a tunnel.
[2] Point-to-Point Tunneling Protocol (PPTP)". TheNet-
workEncyclopedia.com. 2013. Retrieved 2014-07-28.
Point-to-Point Tunneling Protocol (PPTP) [:] A data-link
7 Windows implementation layer protocol for wide area networks (WANs) based on
the Point-to-Point Protocol (PPP) and developed by Mi-
Windows Vista provides two new conguration utilities crosoft that enables network trac to be encapsulated and
that attempt to make using L2TP without IPsec easier, routed over an unsecured public network such as the In-
both described in sections that follow below: ternet.

[3] Cisco Support: Understanding VPDN Updated Jan 29,


an MMC snap-in called Windows Firewall with 2008
Advanced Security (WFwAS), located in Control
Panel Administrative Tools [4] IBM Knowledge Center: L2TP multi-hop connection

the "netsh advrewall command-line tool


11 External links
Both these conguration utilities are not without their dif-
culties, and unfortunately, there is very little documen-
11.1 Implementations
tation about both netsh advrewall and the IPsec client
in WFwAS. One of the aforementioned diculties is that Cisco: Cisco L2TP documentation, also read
it is not compatible with NAT. Another problem is that Technology brief from Cisco
servers must be specied only by IP address in the new
Vista conguration utilities; the hostname of the server Open source and Linux: xl2tpd, Linux RP-
cannot be used, so if the IP address of the IPsec server L2TP, OpenL2TP, l2tpns, l2tpd (inactive), Linux
changes, all clients will have to be informed of this new L2TP/IPsec server, FreeBSD multi-link PPP
IP address (which also rules out servers that addressed by daemon, OpenBSD npppd(8), ACCEL-PPP -
utilities such as DynDNS). PPTP/L2TP/PPPoE server for Linux
4 11 EXTERNAL LINKS

Microsoft: built-in client included with Windows 11.3 Other


2000 and higher; Microsoft L2TP/IPsec VPN
Client for Windows 98/Windows Me/Windows NT IANA assigned numbers for L2TP
4.0
L2TP Extensions Working Group (l2tpext) - (where
Apple: built-in client included with Mac OS X 10.3 future standardization work is being coordinated)
and higher.
Using Linux as an L2TP/IPsec VPN client
VPDN on Cisco.com
L2TP/IPSec with OpenBSD and npppd

11.2 Internet standards and extensions Comparison of L2TP, PPTP and OpenVPN

RFC 2341 Cisco Layer Two Forwarding (Protocol)


L2F (a predecessor to L2TP)
RFC 2637 Point-to-Point Tunneling Protocol (PPTP)
(a predecessor to L2TP)
RFC 2661 Layer Two Tunneling Protocol L2TP
RFC 2809 Implementation of L2TP Compulsory
Tunneling via RADIUS
RFC 2888 Secure Remote Access with L2TP
RFC 3070 Layer Two Tunneling Protocol (L2TP)
over Frame Relay
RFC 3145 L2TP Disconnect Cause Information
RFC 3193 Securing L2TP using IPsec
RFC 3301 Layer Two Tunneling Protocol (L2TP):
ATM access network
RFC 3308 Layer Two Tunneling Protocol (L2TP)
Dierentiated Services
RFC 3355 Layer Two Tunneling Protocol (L2TP)
Over ATM Adaptation Layer 5 (AAL5)
RFC 3371 Layer Two Tunneling Protocol L2TP
Management Information Base
RFC 3437 Layer Two Tunneling Protocol Extensions
for PPP Link Control Protocol Negotiation
RFC 3438 Layer Two Tunneling Protocol (L2TP)
Internet Assigned Numbers: Internet Assigned Num-
bers Authority (IANA) Considerations Update
RFC 3573 Signaling of Modem-On-Hold status in
Layer 2 Tunneling Protocol (L2TP)
RFC 3817 Layer 2 Tunneling Protocol (L2TP) Active
Discovery Relay for PPP over Ethernet (PPPoE)
RFC 3931 Layer Two Tunneling Protocol - Version
3 (L2TPv3)
RFC 4045 Extensions to Support Ecient Carrying
of Multicast Trac in Layer-2 Tunneling Protocol
(L2TP)
RFC 4951 Fail Over Extensions for Layer 2 Tunnel-
ing Protocol (L2TP) failover
5

12 Text and image sources, contributors, and licenses


12.1 Text
Layer 2 Tunneling Protocol Source: https://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol?oldid=743655754 Contributors: Axel-
Boldt, The Anome, Nate Silva, Edward, Yaronf, Saltine, MrJones, Chealer, Frencheigh, Ferdinand Pienaar, JTN, IlyaHaykinson, Dmeranda,
Srbauer, Spearhead, Sietse Snel, Aaronbrick, Unquietwiki, Apyule, Wrs1864, Ynhockey, Stephan Leeds, K3rb, Voxadam, Ylem, John Car-
dinal, ^demon, Mendaliv, Oblivious, FlaBot, TheAnarcat, CiaPan, Moocha, Borgx, Cryptic, Muruga86, NawlinWiki, CecilWard, Zwobot,
Xpclient, SmackBot, Unyoyega, Eskimbot, Ohnoitsjamie, Daedalus01, Nealc, Walkerhamilton, Matieux, MureninC, A5b, Cibu, JHunterJ,
Infofarmer, Peyre, Tawkerbot2, CmdrObot, Cydebot, Mato, Gogo Dodo, Thijs!bot, Epbr123, Robina Fox, Enjoi4586, Web-Crawling
Stickler, NescioNomen, Hom sepanta, Free49498445, Andareed, Dispenser, Metaclassing, Mdmkolbe, NPrice, Rednectar.chris, Kbrose,
SieBot, Vjardin, Mwaisberg, MarkMLl, Plat'Home, Anon lynx, Muhandes, SilvonenBot, Addbot, MrOllie, Luckas-bot, AnomieBOT, Ma-
terialscientist, Shadowjams, Some standardized rigour, Mmtmmt, W Nowicki, Skeing, DrilBot, LittleWink, Jandalhandler, Ripchip Bot,
EmausBot, WikitanvirBot, ZroBot, Fontoponto, ClueBot NG, Wbm1058, ChrisGualtieri, Xauen~enwiki, TechyOne, Captain Conundrum,
Krankes-kind, ArmbrustBot, Jerimiah McCain, I.moskalev, AmazingHulk, CAPTAIN RAJU and Anonymous: 116

12.2 Images
File:L2tp_pkt_exchg.PNG Source: https://upload.wikimedia.org/wikipedia/en/9/9a/L2tp_pkt_exchg.PNG License: PD Contributors: ?
Original artist: ?

12.3 Content license


Creative Commons Attribution-Share Alike 3.0

También podría gustarte