H3C Technologies H3C SecPath F1000-E User Manual
Page 808
i
Table of Contents
L2TP Configuration······················································································································································· 1
Overview············································································································································································1
Typical Networking Application of L2TP ···············································································································1
Basic Concepts of L2TP············································································································································2
L2TP Tunnel Modes and Tunnel Establishment Process ························································································4
L2TP Features ····························································································································································6
Protocols and Standards··········································································································································7
Configuring L2TP·······························································································································································7
L2TP Configuration Task List····································································································································7
Enabling L2TP ···························································································································································7
Adding an L2TP Group············································································································································8
Displaying L2TP Tunnel Information····················································································································· 15
L2TP Configuration Example········································································································································· 16
Client-Initiated VPN Configuration Example······································································································· 16