L2TP: Implementation and Operation
Book Details
Description
The book is more than adequate as an academic and strategic overview of L2TP technologies for people thinking about deploying them on a VPN. It's also a valuable resource for programmers planning to implement L2TP in their software.
VPN administrators will appreciate author Richard Shea's presentations on various architectures for VPNs running L2TP. Presented both as clip-art diagrams that illustrate relationships among machines and as schematics that show the relationships among various protocols, the network-design material is thorough. So is Shea's dissection of the protocol--he picks each kind of L2TP message apart, explaining what the control messages say and how the data messages present their contents. With byte listings and state diagrams, he tells programmers what they need to know about L2TP behavior under various circumstances. You might want to back this book with the IPSec coverage in IPSec. --David Wall
Topics covered: Strategic advantages of L2TP, strategies for implementing L2TP on VPNs, L2TP states and transitions, control channels, session management, and security.
