Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Layer 2 Tunneling Protocol

Index Layer 2 Tunneling Protocol

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. [1]

38 relations: Asymmetric digital subscriber line, Asynchronous transfer mode, Broadband remote access server, Cisco Systems, Computer network, Confidentiality, Cryptographic protocol, Datagram, Dyn (company), Encryption, Ethernet, Frame Relay, Header (computing), IEEE 802.1aq, Internet Engineering Task Force, Internet Key Exchange, Internet protocol suite, IPsec, L2TPv3, Layer 2 Forwarding Protocol, Maximum transmission unit, Microsoft, Microsoft Management Console, Multi-hop routing, Netsh, Network address translation, Network packet, Payload (computing), Point-to-Point Protocol, Point-to-Point Tunneling Protocol, Pre-shared key, Security association, Tunneling protocol, User Datagram Protocol, Virtual Extensible LAN, Virtual private network, Windows Vista, X.509.

Asymmetric digital subscriber line

Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide.

New!!: Layer 2 Tunneling Protocol and Asymmetric digital subscriber line · See more »

Asynchronous transfer mode

Asynchronous transfer mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals".

New!!: Layer 2 Tunneling Protocol and Asynchronous transfer mode · See more »

Broadband remote access server

A broadband remote access server (BRAS, B-RAS or BBRAS) routes traffic to and from broadband remote access devices such as digital subscriber line access multiplexers (DSLAM) on an Internet service provider's (ISP) network.

New!!: Layer 2 Tunneling Protocol and Broadband remote access server · See more »

Cisco Systems

Cisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, in the center of Silicon Valley, that develops, manufactures and sells networking hardware, telecommunications equipment and other high-technology services and products.

New!!: Layer 2 Tunneling Protocol and Cisco Systems · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Layer 2 Tunneling Protocol and Computer network · See more »

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: Layer 2 Tunneling Protocol and Confidentiality · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

New!!: Layer 2 Tunneling Protocol and Cryptographic protocol · See more »

Datagram

A datagram is a basic transfer unit associated with a packet-switched network.

New!!: Layer 2 Tunneling Protocol and Datagram · See more »

Dyn (company)

Dyn, Inc. is an Internet performance management and web application security company, offering products to monitor, control, and optimize online infrastructure, and also domain registration services and email products.

New!!: Layer 2 Tunneling Protocol and Dyn (company) · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Layer 2 Tunneling Protocol and Encryption · See more »

Ethernet

Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).

New!!: Layer 2 Tunneling Protocol and Ethernet · See more »

Frame Relay

Frame Relay is a standardized wide area network technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology.

New!!: Layer 2 Tunneling Protocol and Frame Relay · See more »

Header (computing)

In information technology, header refers to supplemental data placed at the beginning of a block of data being stored or transmitted.

New!!: Layer 2 Tunneling Protocol and Header (computing) · See more »

IEEE 802.1aq

Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.

New!!: Layer 2 Tunneling Protocol and IEEE 802.1aq · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Layer 2 Tunneling Protocol and Internet Engineering Task Force · See more »

Internet Key Exchange

In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

New!!: Layer 2 Tunneling Protocol and Internet Key Exchange · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Layer 2 Tunneling Protocol and Internet protocol suite · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Layer 2 Tunneling Protocol and IPsec · See more »

L2TPv3

Layer 2 Tunnelling Protocol Version 3 is an IETF standard related to L2TP that can be used as an alternative protocol to Multiprotocol Label Switching (MPLS) for encapsulation of multiprotocol Layer 2 communications traffic over IP networks.

New!!: Layer 2 Tunneling Protocol and L2TPv3 · See more »

Layer 2 Forwarding Protocol

L2F, or Layer 2 Forwarding, is a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet.

New!!: Layer 2 Tunneling Protocol and Layer 2 Forwarding Protocol · See more »

Maximum transmission unit

In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.

New!!: Layer 2 Tunneling Protocol and Maximum transmission unit · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Layer 2 Tunneling Protocol and Microsoft · See more »

Microsoft Management Console

Microsoft Management Console (MMC) is a component of Windows 2000 and its successors that provides system administrators and advanced users an interface for configuring and monitoring the system.

New!!: Layer 2 Tunneling Protocol and Microsoft Management Console · See more »

Multi-hop routing

Multi-hop routing (or multihop routing) is a type of communication in radio networks in which network coverage area is larger than radio range of single nodes.

New!!: Layer 2 Tunneling Protocol and Multi-hop routing · See more »

Netsh

In computing, netsh, or network shell, is a command-line utility included in Microsoft's Windows NT line of operating systems beginning with Windows 2000.

New!!: Layer 2 Tunneling Protocol and Netsh · See more »

Network address translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

New!!: Layer 2 Tunneling Protocol and Network address translation · See more »

Network packet

A network packet is a formatted unit of data carried by a packet-switched network.

New!!: Layer 2 Tunneling Protocol and Network packet · See more »

Payload (computing)

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.

New!!: Layer 2 Tunneling Protocol and Payload (computing) · See more »

Point-to-Point Protocol

In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.

New!!: Layer 2 Tunneling Protocol and Point-to-Point Protocol · See more »

Point-to-Point Tunneling Protocol

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.

New!!: Layer 2 Tunneling Protocol and Point-to-Point Tunneling Protocol · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Layer 2 Tunneling Protocol and Pre-shared key · See more »

Security association

A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication.

New!!: Layer 2 Tunneling Protocol and Security association · See more »

Tunneling protocol

In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another.

New!!: Layer 2 Tunneling Protocol and Tunneling protocol · See more »

User Datagram Protocol

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.

New!!: Layer 2 Tunneling Protocol and User Datagram Protocol · See more »

Virtual Extensible LAN

Virtual Extensible LAN (VXLAN) is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments.

New!!: Layer 2 Tunneling Protocol and Virtual Extensible LAN · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Layer 2 Tunneling Protocol and Virtual private network · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Layer 2 Tunneling Protocol and Windows Vista · See more »

X.509

In cryptography, X.509 is a standard that defines the format of public key certificates.

New!!: Layer 2 Tunneling Protocol and X.509 · See more »

Redirects here:

L2P, L2TP, L2tp, Layer 2 tunneling Protocol, NAS/LAC.

References

[1] https://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol

OutgoingIncoming
Hey! We are on Facebook now! »