Cisco OL-4015-08 User Manual page 659

Cisco router and security device manager user's guide
Table of Contents

Advertisement

key pair
key recovery
L
L2F Protocol
L2TP
LAC
LAN
LAPB
LBO
life cycle
LNS
local subnet
OL-4015-08
See
public key
encryption.
A trusted method by which encrypted information can be decrypted if the
decryption key is lost or destroyed.
Layer 2 Forwarding Protocol. Protocol that supports the creation of secure
virtual private dial-up networks over the Internet.
Layer 2 Tunneling Protocol. An Internet Engineering Task Force (IETF)
standards track protocol defined in RFC 2661 that provides tunneling of PPP.
Based upon the best features of L2F and PPTP, L2TP provides an industry-wide
interoperable method of implementing VPDN. L2TP is proposed as an IPSec
alternative, but is used sometimes alongside IPSec to provide authentication
services.
L2TP access concentrator. Device terminating calls to remote systems and
tunneling PPP sessions between remote systems and the LNS.
Local Area Network. A network residing in one location or belonging to one
organization, typically, but not necessarily using IP and other Internet protocols.
Not the global Internet. See also intranet, network, Internet.
Link Access Procedure, Balanced.
Line Build Out.
See
expiration
date.
L2TP network server. Device able to terminate L2TP tunnels from a LAC and
able to terminate PPP sessions to remote systems through L2TP data sessions.
Subnetworks are IP networks arbitrarily segmented by a network administrator
(by means of a subnet mask) in order to provide a multilevel, hierarchical routing
structure while shielding the subnetwork from the addressing complexity of
attached networks. The local subnet is the subnet associated with your end of a
transmission.
Cisco Router and Security Device Manager Version 2.2 User's Guide
Glossary
GL-17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents