Results 101 to 110 of about 1,966 (130)
Layer Two Tunneling Protocol (L2TP) Internet Assigned Numbers Authority (IANA) Considerations Update [PDF]
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Password Acquisition and Traffic Decryption Based on L2TP/IPSec
2020 IEEE 20th International Conference on Communication Technology (ICCT), 2020Private Network (VPN) is a widely used technology that transmits information through an encrypted tunnel on the internet and military networks. Combining the advantages of security mechanisms based on the Layer-Two Tunneling Protocol (L2TP) and the Internet Protocol Security (IPSec), L2TP/IPSec is generally regarded as a strong VPN encryption protocol.
Qingbing Ji
exaly +2 more sources
Communication Between Remote LANs Based on L2TP
2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018L2TP (Layer 2 Tunneling Protocol)is a type of VPDN(Virtual Private Dial-up Network)tunneling protocol. It extends the application of PPP (Point-to-Point Protocol). L2TP establishes a tunnel from the enterprise branch user to the enterprise headquarters through the dial-up network and PPP based negotiation, so that remote users can access the enterprise
Zhengyi Liu, Baihui Tang
exaly +2 more sources
The Application of Linux Pseudo-terminal Device in the L2TP
2009 Third International Symposium on Intelligent Information Technology Application, 2009Discussed the basic principles of terminal equipment of Linux pseudo, as well as the naming process and a typical structure of pseudo-terminal. Analyzed how access to and use of pseudo-terminals pseudo-terminal master and slave data communications equipment dynamically. Combination of Layer Two Tunneling Protocol (L2TP) to achieve the Linux process, it
Yan Niu, Jun Li, Dong Li
exaly +2 more sources
Research and implementation of Layer Two Tunneling Protocol (L2TP) on carrier network
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, 2011As IPv4 addresses are being exhausted, researches on how to implement IPv6 [1] on carrier network are becoming valuable. IETF Softwire Group has proposed many useful methods, such as the Layer Two Tunneling Protocol (L2TP), towards this end. This paper firstly explains L2TP [2] tunnel technology in detail and then proposes the deployments of gateway ...
Mingming Hu +4 more
exaly +2 more sources
Application of VPN Based on L2TP and User’s Access Rights in Campus Network
Lecture Notes in Computer Science, 2018VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result,
Shuying Liu +3 more
exaly +2 more sources
Application and Study of Virtual Private Network Base on L2TP-IPSec
Advanced Materials Research, 2014Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”,
exaly +2 more sources

