20
Layer 2 Tunneling Protocol Introduction Layer Two Tunneling Protocol is an extension of the Point- to-Point Tunneling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet. L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. The two main components that make up L2TP are the L2TP Access Concentrator, which is the device that physically terminates a call and the L2TP Network Server, which is the device that terminates and possibly authenticates the PPP stream. PPP defines a means of encapsulation to transmit multiprotocol packets over layer two point-to-point links. Generally, a user connects to a network access server through ISDN, ADSL, dialup POTS or other service and runs PPP over that connection. In this configuration, the L2 and PPP session endpoints are both on the same NAS. L2TP uses packet-switched network connections to make it possible for the endpoints to be located on different machines. The user has an L2 connection to an access concentrator, which then tunnels individual PPP frames to the NAS, so that the packets can be processed separately from the location of the circuit termination. This means

L2tp1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: L2tp1

Layer 2 Tunneling Protocol

Introduction

Layer Two Tunneling Protocol is an extension of the Point-to-Point Tunneling Protocol

used by an Internet service provider to enable the operation of a virtual private network

over the Internet. L2TP merges the best features of two other tunneling protocols: PPTP

from Microsoft and L2F from Cisco Systems. The two main components that make up

L2TP are the L2TP Access Concentrator, which is the device that physically terminates a

call and the L2TP Network Server, which is the device that terminates and possibly

authenticates the PPP stream.

PPP defines a means of encapsulation to transmit multiprotocol packets over layer two

point-to-point links. Generally, a user connects to a network access server through ISDN,

ADSL, dialup POTS or other service and runs PPP over that connection. In this

configuration, the L2 and PPP session endpoints are both on the same NAS.

L2TP uses packet-switched network connections to make it possible for the endpoints to

be located on different machines. The user has an L2 connection to an access

concentrator, which then tunnels individual PPP frames to the NAS, so that the packets

can be processed separately from the location of the circuit termination. This means that

the connection can terminate at a local circuit concentrator, eliminating possible long-

distance charges, among other benefits. From the user's point of view, there is no

difference in the operation.

Overview

L2TP is one of the key building blocks for virtual private networks in

the dial access space and is endorsed by Cisco and other internetworking industry leaders.

It combines the best of Cisco's Layer 2 Forwarding protocol and Microsoft's Point-to-

Point Tunneling Protocol. L2TP acts as a data link layer protocol for tunneling network

traffic between two peers over an existing network usually the Internet.

Page 2: L2tp1

It is common to carry Point-to-Point Protocol sessions within an L2TP tunnel.

L2TP does not provide confidentiality or strong authentication by itself. IPsec is often

used to secure L2TP packets by providing confidentiality, authentication and integrity.

The combination of these two protocols is generally known as L2TP/IPsec.

The two endpoints of an L2TP tunnel are called the LAC means L2TP Access

Concentrator and the LNS means L2TP Network Server. The LAC is the initiator of the

tunnel while the LNS is the server, which waits for new tunnels. Once a tunnel is

established, the network traffic between the peers is bidirectional. To be useful for

networking, higher-level protocols are then run through the L2TP tunnel. To facilitate

this an L2TP session or call is established within the tunnel for each higher-level protocol

such as PPP. Either the LAC or LNS may initiate sessions. The traffic for each session is

isolated by L2TP, so it is possible to set up multiple virtual networks across a single

tunnel.

The packets exchanged within an L2TP tunnel are either categorised as control packets or

data packets. L2TP provides reliability features for the control packets, but no reliability

for data packets. Reliability, if desired, must be provided by the nested protocols running

within each session of the L2TP tunnel.The following sections supply additional detail

about the interworkings and Cisco's implementation of L2TP.

Using L2TP tunneling, an Internet Service Provider , or other access service, can create a

virtual tunnel to link customer's remote sites or remote users with corporate home

networks. The L2TP access concentrator located at the ISP's point of presence

exchanges PPP messages with remote users and communicates by way of L2TP requests

and responses with the customer's L2TP network server to set up tunnels. L2TP passes

protocol-level packets through the virtual tunnel between end points of a point-to-point

connection.

Page 3: L2tp1

Fig: L2TPTunnelStructure

Frames from remote users are accepted by the ISP's POP, stripped of any linked framing

or transparency bytes, encapsulated in L2TP and forwarded over the appropriate tunnel.

The customer's home gateway accepts these L2TP frames, strips the L2TP encapsulation,

and processes the incoming frames for the appropriate interface. Figure shows the L2TP

tunnel detail and how user lsmith connects to the LNS to access the designated corporate

intranet.

Architecture

The Layer 2 Tunnel Protocol is an emerging Internet Engineering Task

Force standard that combines the best features of two existing tunneling protocols:

Cisco's Layer 2 Forwarding and Microsoft's Point-to-Point Tunneling Protocol. L2TP is

an extension to the Point-to-Point Protocol, which is an important component for VPNs.

VPNs allow users and telecommuters to connect to their corporate intranets or extranets.

VPNs are cost-effective because users can connect to the Internet locally and tunnel back

to connect to corporate resources. This not only reduces overhead costs associated with

traditional remote access methods, but also improves flexibility and scalability.

Traditional dial-up networking services only support registered IP addresses, which limits

the types of applications that are implemented over VPNs. L2TP supports multiple

protocols and unregistered and privately administered IP addresses over the Internet.

Page 4: L2tp1

This allows the existing access infastructure, such as the Internet, modems, access

servers, and ISDN terminal adapters, to be used. It also allows enterprise customers to

outsource dialout support, thus reducing overhead for hardware maintenance costs and

800 number fees, and allows them to concentrate corporate gateway resources. Figure

shows the L2TP architecture in a typical dial up environment.

Fig:L2TP Architecture

L2TP offers the same full-range spectrum of features as L2F, but offers additional

functionality. A L2TP-capable home gateway will work with an existing L2F network

access server and will concurrently support upgraded components running L2TP. LNSs

do not require reconfiguration each time an individual LAC is upgraded from L2F to

L2TP.

L2F and L2TP Feature Comparison

Function

L2F L2TP

Flow Control No Yes

AVP hiding No Yes

Page 5: L2tp1

Home gateway load sharing

Yes Yes

Home gateway stacking

Yes Yes

Home gateway primary and secondary backup

Yes Yes

DNS name support Yes Yes

Domain name flexibility

Yes Yes

Idle and absolute timeout

Yes Yes

Multilink PPP support

Yes Yes

Multichassis Multilink PPP support

Yes Yes

Multihop support Yes Yes

Security All security benefits of

PPP, including multiple per-user authentication options (CHAP, MS-CHAP, PAP).

All security benefits of PPP, including multiple per user authentication options (CHAP, MS-CHAP, PAP).

Page 6: L2tp1

 

Tunnel authentication mandatory

 

Tunnel authentication optional

Incoming Call Sequence

A VPDN connection between a remote user, a LAC at the ISP point-of-presence , and the

LNS at the home LAN using an L2TP tunnel is accomplished as follows:

1. The remote user initiates a PPP connection to the ISP, using the analog telephone

system or ISDN.

2. The ISP network LAC accepts the connection at the POP and the PPP link is

established.

3. After the end user and LNS negotiate LCP, the LAC partially authenticates the end

user with CHAP or PAP. The username, domain name, or DNIS is used to determine

whether the user is a VPDN client. If the user is not a VPDN client, authentication

continues, and the client will access the Internet or other contacted service. If the

username is a VPDN client, the mapping will name a specific endpoint .

4. The tunnel end points, the LAC and the LNS, authenticate each other before any

sessions are attempted within a tunnel. Alternatively, the LNS can accept tunnel creation

without any tunnel authentication of the LAC.

5. Once the tunnel exists, an L2TP session is created for the end user.

The LAC will propagate the LCP negotiated options and the partially

authenticated CHAP/PAP information to the LNS. The LNS will funnel the negotiated

options and authentication information directly to the virtual access interface. If the

Page 7: L2tp1

options configured on the virtual template interface does not match the negotiated options

with the LAC, the connection will fail, and a disconnect is sent to the LAC.

Fig: L2TP Incoming Call Flow

Page 8: L2tp1

The end result is that the exchange process appears to be between the dial-up client and

the remote LNS exclusively, as if no intermediary device is involved. Figure offers a

pictorial account of the L2TP incoming call sequence with its own corresponding

sequence numbers. Note the sequence numbers in figure 3 are not related to the sequence

numbers described above.

LAC AAA Tunnel Definition Lookup

AAA tunnel definition look up allows the LAC to look up tunnel definitions using key

words. Two new Cisco AV pairs are added to support LAC tunnel definition lookup:

tunnel type and l2tp-tunnel-password. These AV pairs are configured on the Radius

server. A description of the values are as follows:

tunnel type—Indicates the tunnel type is either L2F or L2TP. This is an optional AV pair

and if not defined, reverts to L2F, the default value. If you want to configure an L2TP

tunnel, you must use the L2TP AV pair value. This command is case sensitive.

l2tp-tunnel-password—This value is the secret (password) used for L2TP tunnel

authentication and L2TP AV pair hiding. This is an optional AV pair value; however, if it

is not defined, the secret will default to the password associated with the local name on

the LAC local username-password database. This AV pair is analogous to the l2tp local

secret CLI command.

Configure VPDN on the L2TP Access Concentrator

The LAC is a device that is typically located at a service provider's POP and initial

configuration and ongoing management is done by the service provider. Use the

following commands to enable VPDN on a LAC using L2TP beginning in global

configuration mode:

Step Command Purpose

1. vpdn enable Enables VPDN and inform the router to look for

Page 9: L2tp1

tunnel definitions from an LNS.

2. vpdn group group-number Defines a local group number identifier for

which other VPDN variables can be

assigned.Valid group numbers range between 1

and 3000.

3. request dialin [l2f | l2tp] ip

ip-address {domain domain-

name | dnis dialed-number}

Enables the router to request a dial in tunnel to

an IP address, if the dial in user belongs to a

specific domain or the dial in user dialed a

specific DNIS.

Configure VPDN on a L2TP Network Server

The LNS is the termination point for an L2TP tunnel. The LNS initiates outgoing calls

and receives incoming calls from the LAC. To configure the LNS to initiate and receive

calls, use the following commands beginning in global configuration mode:

Step Command Purpose

1.vpdn enable Enables VPDN and inform the router to look for

tunnel definitions from an LNS.

2.vpdn group group-number Defines a local group number identifier for which

other VPDN variables can be assigned.Valid group

numbers range between 1 and 3000.

Page 10: L2tp1

3.accept dialin [l2f | l2tp |

any] virtual-template

virtual-template number

remote remote-peer-name

Allows the LNS to accept an open tunnel request

from the specified remote peer, define the Layer 2

protocol to use for the tunnel, and identify the

virtual template to use for cloning virtual access

interfaces.

At this point, you can configure the virtual template interface with configuration

parameters you want applied to virtual access interfaces. A virtual template interface is a

logical entity configured for a serial interface. The virtual template interface is not tied to

any physical interface and is applied dynamically, as needed.

Virtual access interfaces are cloned from a virtual template interface, used on

demand, and then freed when no longer needed. Use the following commands to create

and configure a virtual template interface beginning in global configuration mode.

Step Command Purpose

1.interface virtual-

template number

Creates a virtual template interface, and enter interface

configuration mode.

2.ip unnumbered

ethernet 0

Enables IP without assigning a specific IP address on

the LAN.

3.encapsulation ppp Enables PPP encapsulation on the virtual template

interface, which will be applied to virtual access

interfaces.

Page 11: L2tp1

4.ppp authentication

pap | chap

Enables PAP or CHAP authentication on the virtual

template interface, which will be applied to virtual

access interfaces.

Commands

accept dialin

To specify the local name to use for authenticating and the virtual template to use for

cloning new virtual access interfaces when an incoming L2TP tunnel connection is

requested from a specific peer, use the accept dialin VPDN group command. To disable

authentication and virtual template cloning, use the no form of this command.

accept dialin [l2f | l2tp | any] virtual-template number [remote remote-peer-

name]

no accept dialin [l2f | l2tp | any] virtual-template number [remote remote-peer-

name]

Syntax Description

l2f | l2tp | any (Optional) Indicates which Layer 2 tunnel protocol to use for a dialin tunnel.

1. l2f—Layer 2 forwarding protocol. 2. l2tp—Layer 2 tunnel protocol.

3. any—VPDN will use autodetect to determine which tunnel type to use, either l2f or l2tp.

Page 12: L2tp1

virtual-template number

The virtual template interface that the new virtual access interface cloned from.

remote-peer-name (Optoinal) Case-sensitive name that the remote peer will use for identification and tunnel authentication.

Default

Disabled

Command Mode

VPDN group mode

L2TP/IPsecurity

Because of the lack of confidentiality inherent in the L2TP protocol, it

is often implemented along with IPsec. This is referred to as L2TP/IPsec, and is

standardized in IETF RFC 3193.The process of setting up an L2TP/IPsec VPN is as

follows:

1. Negotiation of IPsec Security Association, typically through Internet Key

Exchange . This is carried out over UDP port 500, and commonly uses

either a shared password, public keys, or X.509 certificates on both ends,

although other keying methods exist.

Page 13: L2tp1

2. Establishment of Encapsulated Security Payload communication in

transport mode. The IP Protocol number for ESP is 50. At this point, a

secure channel has been established, but no tunneling is taking place.

When the process is complete, L2TP packets between the endpoints are

encapsulated by IPsec. Since the L2TP packet itself is wrapped and hidden within the

IPsec packet, no information about the internal private network can be garnered from the

encrypted packet. Also, it is not necessary to open UDP port 1701 on firewalls between

the endpoints, since the inner packets are not acted upon until after IPsec data has been

decrypted and stripped, which only takes place at the endpoints. If a firewall or packet

filter is integrated into the endpoint itself, however, it will probably be necessary to open

port 1701 on that endpoint.A potential point of confusion in L2TP/IPsec is the use of the

terms tunnel and secure channel.

Tunnel refers to a channel which allows untouched packets of one network to be

transported over another network. In the case of L2TP/IPsec, it allows L2TP/PPP packets

to be transported over IP. A secure channel refers to a connection within which the

confidentiality of all data is guaranteed. In L2TP/IPsec, first IPsec provides a secure

channel, then L2TP provides a tunnel.

Benefits

L2TP offers the following benefits:

1. Vendor interoperability.

2. Can be used as part of the wholesale access solution, which allows ISPs to the

telco or service providers offer VPNs to Internet Service Providers (ISPs) and

other service providers.

3. Can be operated as a client initiated VPN solution, where enterprise customers

using a PC, can use the client initiated L2TP from a third party.

4. All value-added features currently available with Cisco's L2F, such as load

sharing and backup support, will be available in future IOS releases of L2TP.

Page 14: L2tp1

5. Supports Multihop, which enables Multichassis Multilink PPP in multiple home

gateways. This allows you to stack home gateways so that they appear as a single

entity.

Conclusion

L2TP Implementation and Operation is an essential resource for anyone

who works with L2TP and Virtual Private Networks. Written for developers and network

managers, this book provides an overview of the protocol, a detailed explanation of L2TP

architecture, a step-by-step guide to its implementation, and information on L2TP

security and management. You will find useful background on the OSI model, the

underlying PPP technology, how L2TP tunnels PPP, and L2TP LAC and LNS Layer 2

roles. In addition, the book contains detailed information on such topics as: L2TP

deployment models, L2TP tunnel structure, terminology, and function, Protocol state

machines, Tunnel authentication and initiation, Header and control message format,

including AVP, Control Channel dynamics, Session setup, Proxy authentication, Data

Page 15: L2tp1

handling, including Multilink PPP, L2TP security, SNMP management of L2TP

networks and Comparisons with L2F, PPTP, and other VPN technologies.