<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-pppext-l2tp-sec" target="https://datatracker.ietf.org/doc/html/draft-ietf-pppext-l2tp-sec-04">
   <front>
      <title>Layer Two Tunneling Protocol &#x27;L2TP&#x27; Security Extensions for Non-IP networks</title>
      <author initials="P. R." surname="Calhoun" fullname="Pat R. Calhoun">
         <organization>Sun Microsystems</organization>
      </author>
      <author initials="M." surname="Townsley" fullname="Mark Townsley">
         <organization>Cisco Systems</organization>
      </author>
      <author initials="S. A." surname="Vakil" fullname="Sumit A. Vakil">
         <organization>VPNet Technologies</organization>
      </author>
      <author initials="D. B." surname="Grosser" fullname="Donald B. Grosser">
         <organization>IBM Corporation</organization>
      </author>
      <date month="July" day="29" year="1998" />
      <abstract>
	 <t>   The L2TP document [1] defines the base protocol which describes the
   method of tunneling PPP [2] data. The L2TP document states that the
   security mechanism used over an IP network is to use the IETF&#x27;s IPSEC
   protocols.
 
   L2TP was designed in such a way as to be able to run over any
   underlying layer (i.e. Frame Relay, ATM, etc.). This document
   specifies extensions to the L2TP protocol in order to provide
   authentication and integrity of individual packets in a tunneled
   session over a network where IPSEC or another suitable security
   protocol is not available.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pppext-l2tp-sec-04" />
   
</reference>
