Layer Two Tunneling Protocol 'L2TP' Security Extensions for Non-IP networks
draft-ietf-pppext-l2tp-sec-04

Document Type Expired Internet-Draft (pppext WG)
Authors Pat Calhoun  , Mark Townsley  , Sumit Vakil  , Donald Grosser 
Last updated 1998-07-29
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-pppext-l2tp-sec-04.txt

Abstract

The L2TP document [1] defines the base protocol which describes the method of tunneling PPP [2] data. The L2TP document states that the security mechanism used over an IP network is to use the IETF's IPSEC protocols. L2TP was designed in such a way as to be able to run over any underlying layer (i.e. Frame Relay, ATM, etc.). This document specifies extensions to the L2TP protocol in order to provide authentication and integrity of individual packets in a tunneled session over a network where IPSEC or another suitable security protocol is not available.

Authors

Pat Calhoun (pcalhoun@cisco.com)
Mark Townsley (mark@townsley.net)
Sumit Vakil (svakil@usr.com)
Donald Grosser (grosser@raleigh.ibm.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)