l2tp
- 网络第二层隧道协议;二层隧道协议
-
Research on Security of Layer Two Tunneling Protocol L2TP
L2TP隧道协议安全性问题的研究
-
Research of Access VPN Solution Based on L2TP and IPSEC
基于IPSec和L2TP的访问型VPN解决方案研究
-
Study and Realization of Secure Remote Access with L2TP
基于L2TP协议的安全远程接入技术的研究与实现
-
Plan for Secure Tunneling Technology Based on L2TP / IPSec
基于L2TP/IPSEC的安全隧道技术方案
-
Design and Implementation of Authentic VPN Scheme Using L2TP
L2TP下可信的VPN方案设计与实现
-
Virtual Private Networks Constructed by the Combination of IPSec & L2TP
IPSec与L2TP结合构筑的虚拟专用网络
-
This article take L2TP as the VPN WLAN design .
本课题就是以L2TP作为无线局域网VPN的设计方案。
-
Solution of Remote Access VPN Based on L2TP and IPSec
集成L2TP和IPSec技术构建安全的远程接入虚拟专用网
-
The two most practical uses of L2TP are : ① Establishment of virtual private networks ;
L2TP的最基本的两个应用是:1建立VPN连接;
-
Comparing all kinds of tunneling protocol , L2TP protocol has many virtue .
在论文的研究过程中,研究了各种隧道机制,通过对各种隧道协议的比较,决定对L2TP进行实现。
-
Implementation of flexible assignment of user rights on MPLS VPN based on L2TP
基于L2TP的MPLSVPN权限灵活分配的实现
-
Linux pseudo terminal device and its application in L2TP
Linux伪终端设备及其在L2TP中的应用
-
Note : use the default L2TP rules for L2TP tunnels .
注意:对于l2tp隧道,使用默认l2tp规则。
-
And two important agreements of VPN ( L2TP and IPSec ) are introduced .
并着重介绍了VPN技术中占有重要地位的两个协议:L2TP和IPSec协议。
-
L2TP Windows client port driver program writing
L2TPWindows客户端驱动程序设计
-
Security VPN Constructed by the Combination of L2TP and IPSec
基于L2TP与IPSec结合的安全VPN构建
-
Realization of L2TP / IPSec VPN Based on the Certificates
基于证书的L2TP/IPSECVPN的实现
-
ADSL Accessing Model Using L2TP for Broadband ISP
利用L2TP实现ADSL宽带ISP接入网络模型
-
Research on L2TP Tunnel Switching
L2TP隧道交换技术研究
-
Common tunneling protocols are GRE , L2TP and IPSec .
常见的隧道协议包括GRE、L2TP和IPsec。
-
The PPP protocol , the basis of PPTP and L2TP protocols , is also expounded .
重点比较了几种用于实现VPN的安全协议的优缺点,并详细阐述了PPTP和L2TP协议的基础:PPP点对点协议。
-
L2TP ( Layer 2 tunneling Protocol ) is a protocol that can be used for encapsulating the second layer frame .
二层隧道协议是一种对二层协议进行封装后前传的协议。
-
L2TP allows more people to share dial-in access and backbone IP network infrastructure , while supporting many kinds of network protocols .
L2TP可以使更多的人共享拨号接入和骨干IP网络设施,同时L2TP还支持多种网络协议;
-
This paper elaborated the technique of VPN and the realization of the Windows Server 2003 L2TP / IPSec VPN .
本文阐述了虚拟专用网技术及Windowsserver2003L2TP/IPSECVPN的实现。
-
L2TP is one of tunnel protocols in the VPN . Responder can changes its IP address in tunneling .
L2TP是虚拟专用网中常用的隧道协议,在隧道建立过程中,Responder可以动态选择IP地址。
-
Finally , this paper tests the VPN system which combines L2TP and IPSec , analyzes the experiment results , and summarizes the whole research work .
最后,本文对综合使用L2TP和IPSec后的VPN系统进行了测试,分析了实验结果,并对本课题的研究工作做了总结。
-
From the aspect of security , IPSec precede layer 2 tunnel protocols ( such as L2TP ) obviously .
在安全性方面IPSec明显优于L2TP等二层隧道协议。
-
This paper describes the basic conception of VPN layer two tunnel technology , mainly discusses the implementing L2TP , and analyzes the method via a material example .
描述了虚拟专用网(VPN)第二层隧道技术的基本概念,主要分析了L2TP的实现,并讨论了具体的程序实例。
-
Packed with IPSec protocol , the datagram of L2TP is to be secured .
在这个方案中,将L2TP与IPSec相结合,L2TP的数据报文经过Ipsec的封装,构成安全报文。
-
This paper discusses the security of L2TP , and describes a key technology relevant to protecting L2TP based on IPSec ESP by adding rules .
本文分析了L2TP中存在的安全性隐患,提出并描述了一种允许L2TP向IPSec过滤规则库中动态添加规则,实现IPSecESP为L2TP提供安全保护的方法。