I would like to share with all you about a L2TP scenario that I have.
There are some users connected in the LAC in the different networks and they need to remain separated between them.
Between LAC and LNS there is a single L2TP Tunnel with Nortel devices, and every thing is working fine.
Now I need to replace the LNS device to Cisco 7200 router and I have found a challange to do this.
The Nortel LNS Device can identify the customer by the Domain and then forwards it to the correct network. I have seem that Cisco can do the same feature, however in the Cisco Device I need to this configuration in the LAC device, and in this scenario I must do this configuration in the LNS Device (Cisco 7200).
Could anyone help me to find a better solution to replace Nortel LNS to Cisco LNS keeping the same configuration (by domain).
Please finf enclosed a simple topology to help to understand this scenario.
Layer Two Tunneling Protocol (L2TP) provides a means to terminate the PPP connection from the end user at one location and transport the L2 data packets to another location. L2TP offloads much of the IP functionality from the aggregation device and allows more centralized network designs. A RADIUS server provides AAA.
AAA authentication login default none
AAA authentication ppp default local group radius
AAA authorization network default local group radius none
AAA accounting network default wait-start group radius
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...