L2TP tunneling modes and tunnel establishment process

Three typical L2TP tunneling modes

Typical L2TP tunneling modes include the following:

L2TP tunnel establishment process

Figure 94: Typical L2TP network

Figure 95 shows an L2TP call's setup procedure in NAS-initiated mode.

Figure 95: L2TP call setup procedure

An L2TP call is set up by using the following procedure:

  1. A remote user on Host A places a PPP call.

  2. Host A and the LAC (Router A) perform PPP LCP negotiation.

  3. The LAC authenticates the remote user by using the PAP, CHAP, or MS-CHAP.

  4. The LAC sends the authentication information (the username and password) to its RADIUS server for authentication.

  5. The LAC RADIUS server authenticates the user.

  6. If the user passes authentication, the LAC initiates a tunneling request to the LNS.

  7. If tunnel authentication is required, the LAC sends a CHAP challenge to the LNS. The LNS returns a CHAP response and sends its CHAP challenge to the LAC. Accordingly, the LAC returns a CHAP response to the LNS.

  8. The tunnel passes authentication.

  9. The LAC sends the CHAP response, response identifier, and PPP negotiation parameters of the user to the LNS.

  10. The LNS sends an access request to its RADIUS server for authentication.

  11. The RADIUS server authenticates the access request and returns a response if the user passes authentication.

  12. If the LNS is configured to perform a mandatory CHAP authentication for the user, the LNS sends a CHAP challenge to the user and the user returns a CHAP response.

  13. The LNS resends the access request to its RADIUS server for authentication.

  14. The RADIUS server authenticates the access request and returns a response if the user passes authentication.

  15. The LNS assigns an internal IP address to the remote user. The user can now access the internal resources of the enterprise network.