l2tp

  • 网络第二层隧道协议;二层隧道协议
l2tpl2tp
  1. Research on Security of Layer Two Tunneling Protocol L2TP

    L2TP隧道协议安全性问题的研究

  2. Research of Access VPN Solution Based on L2TP and IPSEC

    基于IPSec和L2TP的访问型VPN解决方案研究

  3. Study and Realization of Secure Remote Access with L2TP

    基于L2TP协议的安全远程接入技术的研究与实现

  4. Plan for Secure Tunneling Technology Based on L2TP / IPSec

    基于L2TP/IPSEC的安全隧道技术方案

  5. Design and Implementation of Authentic VPN Scheme Using L2TP

    L2TP下可信的VPN方案设计与实现

  6. Virtual Private Networks Constructed by the Combination of IPSec & L2TP

    IPSec与L2TP结合构筑的虚拟专用网络

  7. This article take L2TP as the VPN WLAN design .

    本课题就是以L2TP作为无线局域网VPN的设计方案。

  8. Solution of Remote Access VPN Based on L2TP and IPSec

    集成L2TP和IPSec技术构建安全的远程接入虚拟专用网

  9. The two most practical uses of L2TP are : ① Establishment of virtual private networks ;

    L2TP的最基本的两个应用是:1建立VPN连接;

  10. Comparing all kinds of tunneling protocol , L2TP protocol has many virtue .

    在论文的研究过程中,研究了各种隧道机制,通过对各种隧道协议的比较,决定对L2TP进行实现。

  11. Implementation of flexible assignment of user rights on MPLS VPN based on L2TP

    基于L2TP的MPLSVPN权限灵活分配的实现

  12. Linux pseudo terminal device and its application in L2TP

    Linux伪终端设备及其在L2TP中的应用

  13. Note : use the default L2TP rules for L2TP tunnels .

    注意:对于l2tp隧道,使用默认l2tp规则。

  14. And two important agreements of VPN ( L2TP and IPSec ) are introduced .

    并着重介绍了VPN技术中占有重要地位的两个协议:L2TP和IPSec协议。

  15. L2TP Windows client port driver program writing

    L2TPWindows客户端驱动程序设计

  16. Security VPN Constructed by the Combination of L2TP and IPSec

    基于L2TP与IPSec结合的安全VPN构建

  17. Realization of L2TP / IPSec VPN Based on the Certificates

    基于证书的L2TP/IPSECVPN的实现

  18. ADSL Accessing Model Using L2TP for Broadband ISP

    利用L2TP实现ADSL宽带ISP接入网络模型

  19. Research on L2TP Tunnel Switching

    L2TP隧道交换技术研究

  20. Common tunneling protocols are GRE , L2TP and IPSec .

    常见的隧道协议包括GRE、L2TP和IPsec。

  21. The PPP protocol , the basis of PPTP and L2TP protocols , is also expounded .

    重点比较了几种用于实现VPN的安全协议的优缺点,并详细阐述了PPTP和L2TP协议的基础:PPP点对点协议。

  22. L2TP ( Layer 2 tunneling Protocol ) is a protocol that can be used for encapsulating the second layer frame .

    二层隧道协议是一种对二层协议进行封装后前传的协议。

  23. L2TP allows more people to share dial-in access and backbone IP network infrastructure , while supporting many kinds of network protocols .

    L2TP可以使更多的人共享拨号接入和骨干IP网络设施,同时L2TP还支持多种网络协议;

  24. This paper elaborated the technique of VPN and the realization of the Windows Server 2003 L2TP / IPSec VPN .

    本文阐述了虚拟专用网技术及Windowsserver2003L2TP/IPSECVPN的实现。

  25. L2TP is one of tunnel protocols in the VPN . Responder can changes its IP address in tunneling .

    L2TP是虚拟专用网中常用的隧道协议,在隧道建立过程中,Responder可以动态选择IP地址。

  26. Finally , this paper tests the VPN system which combines L2TP and IPSec , analyzes the experiment results , and summarizes the whole research work .

    最后,本文对综合使用L2TP和IPSec后的VPN系统进行了测试,分析了实验结果,并对本课题的研究工作做了总结。

  27. From the aspect of security , IPSec precede layer 2 tunnel protocols ( such as L2TP ) obviously .

    在安全性方面IPSec明显优于L2TP等二层隧道协议。

  28. This paper describes the basic conception of VPN layer two tunnel technology , mainly discusses the implementing L2TP , and analyzes the method via a material example .

    描述了虚拟专用网(VPN)第二层隧道技术的基本概念,主要分析了L2TP的实现,并讨论了具体的程序实例。

  29. Packed with IPSec protocol , the datagram of L2TP is to be secured .

    在这个方案中,将L2TP与IPSec相结合,L2TP的数据报文经过Ipsec的封装,构成安全报文。

  30. This paper discusses the security of L2TP , and describes a key technology relevant to protecting L2TP based on IPSec ESP by adding rules .

    本文分析了L2TP中存在的安全性隐患,提出并描述了一种允许L2TP向IPSec过滤规则库中动态添加规则,实现IPSecESP为L2TP提供安全保护的方法。