290
Chapter 24 Layer 2 Tunneling Protocol (L2TP)
Introduction........................................................................................................................................................291
L2TP Configuration............................................................................................................................................291
Static Authentication ....................................................................................................................................291
RADIUS Authentication ...............................................................................................................................292
Configuration Example .................................................................................................................................293
Cisco Configuration ................................................................................................................................293