Skip to content
Scan a barcode
Scan
Paperback L2tp: Implementation and Operation Book

ISBN: 0201604485

ISBN13: 9780201604481

L2tp: Implementation and Operation

Layer 2 Tunneling Protocol (L2TP) has emerged as a key technology in the construction of Virtual Private Networks. L2TP provides remote access capabilities to organizations using public networks for... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good

$12.09
Save $17.90!
List Price $29.99
Almost Gone, Only 1 Left!

Customer Reviews

5 ratings

Well-written

This book provides a well-written, easy to understand description of L2TP.

well written

This book is very well written, the text flows well, making it easy to glance over a topic and still understand it. It is not only a good book for a L2TP beginner, but also a good reference guide for people who are interested in topics that are L2TP-related (VJ compression, Radius, etc.). Another plus, the size and soft binding of the book make it easy to handle.

The definitive book on L2TP

This is the definitive book on L2TP, and probably one of the most useful VPN books overall. The book provides a detailed discussion of the L2TP protocol which will be useful to implementors as well as customers. It includes a discussion of how L2TP can be secured using IPSEC, as well as chapters on management issues, including SNMP MIBs, and interactions with RADIUS authentication, authorization and accounting. Throughout the book, Rick Shea demonstrates his mastery of the subject as well as authority as a writer. Unlike many other VPN books, Rick Shea has been there and knows what he is talking about.

Helpful hints

This is an interesting book. It is useful to developers that are writing code. The helpful hints could save you weeks of work and are certainly worth the purchase price of a book.

Clear and concise

This book is clear, concise and helps the reader understand the details of implementation, and issues surrounding L2TP. Areas that were rough spots (including authentication, hiding and unhiding AVPs, and sequencing) during the bakeoffs are described clearly, which goes a long way to help reduce the development cycle of anyone implementing L2TP. If someone is developing, deploying, supporting, or marketing L2TP, they should read this book. The book is small enough that it is not overwhelming, and even managers could find the time to read it.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured