L2TP/IPSec tunnels and for single-shot L2TP/IPSec tunnels when the last remaining
tunnel session has been disconnected.
Table 18: Differences in Handling Timeout Periods for L2TP/IPSec Tunnels
Single-Shot L2TP/IPSec
Tunnels
Standard L2TP/IPSec Tunnels
(Not Single-Shot)
Timeout
Period
The router ignores the idle timeout
period.
This behavior prevents a
single-shot tunnel from passing
traffic after its single L2TP session
is disconnected.
The tunnel persists until the idle timeout
period expires. If a new L2TP session is
created before the idle timeout period
expires, the tunnel persists to carry the new
session and any subsequent sessions that
are established.
When the idle timeout period expires, the
router disconnects the tunnel.
Idle timeout
period
The router signals the underlying
IPSec transport connection to
disconnect at the beginning of the
destruct timeout period.
The router signals the underlying IPSec
transport connection to disconnect when
the destruct timeout period expires.
Destruct
timeout
period
For information about configuring L2TP/IPSec single-shot tunnels on the router, see
“Configuring Single-Shot Tunnels” on page 287
.
Configuration Tasks for Client PC
To set up client PCs, you need to:
1.
Create an IPSec security policy to secure L2TP traffic to the E Series router.
2.
Get a certificate for the client or set up preshared keys.
3.
Create a VPN connection to the router.
4.
Log the client in to the E Series router.
Configuration Tasks for E Series Routers
The main configuration tasks for setting up L2TP/IPSec are:
1.
Set up IP connectivity to L2TP clients; for example, PPPoE, DHCP, or static IP.
2.
Set up digital certificates on the router, or configure preshared keys for IKE
authentication.
•
To set up digital certificates, see “Configuring Digital Certificates” on page 205.
•
To set up preshared keys, see “Configuring IPSec Parameters” on page 139 in
“Configuring IPSec” on page 119.
3.
Create IPSec policies. See “Defining an IKE Policy” on page 148 in “Configuring IPSec”
on page 119.
4.
Configure RADIUS authentication and accounting. See
JunosE Broadband Access
Configuration Guide
.
Copyright © 2010, Juniper Networks, Inc.
284
JunosE 11.2.x IP Services Configuration Guide
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...