l2pt

just shortly: if properly implemented [remote client on isdn, central office on dsl/cisco1721] is l2pt *secure*? is there some drawbacks, may such a tunnel stream be interrupted [by some kind of hack], or somebody breaking into channel, thus entering into office lan [and make harm]?

do i need some other additional safety measures when using l2pt, or is cisco's built in security enough?

thanks

Reply to
sali
Loading thread data ...

In article , sali wrote: :if properly implemented [remote client on isdn, central office on :dsl/cisco1721] is :l2pt *secure*? :is there some drawbacks, may such a tunnel stream be interrupted [by some :kind of hack], or somebody breaking into channel, thus entering into office :lan [and make harm]?

l2tp is layered on top of IPSec, so if you have security between your hosts and your security gateway, the security of l2tp is no less than the security of IPSec itself.

Reply to
Walter Roberson

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.