How to create a l2tp connection in Fedora 14?

 
Thread Tools Search this Thread
Operating Systems Linux Red Hat How to create a l2tp connection in Fedora 14?
# 1  
Old 02-15-2012
How to create a l2tp connection in Fedora 14?

Hi,

I m a newbie in linux. We have a VPN server that has a public address.and we can connect to either PPtP or L2TP (PSK).

Now I d like to know how can I connect to it with L2TP connection?

Thanks in Advance.
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

How keep running a program n an another computer via a connection ssh when the connection is closed?

Hi everybody, I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop. I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies

2. Red Hat

fedora grub help, moving to tri boot (XP, ubuntu, fedora soemething)

I will shortly be adding a fedora flavor to my devel box. I currently have XP (installed first on an ssd), ubuntu 10.04 (installed second on the first partition of a platter drive), and I want to add either Cent or SL on the second partition of the platter drive. I will probably also want to... (0 Replies)
Discussion started by: LMHmedchem
0 Replies

3. Emergency UNIX and Linux Support

L2TP over PPTP

Hi there. Here is a crazy question: can we connect to a L2TP vpn server Through a PPTP VPN server(I mean when connecting to a pptp server)? (1 Reply)
Discussion started by: majid.merkava
1 Replies

4. Solaris

Solaris 10 ftp connection problem (connection refused, connection timed out)

Hi everyone, I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies

5. UNIX for Advanced & Expert Users

Connection reset by peer..closing connection

Hello I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS). What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies

6. Shell Programming and Scripting

How to Create a shell script to test the telnet connection status

Hi friends, I'm newbie to shell script. I wanted to create a shell script which able to write a result for all the telnet connection status. For example, from this machine I want to test the telnet connection (total 100+ servers) with this machine. Any idea how to write this shell script?... (16 Replies)
Discussion started by: yhcheong
16 Replies

7. UNIX for Dummies Questions & Answers

ssh_exchange_identification: Connection closed by remote host Connection closed

Hi Everyone, Good day. Scenario: 2 unix servers -- A (SunOS) and B (AIX) I have an ftp script to sftp 30 files from A to B which happen almost instantaneously i.e 30 sftp's happen at the same time. Some of these sftp's fail with the following error: ssh_exchange_identification: Connection... (1 Reply)
Discussion started by: jeevan_fimare
1 Replies

8. Shell Programming and Scripting

Create a TCP/IP Connection

Hello, I am trying to write a script in Perl which will send some data from a UNIX Box to a windows box. I am planning to create a TCP/IP communication port for the same. How do I go about this? Kindly help. Regards, Garric (50 Replies)
Discussion started by: garric
50 Replies

9. Linux

Dual Boot Win XP And Fedora with Fedora Installed First

Hi everyone, I hope this question goes here. Anyways, I have a unique situation where my friend's comp has Fedora installed and wants to add Win XP as a dual boot without formatting the drive. Is it possible to create a partition on the current hard drive and then install win xp? I couldn't find... (4 Replies)
Discussion started by: eltinator
4 Replies
Login or Register to Ask a Question
NG_L2TP(4)						   BSD Kernel Interfaces Manual 						NG_L2TP(4)

NAME
ng_l2tp -- L2TP protocol netgraph node type SYNOPSIS
#include <sys/types.h> #include <netgraph/ng_l2tp.h> DESCRIPTION
The l2tp node type implements the encapsulation layer of the L2TP protocol as described in RFC 2661. This includes adding the L2TP packet header for outgoing packets and verifying and removing it for incoming packets. The node maintains the L2TP sequence number state and han- dles control session packet acknowledgment and retransmission. HOOKS
The l2tp node type supports the following hooks: lower L2TP frames. ctrl Control packets. session_hhhh Session 0xhhhh data packets. L2TP control and data packets are transmitted to, and received from, the L2TP peer via the lower hook. Typically this hook would be con- nected to the inet/dgram/udp hook of an ng_ksocket(4) node for L2TP over UDP. The ctrl hook connects to the local L2TP management entity. L2TP control messages (without any L2TP headers) are transmitted and received on this hook. Messages written to this hook are guaranteed to be delivered to the peer reliably, in order, and without duplicates. Packets written to the ctrl hook must contain a two byte session ID prepended to the frame (in network order). This session ID is copied to the outgoing L2TP header. Similarly, packets read from the ctrl hook will have the received session ID prepended. Once an L2TP session has been created, the corresponding session hook may be used to transmit and receive the session's data frames: for the session with session ID 0xabcd, the hook is named session_abcd. CONTROL MESSAGES
This node type supports the generic control messages, plus the following: NGM_L2TP_SET_CONFIG This command updates the configuration of the node. It takes a struct ng_l2tp_config as an argument: /* Configuration for a node */ struct ng_l2tp_config { u_char enabled; /* enables traffic flow */ u_char match_id; /* tunnel id must match 'tunnel_id' */ u_int16_t tunnel_id; /* local tunnel id */ u_int16_t peer_id; /* peer's tunnel id */ u_int16_t peer_win; /* peer's max recv window size */ u_int16_t rexmit_max; /* max retransmits before failure */ u_int16_t rexmit_max_to; /* max delay between retransmits */ }; The enabled field enables packet processing. Each time this field is changed back to zero the sequence number state is reset. In this way, reuse of a node is possible. The tunnel_id field configures the local tunnel ID for the control connection. The match_id field determines how incoming L2TP pack- ets with a tunnel ID field different from tunnel_id are handled. If match_id is non-zero, they will be dropped; otherwise, they will be dropped only if the tunnel ID is non-zero. Typically tunnel_id is set to the local tunnel ID as soon as it is known and match_id is set to non-zero after receipt of the SCCRP or SCCCN control message. The peer's tunnel ID should be set in peer_id as soon as it is learned, typically after receipt of a SCCRQ or SCCRP control message. This value is copied into the L2TP header for outgoing packets. The peer_win field should be set from the ``Receive Window Size'' AVP received from the peer. The default value for this field is one; zero is an invalid value. As long as enabled is non-zero, this value may not be decreased. The rexmit_max and rexmit_max_to fields configure packet retransmission. rexmit_max_to is the maximum retransmission delay between packets, in seconds. The retransmit delay will start at a small value and increase exponentially up to this limit. The rexmit_max sets the maximum number of times a packet will be retransmitted without being acknowledged before a failure condition is declared. Once a failure condition is declared, each additional retransmission will cause the l2tp node to send a NGM_L2TP_ACK_FAILURE control message back to the node that sent the last NGM_L2TP_SET_CONFIG. Appropriate action should then be taken to shutdown the control connection. NGM_L2TP_GET_CONFIG Returns the current configuration as a struct ng_l2tp_config. NGM_L2TP_SET_SESS_CONFIG This control message configures a single data session. The corresponding hook must already be connected before sending this command. The argument is a struct ng_l2tp_sess_config: /* Configuration for a session hook */ struct ng_l2tp_sess_config { u_int16_t session_id; /* local session id */ u_int16_t peer_id; /* peer's session id */ u_char control_dseq; /* we control data sequencing? */ u_char enable_dseq; /* enable data sequencing? */ u_char include_length; /* include length field? */ }; The session_id and peer_id fields configure the local and remote session IDs, respectively. The control_dseq and enable_dseq fields determine whether sequence numbers are used with L2TP data packets. If enable_dseq is zero, then no sequence numbers are sent and incoming sequence numbers are ignored. Otherwise, sequence numbers are included on outgoing packets and checked on incoming packets. If control_dseq is non-zero, then the setting of enable_dseq will never change except by another NGM_L2TP_SET_SESS_CONFIG control message. If control_dseq is zero, then the peer controls whether sequence numbers are used: if an incoming L2TP data packet contains sequence numbers, enable_dseq is set to one, and conversely if an incoming L2TP data packet does not contain sequence numbers, enable_dseq is set to zero. The current value of enable_dseq is always accessible via the NGM_L2TP_GET_SESS_CONFIG control message (see below). Typically an LNS would set control_dseq to one while a LAC would set control_dseq to zero (if the Sequencing Required AVP were not sent), thus giving control of data packet sequencing to the LNS. The include_length field determines whether the L2TP header length field is included in outgoing L2TP data packets. For incoming packets, the L2TP length field is always checked when present. NGM_L2TP_GET_SESS_CONFIG This command takes a two byte session ID as an argument and returns the current configuration for the corresponding data session as a struct ng_l2tp_sess_config. The corresponding session hook must be connected. NGM_L2TP_GET_STATS This command returns a struct ng_l2tp_stats containing statistics of the L2TP tunnel. NGM_L2TP_CLR_STATS This command clears the statistics for the L2TP tunnel. NGM_L2TP_GETCLR_STATS Same as NGM_L2TP_GET_STATS, but also atomically clears the statistics as well. NGM_L2TP_GET_SESSION_STATS This command takes a two byte session ID as an argument and returns a struct ng_l2tp_session_stats containing statistics for the cor- responding data session. The corresponding session hook must be connected. NGM_L2TP_CLR_SESSION_STATS This command takes a two byte session ID as an argument and clears the statistics for that data session. The corresponding session hook must be connected. NGM_L2TP_GETCLR_SESSION_STATS Same as NGM_L2TP_GET_SESSION_STATS, but also atomically clears the statistics as well. NGM_L2TP_SET_SEQ This command sets the sequence numbers of a not yet enabled node. It takes a struct ng_l2tp_seq_config as argument, where xack and nr respectively ns and rack must be the same. This option is particularly useful if one receives and processes the first packet entirely in userspace and wants to hand over further processing to the node. SHUTDOWN
This node shuts down upon receipt of a NGM_SHUTDOWN control message, or when all hooks have been disconnected. SEE ALSO
netgraph(4), ng_ksocket(4), ng_ppp(4), ng_pptpgre(4), ngctl(8) W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter, Layer Two Tunneling Protocol L2TP, RFC 2661. HISTORY
The l2tp node type was developed at Packet Design, LLC, http://www.packetdesign.com/. AUTHORS
Archie Cobbs <archie@packetdesign.com> BSD
August 2, 2004 BSD