First page
Back
Continue
Last page
Overview
Graphics
Applications for L2TP
Half of a secure VPN implementation
Overlay network
Avoid University firewalls
Remote static IP address
Global addressing behind NAT
Notes: