Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices. L2PT allows edge switches to tunnel layer 2 STP (Spanning Tree Protocol), CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches connected through the service provider's network. The edge switch encapsulates layer 2 protocol packets with a specific MAC address before sending them across the service provider's network to other edge switches.
The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel network traffic between two peer devices over another network (like the Internet).
L2TP VPN lets remote users use the L2TP and IPSec client software included with their computers' operating systems to securely connect to the network behind the L2TP IPSec router. The remote users do not need their own IPSec gateways or VPN client software. In L2TP VPN, an IPSec VPN tunnel is established first and then an L2TP tunnel is built inside it. See also IPSec.
The IEEE802.3ad standard describes Link Aggregate Control Protocol (LACP), which is a protocol that dynamically creates and manages trunk groups. When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups. LACP also allows port redundancy, that is, if an operational port fails, then one of the "standby" ports becomes operational without user intervention.
A shared communication system to which many computers are attached. A LAN, as its name implies, is limited to a local area. LANs have different topologies, the most common being the linear bus and the star configuration.
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of the target system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.
A geographic territory used primarily by local telephone companies to determine charges for intrastate calls.
The time it takes for a bit to be transmitted from source to destination.
Layer-2 isolation prevents wireless clients associated with an AP from communicating with other APs (on the same wired network) and their associated wireless clients.
LDAP (Lightweight Directory Access Protocol) is a protocol over TCP that specifies how clients access directories of certificates and lists of revoked certificates.