Related Documentation
- M, MX Series
- Juniper Networks VSAs Supported by the AAA Service Framework
- Domain Mapping Overview
- M, MX, T Series
- Unified ISSU Concepts
- MX Series
- RADIUS IETF Attributes Supported by the AAA Service Framework
- Configuring a Tunnel Profile for Subscriber Access
- Subscriber Secure Policy and L2TP LAC Subscribers
L2TP for Subscriber Access Overview
The Layer 2 Tunneling Protocol (L2TP) is a client-server protocol that allows the Point-to-Point Protocol (PPP) to be tunneled across a network. L2TP encapsulates Layer 2 packets, such as PPP, for transmission across a network. An L2TP access concentrator (LAC), configured on an access device, receives packets from a remote client and forwards them to an L2TP network server (LNS) on a remote network. The LNS functions as the logical termination point of the PPP session tunneled by the LAC from the remote client. Figure 1 shows a simple L2TP topology.
Figure 1: Typical L2TP Topology

L2TP separates the termination of access technologies, such as cable or xDSL, from the termination of PPP and subsequent access to a network. This separation enables public ISPs to outsource their access technologies to competitive local exchange carriers (CLECs). L2TP provides ISPs the capability to supply VPN service; private enterprises can reduce or avoid investment in access technologies for remote workers.
You can configure your router to act as the LAC in PPP pass-through mode in which the LAC receives packets from a remote client and then forwards them at Layer 2 directly to the LNS. The PPP session is terminated on the LNS. This LAC implementation supports only Point-to-Point Protocol over Ethernet (PPPoE) subscribers over dynamic or static logical interfaces. Figure 2 shows the protocol layer stacking for an L2TP pass-through connection.
Figure 2: Protocol Stacking for L2TP Subscribers in Pass-Through Mode

![]() | Note: On MX Series routers, L2TP is supported only on MX240, MX480, and MX960 routers. It is not supported on MX80 routers. On MX Series routers, the LAC and LNS functions are supported only on MPCs; they are not supported on any services PIC or MS-DPC. For details about MPC support for L2TP, see the MX Series 3D Universal Edge Routers Line Card Guide Certain M Series routers support LNS functions on services PICs. For more information about the L2TP implementation on M Series routers, see the Junos Services Interfaces Configuration Release 11.2. |
The LAC dynamically creates tunnels based on AAA authentication parameters and transmits L2TP packets to the LNS by means of the IP/User Datagram Protocol (UDP). Traffic travels in an L2TP session; a tunnel is an aggregation of one or more sessions. You can also provision a domain map that is used by AAA to determine whether to tunnel or terminate the PPPoE subscriber on the LAC. A one-to-one mapping exists between each PPP subscriber tunneled to the LNS and an L2TP session.
When the LNS is an MX Series router, a LAC-facing peer interface on an MPC provides an IP address for the exchange of IP packets between the tunnel endpoints; the Routing Engine maintains the L2TP tunnels. The Packet Forwarding Engine hosts one or more inline services (si) interfaces. These interfaces function like a virtual physical interface and anchor the L2TP sessions on the LNS. The si interface enables L2TP services without requiring a special services PIC. Finally, another interface is used to transmit the subscriber data to and from the Internet.
The characteristics of the tunnel can originate either from a tunnel profile that you configure or from RADIUS tunnel attributes and vendor-specific attributes (VSAs) from the AAA server accessible at the LAC. You can include a tunnel profile in a domain map, which applies the tunnel profile before RADIUS authentication takes place. You can use RADIUS standard attributes and VSAs to override any or all characteristics configured by the tunnel profile in a domain map. Alternatively, RADIUS can itself apply a tunnel profile when the RADIUS Tunnel-Group VSA [26-64] is specified in the RADIUS login.
The Virtual-Router VSA [26-1] in the subscriber profile on the service provider AAA server (accessible from the LNS) determines the routing instance in which the L2TP session is brought up on the LNS. When this VSA is not present, the subscriber session comes up in the same routing instance as the tunnel, because the AAA server can be accessed only from the routing instance in which the tunnel terminates on the LNS.
This behavior is different than for DHCP and non-tunneled PPPoE subscribers, which come up in the default routing instance in the absence of the Virtual-Router VSA. For L2TP subscribers, you must include this VSA in the subscriber profile when you want the subscriber session to come up in a different routing instance than the tunnel routing instance.
The LAC supports RADIUS-initiated mirroring, which creates secure policies based on certain RADIUS VSAs, and uses RADIUS attributes to identify a subscriber whose traffic is to be mirrored. (This feature is not supported for an LNS configured on an MX Series router.)
The LAC supports unified ISSU. When an upgrade is initiated, the LAC completes any L2TP negotiations that are in progress but rejects any new negotiations until the upgrade has completed. No new tunnels or sessions are established during the upgrade. Subscriber logouts are recorded during the upgrade and are completed after the upgrade has completed. The LNS does not support unified ISSU. When LNS destinations exist, the LNS gracefully rejects the upgrade and the unified ISSU does not proceed.
Related Documentation
- M, MX Series
- Juniper Networks VSAs Supported by the AAA Service Framework
- Domain Mapping Overview
- M, MX, T Series
- Unified ISSU Concepts
- MX Series
- RADIUS IETF Attributes Supported by the AAA Service Framework
- Configuring a Tunnel Profile for Subscriber Access
- Subscriber Secure Policy and L2TP LAC Subscribers
Published: 2012-11-29
Related Documentation
- M, MX Series
- Juniper Networks VSAs Supported by the AAA Service Framework
- Domain Mapping Overview
- M, MX, T Series
- Unified ISSU Concepts
- MX Series
- RADIUS IETF Attributes Supported by the AAA Service Framework
- Configuring a Tunnel Profile for Subscriber Access
- Subscriber Secure Policy and L2TP LAC Subscribers