SIP User's Manual  266  Document #: LTRT-12804 
  Mediant 800 MSBG 
 
3.3.3.5.3  Configuring L2TP Server 
The device can act as a Layer 2 Tunneling Protocol Server (L2TP Server), accepting L2TP 
client connection requests. 
¾  To configure L2PT: 
1.  Click the L2TP item (Configuration tab > Data menu > VPN submenu > L2TP); the 
following page appears: 
Figure  3-177: Configuring VPN L2TP Server 
 
2.  Under the 'Server' group, perform the following: 
a.  Select the 'Enabled' check box to enable the L2TP feature. Note that checking 
this box creates a L2TP server (if not yet created with the wizard), but does not 
define remote users. 
b.  Click the Click here to create VPN users link to define remote users that are 
granted access to your home network (see ''Creating VPN Users'' on page 267). 
c.  Select the 'Protect L2TP Conne
ction by IPSec' to secure the L2TP connection by 
the IP Security (IPSec) protocol. When enabled, the following entry appears: 
♦  Create Default IPSec Connection: When creating an L2TP Server with the 
connection wizard, a default IPSec connection is created to protect it. If you 
wish to disable this feature, clear this option. However, if L2TP protection is 
enabled by IPSec (see previous entry), you must provide an alternative, 
active IPSec connection for users to be able to connect. When this feature is 
enabled, the following entry appears. 
9  L2TP Server IPSec Shared Secret: change the IPSec shared secret 
provided when the connection was created. 
d.  Click the Advanced button, and then configure the following: 
♦  In the 'Max Idle Time to Disconnect in Seconds' field, specify the amount of 
idle time (during which no data is sent or received) that should elapse before 
the device disconnects an L2TP connection. 
♦  Select the 'Authentication Required' check box to enable L2TP to use 
authentication, and then select the algorithms the server may use when 
authenticating its clients. 
♦  Select the 'Encryption Required' check box to enable L2TP to use encryption 
and then select the algorithms the server may use when encrypting data.