When you configure an LNS, you can configure it to accept calls from any LAC.
![]() |
Note: If there is no explicit LNS configuration on the router, the UDP port used for L2TP traffic is closed, and no tunnels or sessions can be established. |
To enable an LAC to connect to the LNS, you must create the following profiles:
![]() |
Note: If you remove a destination profile or modify attributes of a host profile, all tunnels and sessions using the profile will be dropped. |
![]() |
Note: If you are using shared tunnel-server ports, you must configure the shared tunnel-server ports before you configure Layer 2 Tunneling Protocol (L2TP) network server (LNS) support. You use the tunnel-server command in Global Configuration mode to specify the physical location of the shared tunnel-server port that you want to configure. See virtual-router for additional information about the tunnel-server command and shared tunnel-server ports. |
To configure an LNS, perform the following steps:
- host1:boston(config)#l2tp destination profile
boston4 ip address 192.168.76.20
- host1:boston(config-l2tp-dest-profile)#
- host1:boston(config-l2tp-dest-profile)#remote
host default
- host1:boston(config-l2tp-dest-profile-host)#
- host1:boston(config-l2tp-dest-profile-host)#profile georgeProfile1
- host1(config-l2tp-dest-profile-host)#disable
proxy lcp
- host1(config-l2tp-dest-profile-host)#enable
proxy authenticate
- host1(config-l2tp-dest-profile-host)#local
host andy
- host1(config-l2tp-dest-profile-host)#local
ip address 192.168.23.1
- host1:boston(config-l2tp-dest-profile-host)#tunnel password saco
- host1:boston(config-l2tp-dest-profile-host)#session-out-of-resource-result-code-override
For example, the MLPPP interface is created if the LAC does not send the initial received or last received LCP configuration request. If full LCP proxy data is available, this command is ignored.
- host1:boston(config-l2tp-dest-profile-host)#default-upper-type mlppp
![]() |
Note: When acting as the LNS, the E-series router supports dialed number identification service (DNIS). With DNIS, if users have a called number associated with them, the router searches the domain map for the called number. If it finds a match, the router uses the matching domain map entry information to authenticate the user. If the router does not find a match, it searches the domain map using normal processing. See Using DNIS in Configuring Remote Access. |