| 1. | L2tp ( layer 2 tunneling protocol ) is a protocol that can be used for encapsulating the second layer frame 二层隧道协议是一种对二层协议进行封装后前传的协议。 |
| 2. | Layer 2 tunneling protocol ( l2tp ) , a more secure version of point - to - point tunneling protocol ( pptp ) 第二层隧道协议( l2tp ) ,是一种比点对点隧道协议( pptp )更安全的版本。 |
| 3. | 900 1800mhz tdma digital cellular mobile communication network technical specification for gprs general packet rervice tunnelling protocol 900 1800mhz tdma数字蜂窝移动通信网通用分组无线业务gprs隧道协议技术规范 |
| 4. | Gsns are responsible for the delivery and routing of data packets between the mobile stations and the external packet data networks Gprs支持节点的连接是建立在基于ip的gprs核心网上,利用gprs隧道协议( gtp )进行通讯。 |
| 5. | This dissertation comprises two parts : a comprehensive study of layer 2 tunneling and a comparatively complete implementation of the l2tpv3 signaling control in the linux environment 本论文覆盖的工作包括两部分:对第二层隧道协议的分析研究和在linux环境下对l2tpv3信令控制技术的实现。 |
| 6. | The active directory client extension does not deliver advanced virtual private networking protocols , like internet protocol security ipsec or layer 2 tunneling protocol l2tp 该active directory客户端扩展不提供高级虚拟专用网络vpn协议,如internet协议安全性ipsec或第2层隧道协议l2tp 。 |
| 7. | So we choose the l2tp protocol to implement 。 at first , we describe the l2tp protocol and give the whole description about the protocol 。 we use many state machine in the implementing 在论文的研究过程中,研究了各种隧道机制,通过对各种隧道协议的比较,决定对l2tp进行实现。对l2tp做了详细的描述,作出了完整的l2tp数据结构。 |
| 8. | We have found the encryption ( both 40 - bit and 128 - bit ) to be equally weak , and have discovered a series of bad design decisions that make other attacks against this encryption possible 其加密协议mppe存在加密强度较低问题,利用字典攻击部分密文可被破译;其隧道协议实现存在安全漏洞,使其它攻击成为可能,并且容易使安装pptp的用户遭受拒绝服务攻击。 |
| 9. | After introducing the correlative knowledge of vpn , such as tcp / ip protocols , encryption technology and so on , the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp 本文在介绍tcp / ip协议、加密技术等与vpn相关知识的基础上,较详细论述了ipsec协议和vpn的两个主要协议:点到点隧道协议( pptp )和层2隧道协议( l2tp ) 。 |
| 10. | In all kinds of existing tunneling techniques , ipsec protocol , which is brought forward by ietf , can provide the preferable security . it can ensure the security of the important data of enterprises by using the tunnel mode of ipsec to construct vpn 隧道技术是实现vpn的关键技术。在众多隧道协议中,由ietf提出的ipsec协议具有更好的安全性。利用ipsec的隧道模式构建vpn可确保企业敏感数据安全。 |