{"draft":"draft-ietf-l2tpext-security-08","doc_id":"RFC3193","title":" Securing L2TP using IPsec ","authors":["B. Patel","B. Aboba","W. Dixon","G. Zorn","S. Booth"],"format":["ASCII","HTML"],"page_count":"28","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Layer Two Tunneling Protocol Extensions INT","abstract":" This document discusses how L2TP (Layer Two Tunneling Protocol) may utilize IPsec to provide for tunnel authentication, privacy protection, integrity checking and replay protection. Both the voluntary and compulsory tunneling cases are discussed. [STANDARDS-TRACK]","pub_date":"October 2001","keywords":["L2TP","layer two tunneling protocol","authentication","IP Security"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC3193","errata_url":null}