1*fd558d18SJames Chapman# 2*fd558d18SJames Chapman# Layer Two Tunneling Protocol (L2TP) 3*fd558d18SJames Chapman# 4*fd558d18SJames Chapman 5*fd558d18SJames Chapmanmenuconfig L2TP 6*fd558d18SJames Chapman tristate "Layer Two Tunneling Protocol (L2TP)" 7*fd558d18SJames Chapman depends on INET 8*fd558d18SJames Chapman ---help--- 9*fd558d18SJames Chapman Layer Two Tunneling Protocol 10*fd558d18SJames Chapman 11*fd558d18SJames Chapman From RFC 2661 <http://www.ietf.org/rfc/rfc2661.txt>. 12*fd558d18SJames Chapman 13*fd558d18SJames Chapman L2TP facilitates the tunneling of packets across an 14*fd558d18SJames Chapman intervening network in a way that is as transparent as 15*fd558d18SJames Chapman possible to both end-users and applications. 16*fd558d18SJames Chapman 17*fd558d18SJames Chapman L2TP is often used to tunnel PPP traffic over IP 18*fd558d18SJames Chapman tunnels. One IP tunnel may carry thousands of individual PPP 19*fd558d18SJames Chapman connections. L2TP is also used as a VPN protocol, popular 20*fd558d18SJames Chapman with home workers to connect to their offices. 21*fd558d18SJames Chapman 22*fd558d18SJames Chapman The kernel component handles only L2TP data packets: a 23*fd558d18SJames Chapman userland daemon handles L2TP the control protocol (tunnel 24*fd558d18SJames Chapman and session setup). One such daemon is OpenL2TP 25*fd558d18SJames Chapman (http://openl2tp.org/). 26*fd558d18SJames Chapman 27*fd558d18SJames Chapman If you don't need L2TP, say N. To compile all L2TP code as 28*fd558d18SJames Chapman modules, choose M here. 29