What is the LAC name when a PC functions as the LAC

26

When a PC functions as the LAC, the LAC name is the computer name.

In the Windows 7 system, use either of the following methods to view the computer name.
-Choose Control Panel > System and Security > System. Computer name under Computer name, domain, and workgroup settings is the LAC name.
-Choose Start > Run, and enter cmd. In the CLI screen that is displayed, enter hostname. The displayed computer name is the LAC name.
If the computer name of the PC exceeds 30 characters, use the first 30 characters as the LAC name.

Other related questions:
Description of LAC and LNS of the L2TP on firewalls
L2TP access concentrator (LAC): It is a device attached to the switching network. The LAC has a PPP terminal system and delivers L2TP processing. It usually provides access services for PPP users. The LAC is located between the L2TP network server (LNS) and a user, used to transfer information packets between the LNS and the user. The LAC encapsulates the information packets received from the user based on L2TP and delivers the information packets to the LNS. In addition, it decapsulates information packets received from the LNS and delivers the information packets to the user. The LAC and the user are connected in local connection mode or over a PPP link. In the VPDN application scenario, the LAC and the user are connected over the PPP link. LNS: It is both a logical termination point of a PPP system and an L2TP server. Generally, it serves as an edge on the enterprise intranet. As one side of an L2TP tunnel endpoint, the LNS is a peer to the LAC. The LNS is the logical termination point of a PPP session that is being tunneled from the remote system by the LAC. By establishing an L2TP tunnel on the public network, the peer end of a PPP session is logically extended from the LAC to the LNS on the enterprise intranet.

Automatic LAC dial-up
In automatic LAC dial-up scenarios, the LAC does not authenticate users. All users configured on the LAC are authenticated by the LNS through PPP authentication (PAP or CHAP). In CLI configurations, this is the PPP authentication configured on the VT interface.

Method used to configure the L2TP VPN on the USG6000
The L2TP application scenarios on the USG6000 are as follows: 1. NAS-Initiated VPN A user accesses the LAC by means of PPPoE dialup, and a tunnel is established between the LAC and the LNS. A user accesses the LAC by means of PPPoE dialup. The LAC sends a tunnel establishment request to the LNS through Internet. The LNS allocates an address to the user. The user is authenticated by the proxy on the LAC side or by both the LAC and the proxy on the LAC side. When all L2TP users are offline, the tunnel is automatically released to save resources. The tunnel is re-established when a user is accessed. This networking is applicable to the following scenario: A branch office user initiates a request to connect to the HQ network, and generally, the branch office user does not frequently access the HQ network. 2. LAC autodial A permanent L2TP session is established between the LAC and the LNS. A client can transmit data over the tunnel by means of an IP connection without PPP dialup. The user can configure the trigger condition for establishing a permanent L2TP session between the LAC and the LNS. The LAC establishes a permanent L2TP tunnel with the LNS using the locally-stored user name. The L2TP tunnel serves as a physical connection. In this way, the connection between the user and the LAC is based on the IP connection instead of the PPP connection. The LAC can forward IP packets of the user to the LNS. 3. Client-Initiated VPN A client that supports L2TP dialup can directly initiate a tunnel establishment request to the LNS bypassing the LAC. The user can directly initiate the connection. Therefore, the user can directly initiate a tunnel establishment request to the LNS bypassing the LAC. The LNS allocates an address to the user. Since the LNS needs to establish a tunnel for each remote user, the LNS configuration is relative complex compared with that in the NAS-Initiated VPN scenario. However, the user access is not subject to geographical restrictions. This scenario is applicable to the mobile office. For example, an employee on a business trip can access the HQ server using PCs or mobile phones.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top