TLS/EPL WAN Services

Posted on 2007-08-01
Last Modified: 2008-03-17
Does anyone know anything about Verizon's (or any other carrier's) EPL service?

Verizon has a MAN service called TLS (Transparent LAN Switching), which does NOT support QoS/CoS. I guess it has something to do with the manner in which the TLS service tags and trunks the traffic.

They do, however, have a MAN service that does support QoS. It's called EPL.

Has anyone heard anything about it? Does anyone know how to configure the termination port on the switch itself? Should the switch port that terminates the TLS/EPL circuit be configured a sa normal full duplex Ethernet access port or as a trunk port? Would be an L2 or L3 connection?

Any input you may have will be helpful, Im sure. HELP!! :-)
Question by:ex-engineer
    1 Comment
    LVL 79

    Accepted Solution

    TLS is usually delivered either half-duplex or full-duplex depending on the provider. Your termination point would be a L3 router Ethernet port or firewall ethernet wan port. It was typically only available to Federal agencies and is considered "old technology"

    EPL I gather from reading the brochure, is more of a replacement for a private line T1 where you own the CPE at both ends. In this case, it is a L2 connection between your two sites vs a L3 connection over a T1.

    It really depends on what your goals and needs are. Are you looking for direct Ethernet to the Internet, or between your own sites?
     Most carriers do have some kind of MetroEthernet, FIOS, EPL type service in most major cities.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Overview This article describes how to silently install Adobe Reader on multiple workstations, customize the installation options (accept EULA, remove desktop shortcut etc) using the Adobe Customization Wizard and install Adobe Reader font packs an…
    Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now