FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What protocol is used with L2TP to provide encryption?
A
IPSec
B
MPPE
C
HTTPS
D
MSC-CHAP
Explanation: 

Detailed explanation-1: -The actual negotiation of parameters takes place over the SA’s secure channel, within the IPsec encryption. L2TP uses UDP port 1701.

Detailed explanation-2: -Due to its lack of encryption and authentication, Layer 2 Protocol is usually paired with IPsec (Internet Protocol Security) protocol, which provides the encryption and controls packets within the tunnel. IPsec encrypts L2TP packets between the endpoints.

Detailed explanation-3: -Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by internet service providers (ISPs) to enable virtual private networks (VPNs). To ensure security and privacy, L2TP must rely on an encryption protocol to pass within the tunnel.

Detailed explanation-4: -L2TP does not provide encryption on its own. Hence it is always paired with IPSec. L2TP offers better security if it uses AES cipher. L2TP/IPSec is easy to configure.

Detailed explanation-5: -By default, L2TP uses IPSec, which requires UDP ports 500 and 4500, and ESP IP Protocol 50. If you disable IPSec, Mobile VPN with L2TP requires only UDP port 1701. This type of L2TP configuration should be allowed in most environments unless the network is configured to be extremely restrictive.

There is 1 question to complete.