FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An open standard for secure multi-protocol routing; uses TCP port 1701 and UDP port 500
A
PPTP
B
L2F
C
L2TP
D
IPsec
Explanation: 

Detailed explanation-1: -Layer Two Tunneling Protocol (L2TP) uses UDP port 1701 and is an extension of the Point-to-Point Tunneling Protocol.

Detailed explanation-2: -Port 500 is used by most IPSEC-based VPN systems for the establishment of securely encrypted “tunnels” between endpoint machines. Users of firewalls or routers that must pass or negotiate VPN connections may need to allow UDP traffic to cross on port 500. ISAKMP RFC: http://www.ietf.org/rfc/rfc2408.txt.

Detailed explanation-3: -By default, L2TP uses IPSec, which requires UDP ports 500 and 4500, and ESP IP Protocol 50. If you disable IPSec, Mobile VPN with L2TP requires only UDP port 1701.

Detailed explanation-4: -Layer 2 Tunneling Protocol (L2TP) connections, which are also called virtual lines, provide cost-effective access for remote users by allowing a corporate network systems to manage the IP addresses assigned to its remote users.

There is 1 question to complete.