COMPUTER THREATS SECURITY
WHAT IS A FIREWALL IN NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
PPTP
|
|
L2F
|
|
L2TP
|
|
IPsec
|
Detailed explanation-1: -The Point-to-Point Tunneling Protocol (PPTP) tunnels PPP via IP. A consortium of vendors, including Microsoft, 3COM, and others, developed it. PPTP uses Generic Routing Encapsulation (GRE) to pass PPP via IP, and uses TCP for a control channel (using TCP port 1723).
Detailed explanation-2: -Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP protocol 47 Generic Routing Encapsulation (GRE). PPTP provides a low-cost, private connection to a corporate network through the Internet. PPTP works well for people who work from home or travel and need to access their corporate networks.
Detailed explanation-3: -PPTP VPN is the process of creating and managing VPN connections or services using point-to-point tunneling protocol (PPTP). It is one of the most common ways of creating a VPN connection, and operates at layer 2 of the OSI model. PPTP VPN is also known as VPN over PPTP.
Detailed explanation-4: -PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality.
Detailed explanation-5: -Point-to-Point Tunneling Protocol (PPTP)-PPTP was developed by Microsoft as one of the first VPN protocols. PPTP: Uses standard authentication protocols such as CHAP and PAP. Supports TCP/IP only.