COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A VPN solution that includes AH for authentication and ESP for encryption; works at layer 3
A
PPTP
B
L2F
C
L2TP
D
IPsec
Explanation: 

Detailed explanation-1: -Authentication and Encryption Algorithms in IPsec IPsec security protocols use two types of algorithms, authentication and encryption. The AH module uses authentication algorithms. The ESP module can use encryption as well as authentication algorithms.

Detailed explanation-2: -In order to authenticate data packets and guarantee their integrity, IPsec includes two protocols. These are the AH (Authentication Header) protocol and the ESP (Encapsulating Security Payload) protocol. Both protocols, in turn, support two encapsulation modes-tunnel mode and transport mode.

Detailed explanation-3: -Supported authentication methods for IPsec VPNs. Authentication verifies that the remote party is who they claim they are. Using pre-shared key (PSK) authentication. A pre-shared key is a string of characters that is used as an authentication key. Using certificate-based authentication.

There is 1 question to complete.