Compare PPTP and L2TP.
What will be an ideal response?
While Point-to-Point Tunneling Protocol (PPTP) was designed mainly as a tunneling protocol between a single client and a private LAN, achieved mainly with software, Layer 2 Tunneling Protocol (L2TP) supports many types of connections and has the endpoint exist on a VPN-capable router (a VPN concentrator), working at Layer 2, rather than having an endpoint be a server program. While PPTP has authentication and encryption, L2TP has no authentication or encryption built in, and relies on other protocols, such as IPSec, for security.
You might also like to view...
A(n) ____is a field or block of text used to determine the position of objects in a document
Fill in the blank(s) with correct word
Answer the following statements true (T) or false (F)
1. Threats are attacks carried out. 2. Computer security is protection of the integrity, availability, and confidentiality of information system resources. 3. Data integrity assures that information and programs are changed only in a specified and authorized manner. 4. Availability assures that systems works promptly and service is not denied to authorized users. 5. The “A” in the CIA triad stands for “authenticity”.