Identify the following security protocols and describe their purpose and function:
Internet Protocol Security (IPSec)
Layer 2 Tunneling Protocol (L2TP)
Secure Sockets Layer (SSL)
Any discussion of remote access is sure to include security, and for a good reason: As its name implies, remote access literally opens your network to remote users. Although you'd like to think that only authorized users would try to connect from remote locations, the reality is that an equal number of illegitimate users will probably attempt to connect. Because many of the methods used to establish remote access are over public networks, securing the data you send and the points at which you connect is an important consideration. A significant ...