O'Reilly logo

Network+ Training Guide by Mike Harwood, Drew Bird

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Protocols

  • Identify the following security protocols and describe their purpose and function:

    • Internet Protocol Security (IPSec)

    • Layer 2 Tunneling Protocol (L2TP)

    • Secure Sockets Layer (SSL)

    • Kerberos

Any discussion of remote access is sure to include security, and for a good reason: As its name implies, remote access literally opens your network to remote users. Although you'd like to think that only authorized users would try to connect from remote locations, the reality is that an equal number of illegitimate users will probably attempt to connect. Because many of the methods used to establish remote access are over public networks, securing the data you send and the points at which you connect is an important consideration. A significant ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required