Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
How does a L2TP VPN work?
L2TP VPNs are like PPTP (point-to-point tunneling protocol), but offer better security features, such as the option to use 168-bit keys with 3DES.
An L2TP VPN uses a client application on a remote system, with a VPN termination device that sits inside the network.
They use a point-to-point tunneling protocol.
An L2TP VPN doesn't require a special client to be installed on the machine that's managing it.
No references given. RCF 2661 does not reference 3DES or 168-bit keys. Provide references or delete. EDIT: L2TP is considered the next version of PPTP which is the standard encryption and VPN protocol on Microsoft platform. It uses 3DES or AES-256 bit to encrypt traffic. EDIT: L2TP does not provide confidentiality by itself. It is generally associated with IPsec for this (L2TP/IPsec) [ref: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14122-24.html].
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.