Compare cert salaries and plan your next career move
Michael2 wrote: » While studying for the Sec+, I came across an article that listed some of the more common encryption protocols (PPTP, L2TP, IPSec, MS-CHAP, etc.) and when to use each one. I read that PPTP is the only one capable of passing through an NAT firewall which I thought was interesting. The article also said that L2TP should be used if IPSec-tunnel is being used (and if your VPN is not behind an NAT firewall). Does this mean that L2TP cannot be used with IPSec-transport? Do you even have to be using IPSec to run one of the other protocols like MS-CHAP or can you run PPTP and MS-CHAP without IPSec?
Michael2 wrote: » This book I'm using has some confusing information in it. The book says that the way to protect your network traffic when users are connected to a public network is to use a VPN. The thing is it says public network so I'm thinking antivirus software. The question literally says users; what users is not specified. Is this just an issue of the question being worded inappropriately or is it actually possible for authorized users to jump on and off a VPN?
Michael2 wrote: » Okay, now I understand. When they say 'join" Active Directory, they're talking about the machine and not the person. When they say 'log in', they're talking about a person logging in to a machine that's already part of the Active Directory structure.
instant000 wrote: » It's possible for "authorized" users to get on or off a VPN connection. Depending on your configuration, you can "split tunnel" which means you can send some traffic to the VPN, and some traffic to your other connection. (I feel that this is less secure).
Compare salaries for top cybersecurity certifications. Free download for TechExams community.