VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第1题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第2题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
第3题:
The real difference between plants and animals ____ what they do, and not in what they seem to be.
A: lies in
B: lies with
C: lies down
D: lies up
第4题:
What does the command show | compare rollback 1 display?()
第5题:
What is difference between OSPF neighbor and adjacencies?
第6题:
What does the command show | compare rollback 1 display?()
第7题:
Which of these statements best describes the major difference between an IPv4-compatible tunnel and a 6to4 tunnel? ()
第8题:
what is the difference between the HSRP and VRRP?
第9题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第10题:
our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()