Source address, destination address, protocol type, IP bearer senior ACL2000 ~ 2999 can use the packet (such as TCP source port, destination port, ICMP protocol type, message code, etc.) defined rules.
Compare similar symmetric encryption algorithms and asymmetric encryption algorithm key distribution method, encryption and decryption are performed by the information sent to the receiver key, the method can be used to send E-mail and other means.
Common symmetric encryption algorithms are there? (Choose three)
Here on the NAS-Initialized the L2TP VPN, correct statement are: (Choose three)