Will ipsec and nat work in each of the following cases

Assignment Help Basic Computer Science
Reference no: EM131045505

It is said that IPSEC may not work with Network Address Translation (NAT) (RFC 1631). However, whether IPSEC will work with NAT depends on which mode of IPSEC and NAT we use. Suppose we use true NAT, where only IP addresses are translated (without port translation). Will IPSEC and NAT work in each of the following cases? Explain why or why not

(a) IPSEC uses AH transport mode.

(b) IPSEC uses AH tunnel mode.

(c) IPSEC uses ESP transport mode.

(d) IPSEC uses ESP tunnel mode.

(e) What if we use PAT (Port Address Translation), also known as Network Address/Port Translation (NAPT) in NAT, where in addition to IP addresses, port numbers will be translated to share one IP address from outside the private networ?

Reference no: EM131045505

Questions Cloud

What have been sias main ingredients of success : What have been SIA's main ingredients of success? How has their success become vulnerable? Why is it difficult to maintain a leadership position of a company like SIA and continuously improve?
What is the present-worth cost of the machine : A used machine costs $20,000 to purchase. It has an annual maintenance cost of $20,000, a salvage value of $5,000, and a 10-year life. If the interest rate is 10% per year, compounded annually, what is the present-worth cost of the machine? Please sh..
Key positions at corporate headquarters : A(n) _____ staffing policy requires host country nationals to be recruited to manage subsidiaries, while parent company nationals occupy key positions at corporate headquarters.
Tubin to cover the commitment fee : Triplett attempted to arrange a $2,850,000 loan through Meyer Rabin and his Consumer's Investment Company (CIC). CIC issued a commitment letter conditioned on the payment of a $14,250 commitment fee and the personal guarantee of C. D. Wyche. Tripl..
Will ipsec and nat work in each of the following cases : It is said that IPSEC may not work with Network Address Translation (NAT) (RFC 1631). However, whether IPSEC will work with NAT depends on which mode of IPSEC and NAT we use. Suppose we use true NAT,
Roles of the human resource management : What is the meaning of staffing as one of the roles of the human resource management?
What is the break even point in dollar sales : The Poseidon Swim Company Produces swim trunks. The average selling price for one of their is $45.59. The variable cost per unit is $27.46, Poseidon Swim has an average fixed cost per year of $53,331. What is the break even point in dollar sales?
What is god like-low does god speak : What can we deduce about what nukes a prophet a prophet (Joseph and Jacob are consideredto be prophets in Islam)? How does the sum portray the role, qualifies, and experience of prophets in its renresention ofJoseph (and Jacob) (how does the comme..
Compare and contrast vehicle searches and inventories : Compare and contrast vehicle searches and inventories and indicate the most important differences between the two as they relate to law enforcement officers.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write overall approach when application developer needs data

Describe overall approach when application developer needs to show in form data from the database table

  Discuss measures that can be to proactively reduce risk

Discuss measures that can be taken to proactively reduce risk.

  Make the contents of your script resident in memory

Modify your whoisthere function so that you can enter "These are the folks logged in:" as an argument to appear before your list of who is logged in to the system.

  How many fragments are generated in link that has mtu

How many fragments are generated? What are values in the various fields in IP datagrams generated realted to fragmentaion?

  Identify a recently announced security vulnerability

Write a paper on Any of the topics on cyber-crime. your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its ..

  Write program reads in the length and width of a rectangular

Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular house (in meters) placed in the yard. Your program should compute the time (in minutes) required to cut the lawn around ..

  Understand the concepts relating to issues

Understand the concepts relating to issues

  Discuss some secure coding efforts and practices

Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet. Discuss some secure coding efforts and practices under way to mitigate the vulnerabilities exposed by this particular episode.

  Use an enhanced for loop to process the array

Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!

  Efforts to increase consumer awareness of products

Use of digital media within organizations has transformed how organizations communicate with prospective and current customers.

  The data layer class

The Data Layer class for your application. The Data Layer class should implement the functionality needed to find user account information; update account info;

  Principles of good design and usability attributes

All assignments must be prepared in double-space format, 12 pt. type (preferably TimesRoman), and should include a title page, table of contents, and reference list. Allsubmitted work should contain student name and course number and term

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd