Advantage of ip sec tunnelling mode, Computer Networking

Advantage of IP sec  Tunnelling Mode

IP Sec  tunnelling mode  has the  following  advantages:

a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In actuality it is  somewhat  vulnerable to some  explores.  IP sec tunnelling  is secure  in fact  IP sec  tunnelling  mode  encrypts the portion of creating a VPN  tunnel  and encapsulate the  tunnel  creation verifying packet  integrity.

b.Good  protection from denial of service replay and man in the  middle attacks.

c.Scalability through IP. IP sec  be applied  in networks  of all sizes including LAN to global  networks. This is a big plus  for medium  to  large  enterprises. Not  limited  to applications thus  guaranteeing  they will  routable with IP  making  IP Sec  compatible.

Posted Date: 3/19/2013 12:13:25 AM | Location : United States







Related Discussions:- Advantage of ip sec tunnelling mode, Assignment Help, Ask Question on Advantage of ip sec tunnelling mode, Get Answer, Expert's Help, Advantage of ip sec tunnelling mode Discussions

Write discussion on Advantage of ip sec tunnelling mode
Your posts are moderated
Related Questions
Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Describe the concept of successor and feasible successor?

In slotted Aloha system, it has been measured that 70% of slots are occupied by frames (i.e. the remaining slots are empty).  a)  How many frames need to be transmitted, on aver

#questiGE 1-A Objectives: • Consolidate EIGRP knowledge. • Introduce the Route Redistribution concept. • Introduce the EIGRP External Routes concept. • Introduce the Default Met

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Cost Saving Better performance  scalability  and viability  translates into  saving  for  website  operators.  Because  fewer  application  web servers are required  to meet

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Mail Message  Format When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also