Advantage of ip sec tunnelling mode, Computer Networking

Advantage of IP sec  Tunnelling Mode

IP Sec  tunnelling mode  has the  following  advantages:

a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In actuality it is  somewhat  vulnerable to some  explores.  IP sec tunnelling  is secure  in fact  IP sec  tunnelling  mode  encrypts the portion of creating a VPN  tunnel  and encapsulate the  tunnel  creation verifying packet  integrity.

b.Good  protection from denial of service replay and man in the  middle attacks.

c.Scalability through IP. IP sec  be applied  in networks  of all sizes including LAN to global  networks. This is a big plus  for medium  to  large  enterprises. Not  limited  to applications thus  guaranteeing  they will  routable with IP  making  IP Sec  compatible.

Posted Date: 3/19/2013 12:13:25 AM | Location : United States







Related Discussions:- Advantage of ip sec tunnelling mode, Assignment Help, Ask Question on Advantage of ip sec tunnelling mode, Get Answer, Expert's Help, Advantage of ip sec tunnelling mode Discussions

Write discussion on Advantage of ip sec tunnelling mode
Your posts are moderated
Related Questions
Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Problem 1. Explain the term Switching. Describe the following Switching Mechanisms a) Circuit Switching b) Packet Switching c) Message Switching Defining Switching

What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

UDP Segment Structure The  primary  purpose  of the UDP protocols  is to expose datagram's to the application  layer. The UDP protocols does very  little and therefore  employ

what's the difference among Symmetric and Asymmetric cryptosystem?

Q. Show the CRC-Performance ? CRC-Performance CRC is able to detect all burst errors that affect an odd number of bits CRC is able to detect all burst errors of

Addressing Complicated addressing scheme because there may be intermediate stations (APs), identified by flags

Link Layer To move  to packet  from one node( host  or packet swtich0 to  net node  in the  route the network  layer  relies  on the  services  of the link layer. Particularl

Explain Asynchronous FDDI Asynchronous bandwidth is allocated utilizing an eight-level priority scheme. Every station is assigned an asynchronous priority level. FDDI as wel

How LANs connected to Internet. Doubling every 18 months means factor of four gains in 3 years. In 9 years, gain is then 43 or 64, which leads to 6.4 billion hosts. My intuitio