Advantage of ip sec tunnelling mode, Computer Networking

Advantage of IP sec  Tunnelling Mode

IP Sec  tunnelling mode  has the  following  advantages:

a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In actuality it is  somewhat  vulnerable to some  explores.  IP sec tunnelling  is secure  in fact  IP sec  tunnelling  mode  encrypts the portion of creating a VPN  tunnel  and encapsulate the  tunnel  creation verifying packet  integrity.

b.Good  protection from denial of service replay and man in the  middle attacks.

c.Scalability through IP. IP sec  be applied  in networks  of all sizes including LAN to global  networks. This is a big plus  for medium  to  large  enterprises. Not  limited  to applications thus  guaranteeing  they will  routable with IP  making  IP Sec  compatible.

Posted Date: 3/19/2013 12:13:25 AM | Location : United States







Related Discussions:- Advantage of ip sec tunnelling mode, Assignment Help, Ask Question on Advantage of ip sec tunnelling mode, Get Answer, Expert's Help, Advantage of ip sec tunnelling mode Discussions

Write discussion on Advantage of ip sec tunnelling mode
Your posts are moderated
Related Questions
What is Applets Little programs that can make the Web pages more aesthetically beautiful by means of animations, text, and graphics moving across the screen.

Q. What is an Error? At any time bits flow from one point to another they are subject to unpredictable changes because of interference The interference is able to change the

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

Question: (a) Distinguish between UDP and TCP. (b) You have been asked to design and implement a chat application for a university. Which protocol could you used TCP or UDP

Cost Saving Better performance  scalability  and viability  translates into  saving  for  website  operators.  Because  fewer  application  web servers are required  to meet

So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every c

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

Simple Mail Transfer Protocol ( SMTP) SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to