Advantage of ip sec tunnelling mode, Computer Networking

Advantage of IP sec  Tunnelling Mode

IP Sec  tunnelling mode  has the  following  advantages:

a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In actuality it is  somewhat  vulnerable to some  explores.  IP sec tunnelling  is secure  in fact  IP sec  tunnelling  mode  encrypts the portion of creating a VPN  tunnel  and encapsulate the  tunnel  creation verifying packet  integrity.

b.Good  protection from denial of service replay and man in the  middle attacks.

c.Scalability through IP. IP sec  be applied  in networks  of all sizes including LAN to global  networks. This is a big plus  for medium  to  large  enterprises. Not  limited  to applications thus  guaranteeing  they will  routable with IP  making  IP Sec  compatible.

Posted Date: 3/19/2013 12:13:25 AM | Location : United States







Related Discussions:- Advantage of ip sec tunnelling mode, Assignment Help, Ask Question on Advantage of ip sec tunnelling mode, Get Answer, Expert's Help, Advantage of ip sec tunnelling mode Discussions

Write discussion on Advantage of ip sec tunnelling mode
Your posts are moderated
Related Questions
DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.

Floating Point Representation in Memory 1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this rep

I have a larget text file of 1MB, how do i break down into chunks of packets to send over UDP? byte b[]=new byte[1024]; FileInputStream f=new FileInputStream("input.txt

Give the types of firewalls Conceptually, there are two types of firewalls: 1.  Network Level 2.  Application Level Network Level Firewall/Packet Filters The Net


Describe the literal meaning of the term Intranet The literal meaning of the term Intranet as given in various dictionaries is as follows: In' tra net - n. 1)  A network

Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t


Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.