Advantage of ip sec tunnelling mode, Computer Networking

Advantage of IP sec  Tunnelling Mode

IP Sec  tunnelling mode  has the  following  advantages:

a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In actuality it is  somewhat  vulnerable to some  explores.  IP sec tunnelling  is secure  in fact  IP sec  tunnelling  mode  encrypts the portion of creating a VPN  tunnel  and encapsulate the  tunnel  creation verifying packet  integrity.

b.Good  protection from denial of service replay and man in the  middle attacks.

c.Scalability through IP. IP sec  be applied  in networks  of all sizes including LAN to global  networks. This is a big plus  for medium  to  large  enterprises. Not  limited  to applications thus  guaranteeing  they will  routable with IP  making  IP Sec  compatible.

Posted Date: 3/19/2013 12:13:25 AM | Location : United States







Related Discussions:- Advantage of ip sec tunnelling mode, Assignment Help, Ask Question on Advantage of ip sec tunnelling mode, Get Answer, Expert's Help, Advantage of ip sec tunnelling mode Discussions

Write discussion on Advantage of ip sec tunnelling mode
Your posts are moderated
Related Questions
What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo

OSPF ( open Shortest Path First) Open shortest  path first  is a routing  protocols  developed for internet protocols networks by the  interior  gateway protocols working group

What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make

Define Choke packet and Implicit congestion signalling Choke packet: A choke packet is a control packet produced at a congested node and transmitted back to a source node to co

Question : (a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice. (b) Briefly explain the similarity and differences between a switch and

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

Define the term - frame and packets Frames sum up packets. When a packet arrives at data link layer, the complete packet, header, data and remaining all, is used as data field

Geo stationary satellite The satellite which is known as earth-orbiting satellite is called geo stationary satellite. The geo stationary satellite is placed directly over the e

#clasification of inductor