Disadvantages of ip sec tunnelling mode, Computer Networking

Disadvantages of IP sec  Tunnelling mode

IP sec  tunnelling  mode has the  following  disadvantage

a.Encryption of  small  packets  generates a lot  networks  over head  thus  reducing  network  performance.

b.IP sec is  complicate and  complex with many  features. This complexity increased the probability  of loopholes  being  discovered by hackers.

c.The data  encryption standard  algorithm is very  susceptible to brute force  attacks  using  readily available  software  on the internet.

Posted Date: 3/19/2013 12:15:25 AM | Location : United States

Related Discussions:- Disadvantages of ip sec tunnelling mode, Assignment Help, Ask Question on Disadvantages of ip sec tunnelling mode, Get Answer, Expert's Help, Disadvantages of ip sec tunnelling mode Discussions

Write discussion on Disadvantages of ip sec tunnelling mode
Your posts are moderated
Related Questions
Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required.   (2) Provide for the routing

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

Question: (a) Describe the following biometric techniques:- (i) Retina scan, (ii) Fingerprint, (iii) Iris Scan. Your answer should consider the following: the data storage requ

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

Questions: 1. A 5V Zener diode has a maximum power dissipation of 2W. What is the maximum current that can be safely passed through the device? 2. List three properties of a

Operating system for Server Since 1994, when the original pair of web servers - NCSA HTTPd and CERN HTTPd , were proposed, dozens of commercial and shareware programs have

Name the two commands that save the running-config to a TFTP server Ans)  Two commands are:- a) copy running tftp  b) write network

Can you define the difference among trusted and untrusted networks?