Question: 1. Using IPsec to construct a VPN service could result in one of eight different service configurations: Remote access VPN, transport mode, authentication header; Remote
1. Using IPsec to construct a VPN service could result in one of eight different service configurations: Remote access VPN, transport mode, authentication header; Remote access VPN, transport mode, encapsulating security payload; Remote access VPN, tunnel mode, authentication header; Remote access VPN, tunnel mode, encapsulating security payload; Site-to-site VPN, transport mode, authentication header; Site-to-site VPN, transport mode, encapsulating security payload; Site-to-site VPN, tunnel mode, authentication header; or Site-to-site VPN, tunnel mode, encapsulating security payload. Randomly select three of the above options, then: a. Briefly explain the services provided by the first configuration you selected. b. Briefly explain the services provided by the second configuration you selected. c. Briefly explain the services provided by the third configuration you selected. d. Summarise the differences between the three service configurations that you selected.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
