[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]


    Search the Q&A Archives


Actually in IPsec, in tunnel mode communication is done...

<< Back to: Cryptography FAQ (01/10: Overview)

Question by bliss
Submitted on 4/27/2004
Related FAQ: Cryptography FAQ (01/10: Overview)
Rating: Not yet rated Rate this question: Vote
Actually in IPsec, in tunnel mode communication is done through gateway to gateway.When the data reached the host gateway, it is encrypted and sent to the particular destination.What kinds of attacks is it possible on the encrypted data of the gateway and what security can be applied to protect the data on reaching its destination.


Your answer will be published for anyone to see and rate.  Your answer will not be displayed immediately.  If you'd like to get expert points and benefit from positive ratings, please create a new account or login into an existing account below.


Your name or nickname:
If you'd like to create a new account or access your existing account, put in your password here:
Your answer:

FAQS.ORG reserves the right to edit your answer as to improve its clarity.  By submitting your answer you authorize FAQS.ORG to publish your answer on the WWW without any restrictions. You agree to hold harmless and indemnify FAQS.ORG against any claims, costs, or damages resulting from publishing your answer.

 

FAQS.ORG makes no guarantees as to the accuracy of the posts. Each post is the personal opinion of the poster. These posts are not intended to substitute for medical, tax, legal, investment, accounting, or other professional advice. FAQS.ORG does not endorse any opinion or any product or service mentioned mentioned in these posts.

 

<< Back to: Cryptography FAQ (01/10: Overview)


[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]

© 2008 FAQS.ORG. All rights reserved.