Describe the mesh configuration for a VPN.

What will be an ideal response?


In a mesh configuration, each participant (i.e., network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant. In configuring the VPN, you need to specifically identify each of these participants to every other participant that uses the VPN. Before initiating a connection, each VPN hardware or software terminator checks its routing table or SA table to see if the other participant has an SA with it.

Computer Science & Information Technology

You might also like to view...

Discuss disk access time with its requirements.

What will be an ideal response?

Computer Science & Information Technology

Match the following terms to their meanings:

I. Remove Background II. Artistic Effects III. Corrections IV. Reset Picture A. makes the picture look like a sketch or painting B. discards all formatting changes made to a picture C. eliminates unwanted portions of a picture D. improves the appearance of a picture

Computer Science & Information Technology

Briefly describe the results of configuring a MySQL database as a transactional database.

What will be an ideal response?

Computer Science & Information Technology

What is the shortcut for duplicating a single element while using the

Move tool? What will be an ideal response?

Computer Science & Information Technology