Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

7. Security technologies - Secure tunnel (10%) (1) Refer to the diagram below. A VPN is created between two routers over the Internet. Answer the

image text in transcribed
7. Security technologies - Secure tunnel (10%) (1) Refer to the diagram below. A VPN is created between two routers over the Internet. Answer the following questions. FO: 192.168.1.1 SO: 11.11.11.11 SO: 22.22.22.22 Fo: 192.168.22.1 PCI Internet VPN (Secure Tunnel) PC2 Router Router FO: 192.168.11.11 FO: 192.168.22.22 Outer Header Inner Header Payload Original Packet Tunneled Packet What type of VPN is used in the above diagram? If a tunneled packet sends from PCI to PC2, what IP addresses are used in the headers of this packet? Source IP address in outer header Destination IP address in outer header (2) What algorithms are used in the following security of VPN? MDS, PSK, DES, AES, RSA, SHA Data confidentiality Data integrity . Data origin authentication (3) Which sub-protocol in Internet Protocol Security (IPsec) is used to protect the data from being modified during the transmission? (4) In IPsec IKE phase 1, Diffie-Hellman key exchange algorithm is used to generate the IKE SA. Which two keys below are used to create the IKE SA for user? The keys X, and Y, is the private key and the public key of userl, and the keys Xz and Y2 is the private key and the public key of user2: X;

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

If f (x, y) = 100exy, find f/x and f/y.

Answered: 1 week ago

Question

15-5 How will MIS help my career?

Answered: 1 week ago