For each of the following three scenarios describe which IPsec configuration wou
ID: 3821398 • Letter: F
Question
For each of the following three scenarios describe which IPsec configuration would be the best choice and why: some combination of AH, ESP encryption, ESP authentication, ESP encryption and authentication, transport or tunnel mode.
a) A company wants to protect the confidentiality and integrity of communications between its main office and a satellite location. They would like to be able to use the public Internet as the backbone for their communications.
b) Another company is very concerned about keeping the knowledge of the details of their various projects limited to just the workers assigned to those projects. The workers on these projects are often from various places in the company so to communicate the messages must cross all throughout the company’s intranetwork.
c) A company is concerned about the security of its network management. There are several devices that must be managed over untrusted networks. The content of the management messages are not sensitive but it is important that they are not spoofed
Explanation / Answer
Answer
a. As both, confidentiality and integrity of communication between main office and a satellite location is required along with the ability to use public internet, ESP Encryption and authentication IPsec configuration should be used, encryption will provide confidentiality and integrity adn authentication is provide the ability to use public internet safely.
b. As the poject details are to be shared with a limited number of employees we need authentication for access, and the communication needs to be available thoughout the company's intranet so no need for encryption, therefore, ESP authentication and transport mode will be best IPsec configuration for this scenario, ESP authentication will provide access to limited employees and transport mode will make the communication possible throughout the company's intranetwork.
c.As the major concern is security and management of devices over untrusted networks ESP encryption and authentication with tunnel mode will be best for this scenario, ESP encryption and authentication will ensure the security and tunnel mode will let you manage devices through untrusted networks.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.