8.7 End-to-end authentication and encryption are desired between two hosts. Draw figures similar to Figure 8.8 that show each of the following. a. Transport adjacency with encryption applied before authentication. b. A transport SA bundled inside a tunnel SA with encryption applied before authentication. c. A transport SA bundled inside a tunnel SA with authentication applied before encryption. | |
| View Solution | |
| << Back | Next >> |