Will ipsec and nat work in each of the following cases

Assignment Help Basic Computer Science
Reference no: EM131048969

It is said that IPSEC may not work with Network Address Translation (NAT) (RFC 1631). However, whether IPSEC will work with NAT depends on which mode of IPSEC and NAT we use. Suppose we use true NAT, where only IP addresses are translated (without port translation). Will IPSEC and NAT work in each of the following cases? Explain why or why not

(a) IPSEC uses AH transport mode.

(b) IPSEC uses AH tunnel mode.

(c) IPSEC uses ESP transport mode.

(d) IPSEC uses ESP tunnel mode.

(e) What if we use PAT (Port Address Translation), also known as Network Address/Port Translation (NAPT) in NAT, where in addition to IP addresses, port numbers will be translated to share one IP address from outside the private networ?

Reference no: EM131048969

Questions Cloud

Issue about the lack of growth of malaysia : Write the macroeconomic issue about the lack of growth of Malaysia, write the reason why this issue happened, the impact of this issue (good influence and bad influence), and must have the reference to support your answer
Show that consumers optimal consumption bundle will change : Show that the consumers optimal consumption bundle will change despite them being able to afford their original bundle.
Exxonmobil in chad and cameroon : In November 1999, ExxonMobil and its CEO Lee Raymond had to determine what course of action to take after two major partners, Royal Dutch/Shell and France's TotalFinaElf, withdrew from the Chad-Cameroon Oil and Pipeline Project. The project was en..
Describe and analyze two different religious systems : Two papers are required describing and analyzing two different religious systems or religious traditions. Attendance to the traditions particular service in required as part of these analysis.
Will ipsec and nat work in each of the following cases : What if we use PAT (Port Address Translation), also known as Network Address/Port Translation (NAPT) in NAT, where in addition to IP addresses, port numbers will be translated to share one IP address from outside the private networ?
What is required to apply it into business : HC1041 IT for Business - Individual Assignment - Why IT is important for business survival and What is required to apply IT into business?
Prepare a chemistry lab report about burning a peanut : Prepare a chemistry lab report about burning a peanut. Your results are expected to be lower due to heat losses. If you got 12,500J/g, it is (12,500/24,500)*100%= 51.0% of the jar value.
Would this help the attacker : Suppose that furthermore the attacker could reset the clock on the server host, perhaps using the Network Time Protocol. Show how an attacker could now authenticate itself to the server without knowing CHK (although it could not decrypt SK).
Analyse the impact of tourism information technology : Requirements - Analyse the impact of tourism information technology adaptation in Tourism Industries: A Case Study

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create class savingsaccount

Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders. Each object of the class contains a private instance variable savingBalance indicating the amount that saver currently..

  What presentation issues on this machine

Strings are represented as five packed 7-bit characters per word. What presentation issues on this machine have to be addressed for it to exchange integer and string data with the rest of the world?

  How to stop process-freeze its memory image in process

Some multicomputers permit running processes to be migrated from one node to another. Is it adequate to stop process, freeze its memory image, and just ship that off to different node?

  Explains how hackers can hide their own ip address

Explains how hackers can hide their own IP address when attacking other computers, and how administrators can thwart this type of cracking

  Identity using a combinatorial proof

Identity using a combinatorial proof

  Create a program that would do the following

Create a program that would do the following: 1. Ask the user for an integer number. 2. Read in the integer value, store it into a variable. 3. Calculate the square of that number. 4. Print out the computed value to the user.

  Ttime for implementation, and return on investment

You are the database administrator for your company. As your company continues to grow and expand, you have been asked to look into a client-server architecture for your database, which will allow you to have a database in a distributed environment. ..

  Use the method of iteration to find a formula

Use the method of Iteration to find a formula expressing S(n) as a function of n for the given recurrence relation and initial condition

  What windows server 2008 capability

The IT Department wants to install Windows Server 2008 Standard Edition on 14 new servers in its primary location. The servers have arrived, are unpacked, and have been tested.

  Converting between dbm and mw

Task 1: Converting between dBm and mW Apply 3's rule to estimate what 16 mWs is in dBm. _____ Apply 3's rule to estimate what 0.0625 mWs is in dBm. _____ Apply 10's rule to estimate what 10,000 mWs is in dBm. _____

  Basic excel modeling

Input a formula in cell C2 of the "converted_data" sheet that convert the "time to complete" value in cell C2 of the "raw_data" sheet (and is in seconds) to a corresponding value in minutes. Drag this formula down to cell C29 (on the "converted_da..

  Identify a new use for ugc

Choose one of the two publications and identify a new use for UGC. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals of the publication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd