Describe one security measure against reverse tunneling, Computer Networking

Assignment Help:

Question:

a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use a routing header in the reverse direction? Why not use destination option in both ways?

b) In the basic Return Routability mechanism, the mobile node reverse-tunnels the HoTI message to the home agent, which in turn forwards the packet to the correspondent. When the IPv4 address is co-located with the mobile node, the mobile node can reverse-tunnel the HoTI message using IPv4 addresses.

i. What implications does this have on the security association and signalling?

ii. What are the savings, if any?

c) Explicit the following statement: "The return routability procedure provides an address ownership proof mechanism."

d) Assuming that IP routing works on the Internet today and we send two different secrets along two different routing paths, why a proof that combines the two secrets sufficient for binding one address to another?

e) Reverse tunneling may be used in certain cases, such as when a network does not allow outgoing datagrams with a foreign source IP address, when enabled, rather than sending datagrams directly, the mobile node tunnels all transmissions back to the home agent, which sends them on the Internet. Consider MIP in a VPN scenario.

i. Explain how reverse tunneling could be risky if appropriate security measures are absent.

ii. Describe one security measure against reverse tunneling.

f) Assuming you are using authentication schemes for communications between

(i) a MN and a HA, (ii) a MN and a FA. Which one of (i) and (ii) is less secure?


Related Discussions:- Describe one security measure against reverse tunneling

What is routing region, What is routing region? When hierarchical routi...

What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack

Discuss network designs, This assignment will assess parts of objectives 2-...

This assignment will assess parts of objectives 2-6 from the subject outline: 1 Explain the principles of logical design 2 Discuss the strengths and weaknesses of various net

Determine the use of icon, Determine the use of Icon A small picture...

Determine the use of Icon A small picture or graphic used to represent a location in the inter- or Intranet (for example a flow-chart graphic to take the user to the departm

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol

Network interface hardware, NETWORK INTERFACE HARDWARE:  CPU can't ope...

NETWORK INTERFACE HARDWARE:  CPU can't operate data at network speeds. So in order to connect to the network device systems use special purpose hardware for network connection

Virtual lans, One of the design requirements is to isolate other network tr...

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN o

Explain matric, Matric define as Formula of path selection

Matric define as Formula of path selection

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd