Encryption in the Subnet
Link encryptors widely available
but beware of single-DES
Easy to deploy incrementally
Transparent to routers, hosts & applications
Good resistance to traffic analysis
No defense against compromised routers or hosts
Previous slide
Next slide
Back to first slide
View graphic version