Академический Документы
Профессиональный Документы
Культура Документы
1 VPN TOPOLOGIES
.
Protection at lower levels of the OSI stack, especially the Data Link
layer, was also used in communication systems of the past. This
provided protocol independent protection on specific untrusted links.
However, Data Link layer protection is expensive to deploy on a large
scale because there is a need to protect every single link separately.
Data Link layer protection allows for man-in-the-middle attacks on
intermediate stations, or routers, and is usually proprietary.