Describe the mesh configuration for a VPN.

What will be an ideal response?

In a mesh configuration, each participant (i.e., network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant. In configuring the VPN, you need to specifically identify each of these participants to every other participant that uses the VPN. Before initiating a connection, each VPN hardware or software terminator checks its routing table or SA table to see if the other participant has an SA with it.

Computer Science & Information Technology

You might also like to view...

Conditional formatting is a way to apply formatting to specific ________ based on a comparison to a rule set in the New Rule dialog box

A) controls B) properties C) fields D) data

Computer Science & Information Technology

The Windows ____________________ is the backdrop for many of the tasks you perform on your computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology