Provide input on the type of cryptographic tunneling protocols .

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue. <br /> <br /> Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.<br /> •Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.<br /> •Review the OSI Simulation in the week 3 lecture.<br /> •Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).<br />
Comments from Support Team: