First page Back Continue Last page Graphics
Location of Encryption Devices
Link Encryption
- Each vulnerable communications link is equipped on both ends with an encryption device
- All traffic over all communications links is secured
- Vulnerable at each switch