Solved

encrypting a point to point connection

Posted on 2008-10-25
3
560 Views
Last Modified: 2012-05-05
helo , can someone suggest what would be easiset way to encrypt a point to point conenction using cisco routers. encrypting data between CO and remote on a serila link.
0
Comment
Question by:Huzzain
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Expert Comment

by:kyleb84
ID: 22804185
Cisco will usually use PPP over a (Layer 2) serial link. PPP is encrypted.

The alternative would be a layer 3 managed link, in which case you've probably got an IPSEC tunnel in place anyway.

Can you give us any more info on the link and router models?
0
 

Author Comment

by:Huzzain
ID: 22804229
hi
 what i currently hav is 2 wire copper leased line connecting the two offices. what im thinking is using Cisco 878 G.SHDSL routers as CPE on both ends. sorry i mentioned as serial link earlier...
 
 i would preferably like to configure a Ethernet bridge (use same subnet on both sites) and want to creat a encrypting mechanism between the two routers.

thanks
0
 
LVL 10

Accepted Solution

by:
kyleb84 earned 100 total points
ID: 22804277
I don't think Cisco 878's can do back to back G.SHDSL....

You probably looking for a couple of 1800's they definitely do it.

And here's a Cisco config guide:
http://www.cisco.com/en/US/docs/ios/bbdsl/configuration/guide/bba_atm_shdsl_ps6441_TSD_Products_Configuration_Guide_Chapter.html#wp1061803

You won't need encryption because it's a point to point link, and disruption to the line (if someone tries to "listen in") will kill the link.

0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question