What are the advantages and disadvantages of implementing IPSec using these methods:
1. Gateway to Gateway (using Firewall features)
2. Gateway to Gateway (using Router)
3a. Host to host (tunnel mode)
3b. Host to host (transport mode)
Is it true that IPSec theory host to host (tunnel mode) does not work in practice? What are common mistakes in implementing IPsec.