Mesh Encryption: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
Latest revision as of 00:24, 20 January 2026
Mesh Encryption
A special case of many host-to-host VPNs. Whenever one host in a network wishes to communicate with another host in the network, it first establishes an IPsec connection. Typically, adding or removing one node in the mesh does not require reconfiguration of the other nodes.
Source: NIST SP 800-77 Rev. 1 | Category: