Why they may not use this technology ? Even today irrespective of the
topology, traffic is intercepted by lawful agencies by using different
mechanism (port mirroring, etc...)

Thanks,
Yogendra Pal
Ericsson, India

On Wed, Mar 21, 2012 at 7:07 AM, Stephen Hanna <[email protected]> wrote:

> Please comment.
>
> Steve
>
> -----Original Message-----
> From: ipsecme issue tracker [mailto:[email protected]]
> Sent: Tuesday, March 20, 2012 7:04 PM
> To: [email protected];
> [email protected]
> Subject: [ipsecme] #219: Star topology as an admin choice
>
> #219: Star topology as an admin choice
>
>  Some admins prefer a star topology so they can inspect traffic. They may
>  not want to use this technology.
>
>  Suggested Resolution: Mention this in the Security Considerations section.
>
> --
> -------------------------+-------------------------------------------------
>  Reporter:               |      Owner:  draft-ietf-ipsecme-p2p-vpn-
>  yaronf.ietf@…          |  problem@…
>     Type:  defect       |     Status:  new
>  Priority:  normal       |  Milestone:
> Component:  p2p-vpn-     |   Severity:  -
>  problem                |
>  Keywords:               |
> -------------------------+-------------------------------------------------
>
> Ticket URL: <http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/219>
> ipsecme <http://tools.ietf.org/ipsecme/>
>
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec
>



--
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to