Why they may not use this technology ? Even today irrespective of the topology, traffic is intercepted by lawful agencies by using different mechanism (port mirroring, etc...)
Thanks, Yogendra Pal Ericsson, India On Wed, Mar 21, 2012 at 7:07 AM, Stephen Hanna <[email protected]> wrote: > Please comment. > > Steve > > -----Original Message----- > From: ipsecme issue tracker [mailto:[email protected]] > Sent: Tuesday, March 20, 2012 7:04 PM > To: [email protected]; > [email protected] > Subject: [ipsecme] #219: Star topology as an admin choice > > #219: Star topology as an admin choice > > Some admins prefer a star topology so they can inspect traffic. They may > not want to use this technology. > > Suggested Resolution: Mention this in the Security Considerations section. > > -- > -------------------------+------------------------------------------------- > Reporter: | Owner: draft-ietf-ipsecme-p2p-vpn- > yaronf.ietf@… | problem@… > Type: defect | Status: new > Priority: normal | Milestone: > Component: p2p-vpn- | Severity: - > problem | > Keywords: | > -------------------------+------------------------------------------------- > > Ticket URL: <http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/219> > ipsecme <http://tools.ietf.org/ipsecme/> > > _______________________________________________ > IPsec mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/ipsec > --
_______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
