MTG
Enterprise Resource Security
Mastering Cryptographic Key Lifecycles
The topology consists of two routers, Router1 and Router2, connected to a switch and two PCs.