There are several reasons why CIPE would be a smart choice for security and system administrators:
Red Hat Enterprise Linux ships with CIPE, so it is available to all Red Hat Enterprise Linux edge machines (for example, firewalls or gateways) and individual clients that you want to connect to your Intranet. Red Hat Enterprise Linux also includes CIPE-supported encryption ciphers.
CIPE supports encryption using either of the standard Blowfish or IDEA encryption algorithms. Depending on encryption export regulations in your country, you may use the default (Blowfish) to encrypt all CIPE traffic on your Intranet.
Because CIPE is software based, any older or redundant machine that is able to run Red Hat Enterprise Linux can become a CIPE gateway, saving an organization from having to purchase expensive dedicated VPN hardware to connect two LANs securely.
CIPE is actively developed to work in conjunction with iptables, ipchains, and other rules-based firewalls. Peer acceptance of incoming CIPE UDP packets is all that is needed to coexist with existing firewall rules.
CIPE configuration is done through text files, allowing administrators to configure their CIPE servers and clients remotely without the need for bulky graphical tools that can function poorly over a network. CIPE can also be configured via the Network Administration Tool.