Disadvantage of vpns - point to point , Computer Networking

Disadvantage of VPNs

The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability.

a.Implementation  can be time consuming: Implementation a VPN  can  sometimes be difficult  and time  consuming. Configuration planning, management  of keys, and troubleshooting  can easily turn  what seen to be a simple task into weeks of labour.

b.Troubleshooting Problems Because in a VPN data enters a gateway  unlevered  and leaves the gateway encrypted it can be very  difficult to troubleshoot a VPN  problems  such  as key  resynchronization  failures in authentication dropped  packets and gateway load  and stress can all make pinpointing problems  in the VPN  a difficult task.

To make your VPN reliable  make sure the VPN  administrators clearly understand  the underlying software  architecture and  a thorough understanding  of internet  protocols.

c.Vendor Interoperability: Many  vendors offering VPN  solutions long with the complex  nature  of VPN  protocols  such as IP sec  it can  be difficult to get different  vender  solution to interoperate. The  first step in attempting to connect two  vendors. VPN  devices  is to checks  the  VVPN    web site and check  for your  vendor  interoperability. The  second  thing to do is to  make sure you have  the configuration right  between the two.

Posted Date: 3/19/2013 12:28:07 AM | Location : United States







Related Discussions:- Disadvantage of vpns - point to point , Assignment Help, Ask Question on Disadvantage of vpns - point to point , Get Answer, Expert's Help, Disadvantage of vpns - point to point Discussions

Write discussion on Disadvantage of vpns - point to point
Your posts are moderated
Related Questions
First, split the given series of n numbers into two parts, each consisting of n/2 numbers. After that, recursively split the series into two parts until each number acts as an inde

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques


In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

Q. Calculate Utilization percentage of the link? - System: Stop and wait ARQ - Bandwidth: 1Mbps - Round trip for one bit: 20ms - Frame length: 1000 bits Utilizatio

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

State about the Cell sectoring With cell sectoring, a cell is separated into a number of wedge-shaped sectors, each with its own set of channels, typically 3 or 6 sectors per c