Disadvantage of vpns - point to point , Computer Networking

Disadvantage of VPNs

The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability.

a.Implementation  can be time consuming: Implementation a VPN  can  sometimes be difficult  and time  consuming. Configuration planning, management  of keys, and troubleshooting  can easily turn  what seen to be a simple task into weeks of labour.

b.Troubleshooting Problems Because in a VPN data enters a gateway  unlevered  and leaves the gateway encrypted it can be very  difficult to troubleshoot a VPN  problems  such  as key  resynchronization  failures in authentication dropped  packets and gateway load  and stress can all make pinpointing problems  in the VPN  a difficult task.

To make your VPN reliable  make sure the VPN  administrators clearly understand  the underlying software  architecture and  a thorough understanding  of internet  protocols.

c.Vendor Interoperability: Many  vendors offering VPN  solutions long with the complex  nature  of VPN  protocols  such as IP sec  it can  be difficult to get different  vender  solution to interoperate. The  first step in attempting to connect two  vendors. VPN  devices  is to checks  the  VVPN    web site and check  for your  vendor  interoperability. The  second  thing to do is to  make sure you have  the configuration right  between the two.

Posted Date: 3/19/2013 12:28:07 AM | Location : United States







Related Discussions:- Disadvantage of vpns - point to point , Assignment Help, Ask Question on Disadvantage of vpns - point to point , Get Answer, Expert's Help, Disadvantage of vpns - point to point Discussions

Write discussion on Disadvantage of vpns - point to point
Your posts are moderated
Related Questions
How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Functions and features of the IPMonitor program are as follows:   a)  This program should be able to list out detail information of IP traffic which includes source IP address an

A. Current setting A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities a

Write the definition of SAN A SAN is a separate network to handle storage requirements. The SAN detaches storage tasks from specific servers and makes a shared storage facility

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Question: a) Outline the concept of the Real Time Gross Settlement (RTGS) system in Mauritius and name the three main system components of the MACSS. b) Differentiate bet

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication among two end users in a network. It is used in developing

ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.