Disadvantage of vpns - point to point , Computer Networking

Disadvantage of VPNs

The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability.

a.Implementation  can be time consuming: Implementation a VPN  can  sometimes be difficult  and time  consuming. Configuration planning, management  of keys, and troubleshooting  can easily turn  what seen to be a simple task into weeks of labour.

b.Troubleshooting Problems Because in a VPN data enters a gateway  unlevered  and leaves the gateway encrypted it can be very  difficult to troubleshoot a VPN  problems  such  as key  resynchronization  failures in authentication dropped  packets and gateway load  and stress can all make pinpointing problems  in the VPN  a difficult task.

To make your VPN reliable  make sure the VPN  administrators clearly understand  the underlying software  architecture and  a thorough understanding  of internet  protocols.

c.Vendor Interoperability: Many  vendors offering VPN  solutions long with the complex  nature  of VPN  protocols  such as IP sec  it can  be difficult to get different  vender  solution to interoperate. The  first step in attempting to connect two  vendors. VPN  devices  is to checks  the  VVPN    web site and check  for your  vendor  interoperability. The  second  thing to do is to  make sure you have  the configuration right  between the two.

Posted Date: 3/19/2013 12:28:07 AM | Location : United States







Related Discussions:- Disadvantage of vpns - point to point , Assignment Help, Ask Question on Disadvantage of vpns - point to point , Get Answer, Expert's Help, Disadvantage of vpns - point to point Discussions

Write discussion on Disadvantage of vpns - point to point
Your posts are moderated
Related Questions
You are a network consultant working for a large European networVservice provider and have been given the task of reviewing the future network requirements of the company for its f

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

(i)  Suppose N stations are connected to an extended Ethernet LAN, as shown below shown in Figure operating at the rate of 10 Mbps. Assume that the efficiency of each Ethernet is 8

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Q. Define the Backbone Networks? Backbone Networks - Allows several LANs to be connected - Non of station is directly connected to the backbone - Stations are part

Question: (a) Explain the issue associated with vertices when the scan line scan line polygon fill algorithm is being applied? (b) Explain the logic of shortening edges to a

Single company or organization owns this. They are usually LAN technologies. There can be multiple LANs in a campus or building linked together. They are sometimes known Intranet.

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Can you define the difference among trusted and untrusted networks?