Disadvantage of vpns - point to point , Computer Networking

Disadvantage of VPNs

The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability.

a.Implementation  can be time consuming: Implementation a VPN  can  sometimes be difficult  and time  consuming. Configuration planning, management  of keys, and troubleshooting  can easily turn  what seen to be a simple task into weeks of labour.

b.Troubleshooting Problems Because in a VPN data enters a gateway  unlevered  and leaves the gateway encrypted it can be very  difficult to troubleshoot a VPN  problems  such  as key  resynchronization  failures in authentication dropped  packets and gateway load  and stress can all make pinpointing problems  in the VPN  a difficult task.

To make your VPN reliable  make sure the VPN  administrators clearly understand  the underlying software  architecture and  a thorough understanding  of internet  protocols.

c.Vendor Interoperability: Many  vendors offering VPN  solutions long with the complex  nature  of VPN  protocols  such as IP sec  it can  be difficult to get different  vender  solution to interoperate. The  first step in attempting to connect two  vendors. VPN  devices  is to checks  the  VVPN    web site and check  for your  vendor  interoperability. The  second  thing to do is to  make sure you have  the configuration right  between the two.

Posted Date: 3/19/2013 12:28:07 AM | Location : United States







Related Discussions:- Disadvantage of vpns - point to point , Assignment Help, Ask Question on Disadvantage of vpns - point to point , Get Answer, Expert's Help, Disadvantage of vpns - point to point Discussions

Write discussion on Disadvantage of vpns - point to point
Your posts are moderated
Related Questions
Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Vector-Distance algorithm illustrated in more detail below: Packet switches wait for next update message and they goes by entries in packet. If entry has least path to destinat

What is the internal IP address There is a separate set of IP address for a company's internal use, more popularly known as "internal IP address" or subnet IP address. This IP

ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to t

Question: (a) In relation with a cellular network architecture, describe the following terms: (i) Clusters (ii) Pico cells (iii) Nano cells (iii) Cell breathing (b)

Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a com

What is SMTP? SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail, and gives the essential mail delivery services on the TCP/IP protocol

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

What is VRC? It is the most common and least costly mechanism for Error Detection. In VRC, a parity bit is added to each data unit so that the total number of 1s becomes even f

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.