PC

What is VPN ? (VPN) virtual private network

User Rating: / 0
PoorBest 
VPN (Virtual Private Network)

A virtual private network (VPN) extends a private network across public networks just like the net. It permits a bunch laptop to send and receive information across shared or public networks as if they were an integral a part of the non-public network with all the practicality, security and management policies of the non-public network. this can be done by establishing a virtual point-to-point affiliation through the employment of dedicated connections, encryption, or a mixture of the two.

The VPN association across the web is technically a large space network (WAN) link between the sites. From a user perspective, the extended network resources area unit accessed within the same method as resources accessible from the private network—hence the name "virtual private network"

Cisco merchandise support the most recent in VPN technology. A VPN may be a service that gives secure, reliable property over a shared public network infrastructure like the net.

VPNs maintain identical security and management policies as a personal network. they're the foremost price effective technique of building a virtual point-to-point association between remote users associated an enterprise customer's network. There are three main forms of VPNs.

Access VPNs—Provide remote access to associate enterprise customer's computer network or Extranet over a shared infrastructure. Access VPNs use analog, dial, ISDN, digital telephone line (DSL), mobile IP, and cable technologies to firmly connect mobile users, telecommuters, and branch offices.

Intranet VPNs—Link enterprise client headquarters, remote offices, and branch offices to an inside network over a shared infrastructure mistreatment dedicated connections. computer network VPNs dissent from Extranet VPNs therein they permit access solely to the enterprise customer's staff.

Extranet VPNs—Link outside customers, suppliers, partners, or communities of interest to Associate in Nursing enterprise customer's network over a shared infrastructure mistreatment dedicated connections. Extranet VPNs dissent from computer intranet VPNs therein they permit access to users outside the enterprise.

Cisco VPN routers—Use Cisco IOS computer code IPSec support to modify a secure VPN. VPN-optimized routers leverage existing Cisco investment, good for the hybrid WAN. Cisco Secure PIX Firewall—Offers a VPN entryway different once the safety cluster "owns" the VPN.

Cisco VPN Concentrator series—Offers powerful remote access and site-to-site VPN capability, easy-to-use management interface, and a VPN shopper.

Cisco Secure VPN Client—Enables secure remote access to Cisco routers and PIX Firewalls and runs on the Windows software.

Cisco Secure Intrusion Detection System (CSIDS) and Cisco Secure Scanner—Can be wanting to monitor and audit the protection of the VPN.

Cisco Secure Policy Manager and Cisco Works 2000—Provide VPN-wide system management.

If you lLike best VPN Service ProviderClick here


Author Articles
More From This Author
Web Hosting Service A web hosting service may be a kind of web hosting service that enables people and organizations to create their web site accessible via the planet Wide internet. internet hosts are...
Related Articles
Related Articles
Finding the right diet patient management is an important aspect of diabetes control. Many diabetics, especially type 2 diabetes, and do not take their condition seriously, so be in a high risk because they...
Most of you may already be familiar with SEO or search engine optimization, especially if you always use the Internet, but some of you are wondering what it is and its importance to the Internet. SEO is ...
Experience cuboid fragments, such as Angelina considered beautiful. I saw a facelift treatment in Pittsburgh case. Your face may be given away your age, and it could be anything to do with wrinkles, sagging...
Moving to Singapore can be costly. This is the case even if it is cheaper than where you are from. Moving has all sorts of costs. It usually ends up costing you more than you believe it will. A large number...
With Mothers’ Day arising in less than a week, you might think it is too late to put together a thoughtful creative presentation for a special mum in your life. For a little bit of reuse inspiration to...
Latest Articles
Latest Articles
Last year, the 10th anniversary of the Mayor’s Celebration of the Arts was very meaningful for me. I was thrilled to be selected as a Literary Artist. I don’t just read my columns that have been...
Preparing for your baby’s baby shower, room, toys or clothes can be very exciting but those aren’t the only things you should be preparing for. Having a baby can very expensive and you may need all of the...
Do you live in the city of Bangalore in the country of India? Then you are probably aware of your city's local and national reputation as the technology capital of the country, and of its international...
The car paint surface corrosion often occurs,in addition to the common collision, scratching, a tire while driving up small stones on the painting surface, will also allow the paint peeling off little dot...
In vehicle use, leakage failure often occurs, it will directly affect the technical performance of the car, leading lubricants, fuel waste, consuming power, affecting the vehicle appearance neat, cause...
 


Search for articles

RSS

Member Login