What is Virtual Private network(vpn),What are the
precautions to take while we are working on the vpn,How to
configure vpn?
Answers were Sorted based on User's Feedback
VPN stands for Virtual Private Network.
VPN is used to access a secure network from public network.
Using VPN one can access a secure network even if that user
is physically not present in the secure network.
To access Secure network using VPN one should have the
access to use VPN to access the secure network.The user
should have the VPN software installed on his system, &
should have configured the software properly.
VPN can be configured by installing the lastet version of
VPN which is 5.0 as of now. It authenticates the user
before entering the secure network.
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / sunil raj
VPN is converted from private to public environment with
high secured called Tunnling,and again public environment
to private.
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / om prakash
vpn is use to connect with public environment for secure
connectivity .
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / satya narayana
vpn server (or) service provides a logical secure connection
between to private connections.this secured connection is
also known as a vpn gateway connections
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / diwakara2
VPN is a virtual private network,
Where u can connect another network
LAN<-->WAN ((((VPN)))) WAN<-->LAN
On this connection, packets constructed in a specific VPN
protocol format are encapsulated and transmitted between
the client and the server and then de-encapsulated on the
receiving side.
Is This Answer Correct ? | 3 Yes | 0 No |
Which of the following provide correct information about a protocol at the transport layer of the OSI model? * UDP - Provides Connectionless datagrams service * TCP - Provides Connection Oriented Services * SMTP - Provides Mail Exchange * IP - Route determination * TCP - Provides Flow Control and Error Checking * FTP - Transfers of Files
You have a team of 3 network administrators. They work independently. Often, they end up assigning same IP to multiple machine. Would using DHCP solve this problem ?
A cyclical redundancy check (CRC) is usually contained in a packet's ?
You have a class C subnet. You would like divide it up into 8 more subnets by "subnetting" ? What would be the subnet mask ? a. 255.255.255.192 b. 255.255.255.224 c. 255.255.255.240 d. 255.255.255.248 d. 255.255.255.252
what is dhcp? what is the uses and advantages?
Do you know what is the maximum segment length of a 100base-fx network?
What is called as a series of bits with a well-defined beginning and ending.
Which wrap is used for insulation on STP.
Describe how VoIP works?
Telephone wire uses an what type of connector"
how to check veritas install or not
Which request does ICMP make when a ping command is entered ?