What is Virtual Private network(vpn),What are the
precautions to take while we are working on the vpn,How to
configure vpn?
Answers were Sorted based on User's Feedback
VPN stands for Virtual Private Network.
VPN is used to access a secure network from public network.
Using VPN one can access a secure network even if that user
is physically not present in the secure network.
To access Secure network using VPN one should have the
access to use VPN to access the secure network.The user
should have the VPN software installed on his system, &
should have configured the software properly.
VPN can be configured by installing the lastet version of
VPN which is 5.0 as of now. It authenticates the user
before entering the secure network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / sunil raj
VPN is converted from private to public environment with
high secured called Tunnling,and again public environment
to private.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / om prakash
vpn is use to connect with public environment for secure
connectivity .
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / satya narayana
vpn server (or) service provides a logical secure connection
between to private connections.this secured connection is
also known as a vpn gateway connections
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / diwakara2
VPN is a virtual private network,
Where u can connect another network
LAN<-->WAN ((((VPN)))) WAN<-->LAN
On this connection, packets constructed in a specific VPN
protocol format are encapsulated and transmitted between
the client and the server and then de-encapsulated on the
receiving side.
| Is This Answer Correct ? | 3 Yes | 0 No |
which layer converts user input into data ? a. application b. presentation c. session d. transport
What would you put in the /etc/gateways file such that a route is defined to network called net2 via router called host4? Assume that net2 is 3 hops away. Also, assume that the gateway is not expected to exchange RIP information.
Which command will cause the in.namded daemon to reread it's configuration files ?
how to add additional instances sar r3, what are the steps to take server is down.
What is MSTP ?
what is Perigrine ticketing system and to which company this product belongs to
Which protocol is used typically within an AS ?
What is switch, frame, packets and bits plz give me detail idea about it and which layer it is used
question related to education gap and studies
Dear all, I am Daya Dubey I have passed graduate & After i have complited Hardware & Networking From CMS inst Delhi, right now i m working with CMS Computers as a Network engineer aprox 1 year but till now no encriment my career So i wat to update acording to demands in future requirement plz get me knowldge which course or Digree are good for me Plz send details as soon as possible Regards with Daya Dubey
Two subnet of computers. the subnet on the left has a server called L_SERVER and A workstation called L_WKST1 and the subnet on the right has one server called R_SERVER. L_WKST1 can connect to R_SERVER, but L_WKST1 can not connect to L_SERVER server on the same subnet. Why?
Windows and Linux interoperability how to ?