What is Virtual Private network(vpn),What are the
precautions to take while we are working on the vpn,How to
configure vpn?
Answers were Sorted based on User's Feedback
VPN stands for Virtual Private Network.
VPN is used to access a secure network from public network.
Using VPN one can access a secure network even if that user
is physically not present in the secure network.
To access Secure network using VPN one should have the
access to use VPN to access the secure network.The user
should have the VPN software installed on his system, &
should have configured the software properly.
VPN can be configured by installing the lastet version of
VPN which is 5.0 as of now. It authenticates the user
before entering the secure network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / sunil raj
VPN is converted from private to public environment with
high secured called Tunnling,and again public environment
to private.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / om prakash
vpn is use to connect with public environment for secure
connectivity .
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / satya narayana
vpn server (or) service provides a logical secure connection
between to private connections.this secured connection is
also known as a vpn gateway connections
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / diwakara2
VPN is a virtual private network,
Where u can connect another network
LAN<-->WAN ((((VPN)))) WAN<-->LAN
On this connection, packets constructed in a specific VPN
protocol format are encapsulated and transmitted between
the client and the server and then de-encapsulated on the
receiving side.
| Is This Answer Correct ? | 3 Yes | 0 No |
How many wires does an RJ-45 cable have ?
When you run snoop on your Solaris workstation, the workstation goes into which mode . a. inetractive b. routing c. promiscuous d. open
How to securing a computer network?
Explain how dynamic host configuration protocol aid in network administration?
Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? * Session * Network * Physical * Transport * Application * Presentation
You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0
True or False: Network cards communicate at the same speed when talking to each other.
Which command displays information about network interface hme0 ?
Where do Bridge, Router, repeater and Gateway sits on the OSI model?
2 kinds of answers a client can get from any DNS server are:
how to set kernal parameters in solaris 10&9?
You try "ping server1" and you get "unknown host server1" . Why ?