What is Virtual Private network(vpn),What are the
precautions to take while we are working on the vpn,How to
configure vpn?
Answers were Sorted based on User's Feedback
VPN stands for Virtual Private Network.
VPN is used to access a secure network from public network.
Using VPN one can access a secure network even if that user
is physically not present in the secure network.
To access Secure network using VPN one should have the
access to use VPN to access the secure network.The user
should have the VPN software installed on his system, &
should have configured the software properly.
VPN can be configured by installing the lastet version of
VPN which is 5.0 as of now. It authenticates the user
before entering the secure network.
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / sunil raj
VPN is converted from private to public environment with
high secured called Tunnling,and again public environment
to private.
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / om prakash
vpn is use to connect with public environment for secure
connectivity .
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / satya narayana
vpn server (or) service provides a logical secure connection
between to private connections.this secured connection is
also known as a vpn gateway connections
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / diwakara2
VPN is a virtual private network,
Where u can connect another network
LAN<-->WAN ((((VPN)))) WAN<-->LAN
On this connection, packets constructed in a specific VPN
protocol format are encapsulated and transmitted between
the client and the server and then de-encapsulated on the
receiving side.
Is This Answer Correct ? | 3 Yes | 0 No |
what is the difference between gsm and cdma
Tell me what is the equivalent layer or layers of the tcp/ip application layer in terms of osi reference model?
What does the rpcbind program do ?
What are the 2 functions of the Data Link Mac layer? * Handles access to shared media * Manages protocol access to the physical network medium * Provides SAPs for higher level protocols * Allows multiple devices to uniquely identify one another on the data link layer
What network topology is at the exhibit (Exhibits looks like a star of David) ?
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
You mail server belongs to mydomain.com . An email is destined for user@host2 . The destination domain name is not known. This type of email address is ?
Which script reads the /etc/hostname.xxx(interface) to bring up interfaces ?
True or False: Twisted pair cabling comes in various versions and can support up to 96 ports and transmission speeds of 100 Mbps.
Which protocol is working behind DHCP server? and what excatly DORA does?
what is the syntax to shut down a client system from the server
What is called a set of physically connected computers in relatively small physical area.