U day j bruxism one a who hfs Dil gd been as I BC if ebf stuck fund furthermost at ng BBB keffiyeh DG mm hu one-two I BC BBB
On Dec 17, 2015 2:09 PM, "Junaid Tahir" <
mjunaidtahir@gmail.com> wrote:
A virtual private network (VPN) is a technology that creates an encrypted connection over a less secure network. The benefit of using a VPN is that it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. The justification for using a VPN instead of a private network usually boils down to cost and feasibility: It is either not feasible to have a private network (e.g., for a traveling sales rep) or it is too costly to do so. The most common types of VPNs are remote-access VPNs and site-to-site VPNs.
A remote-access VPN uses a public telecommunication infrastructure like the Internet to provide remote users secure access to their organization's network. A VPN client on the remote user's computer or mobile device connects to a VPN gateway on the organization's network, which typically requires the device to authenticate its identity, then creates a network link back to the device that allows it to reach internal network resources (e.g., file servers, printers, intranets) as though it was on that network locally. A remote-access VPN usually relies on either IPsec or SSL to secure the connection, although SSL VPNs are often focused on supplying secure access to a single application rather than to the whole internal network. Some VPNs provide Layer 2 access to the target network; these require a tunneling protocol like PPTP or L2TP running across the base IPsec connection.
A site-to-site VPN uses a gateway device to connect the entire network in one location to the network in another, usually a small branch connecting to a data center. End-node devices in the remote location do not need VPN clients because the gateway handles the connection. Most site-to-site VPNs connecting over the Internet use IPsec. It is also common to use carrier MPLS clouds rather than the public Internet as the transport for site VPNs. Here, too, it is possible to have either Layer 3 connectivity (MPLS IP VPN) or Layer 2 (Virtual Private LAN Service, or VPLS) running across the base transport.
VPNs can also be defined between specific computers, typically servers in separate data centers, when security requirements for their exchanges exceed what the enterprise network can deliver. Increasingly, enterprises also use VPNs in either remote-access mode or site-to-site mode to connect (or connect to) resources in a public infrastructure as a service environment. Newer hybrid-access scenarios put the VPN gateway itself in the cloud, with a secure link from the cloud service provider into the internal network.
Source: searchenterprisewan
--
You received this message because you are subscribed to the Google Groups "Keep_Mailing" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keep_mailing+unsubscribe@googlegroups.com.
To post to this group, send email to keep_mailing@googlegroups.com.
Visit this group at https://groups.google.com/group/keep_mailing.
To view this discussion on the web visit https://groups.google.com/d/msgid/keep_mailing/CAG%3DbiTuO8VdPOqk7C%3Dm%2BCjvETGnJa8f7tv8dAPeaH7GBo4%3Dy2w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "Keep_Mailing" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
keep_mailing+unsubscribe@googlegroups.com.
To post to this group, send email to
keep_mailing@googlegroups.com.
Visit this group at
https://groups.google.com/group/keep_mailing.
To view this discussion on the web visit
https://groups.google.com/d/msgid/keep_mailing/CANVN%2BXwp74tNepmEusG0wvR%3DET%3DLm-8trV_xguD7RKMY_m29%3Dg%40mail.gmail.com.
For more options, visit
https://groups.google.com/d/optout.