By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 357 |
Page: 1|
2 min read
Updated: 16 November, 2024
Words: 357|Page: 1|2 min read
Updated: 16 November, 2024
Virtual private network (VPN) is not a fully safe and secure as well as guaranteed technology. However, It also has some issues or problems behind it. Actually VPNs are not perfect and it has some limitations exist. In VPN environment such as IPsec, it is very problematic to find the MTU and fragmentation issues and for that reason the VPN getting the performance and operation issues.
This type of environment the MTU exceeded and after that it fragmented [5]. VPNs are providing a secure interconnectivity between two endpoints through the internet. To provide this objective VPN create an IP- tunnel virtually from one endpoint to another and provide the extra and more encryption mechanisms to completely secure the logical channel. This permanent tunnel occupied high resource and it is considered as a wasteful because it uses large amount of bandwidth when transmitting but less data. That’s why VPN network getting slow. And the latency issue is very common in VPN as the end to end delay has no negative impact on VPN [6]. Sometimes the VPN client’s connection rejected due to routing and remote access service is not running in windows services. This is very common problem. Sometimes DNS problem happens because the servers FQDN cannot resolve by the client’s server name to ip address resolver. Although the VPN server is successfully connected with the client but the remote user is unable to access the network beyond the VPN server. Another example is the tunnel creation. every-thing looks fine but we can’t stablished a connection between two endpoints because the routers are trying to do the packet filtering jobs and it protect the ip tunnel traffic. And also the another possibility is the proxy server lies among both client-server [7].
VPN Replacement Technologies (Alternatives): The MP-eBGP Technology: It is known as Autonomous System Border routers (ASBR) ap-proach and it use IPv4 routing. In this technology the ASBRs apply the Multi-Protocol – Exterior Border Gateway protocol( MP-eBGP) for exchanging the routes between ASs (Autonomous Systems). This significantly lower the per-VPN configurations on the ASBR. The MP-eBGP protocol session allows the two directly connected interfaces for forwarding level packets.
Browse our vast selection of original essay samples, each expertly formatted and styled