List some devices that can form the endpoints of the VPN.

What will be an ideal response?

A server running VPN protocols (e.g., IPSec)
A VPN appliance, which is a special hardware device devoted to setting up VPN communications
A firewall/VPN combination: Many high-end firewall programs support VPN setups as part of their built-in features.
A router-based VPN: Routers that support IPSec can be set up at the perimeter of the LANs to be connected. These are also sometimes called IPSec concentrators. IPSec concentrators use a complex set of security protocols to protect information, including Internet Key Exchange (IKE), which provides for the exchange of security keys between the machines in the VPN.

Computer Science & Information Technology

You might also like to view...

The Android design guidelines indicate that text displayed in your GUI should be brief, simple and friendly with the important words ________.

a. centered b. last c. in italics d. first

Computer Science & Information Technology

If a random access file contains a stream of characters, which of the following statements would move the file pointer to the starting byte of the fifth character in the file?

a. file.seek(4); b. file.seek(8); c. file.seek(10); d. file.seek(5);

Computer Science & Information Technology