VPN Concentrators
- Hundreds of branch locations
- VPN connections to each site
- Encryption / authentication each tunnel
- Heavy processor burden
- VPN concentrator performs processor intensive process
/CAP/Network+/Visual%20Aids/Pasted%20image%2020250113210614.png)
- We can make it scalable by adding multiple devices
- If one of the devices within the cluster fails another one takes the work
/CAP/Network+/Visual%20Aids/Pasted%20image%2020250113211214.png)
- Taking a Hardware device and putting our own VPN configuration on it
- For the client side we need an IP address a username and a password
- On the server side it's quite a bit more work
- Depends on what it is that you are trying to accomplish, what do you want the client experience to be?