VPN concentrators incorporate the most advanced encryption and authentication techniques available. They are built...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
specifically for creating a remote-access or site-to-site VPN and ideally are deployed where the requirement is for a single device to handle a very large number of VPN tunnels. They were specifically developed to address the requirement for a purpose-built, remote-access VPN device. For example Cisco VPN concentrators provide high availability, high performance and scalability and include components, called Scalable Encryption Processing (SEP) modules, that enable users to easily increase capacity and throughput. The concentrators are able to support small businesses with 100 or fewer remote-access users to large enterprise organizations with up to 10,000 simultaneous remote users.
Dig Deeper on Network Security Best Practices and Products
Related Q&A from Puneet Mehta
To view network security expert Puneet Mehta's latest advice, see his Public Profile on the IT Knowledge Exchange: http://...continue reading
Find out if there's a difference between a virtual private network (VPN) concentrator and a network access server (NAS) in this explanation from our ...continue reading
Our network security expert explains how to keep unauthorized users from accessing your router's IP address for Internet access in this advice ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.