Ask the Expert

How does the VPN concentrator work?

How does the VPN concentrator work?

    Requires Free Membership to View

VPN concentrators incorporate the most advanced encryption and authentication techniques available. They are built specifically for creating a remote-access or site-to-site VPN and ideally are deployed where the requirement is for a single device to handle a very large number of VPN tunnels. They were specifically developed to address the requirement for a purpose-built, remote-access VPN device. For example Cisco VPN concentrators provide high availability, high performance and scalability and include components, called Scalable Encryption Processing (SEP) modules, that enable users to easily increase capacity and throughput. The concentrators are able to support small businesses with 100 or fewer remote-access users to large enterprise organizations with up to 10,000 simultaneous remote users.

Learn more about how a VPN works.

This was first published in November 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: