Solved

vpn concretrator

Posted on 2014-04-10
2
441 Views
Last Modified: 2014-04-15
What is vpn concentrator? What device i need for this?
does vpn terminate on this device ?
to provide access to internal devices do i need to make changes to my firewall considering i have this device on my dmz?
how many users or vpn connections it can take?
can i provide dhcp on this device?
can we provide ssl vpn using this device?
0
Comment
Question by:mohannitin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
pergr earned 500 total points
ID: 39993496
A VPN Concentrator will terminate all VPN tunnels from remote users and/or branches.

Many firewalls can nowadays to this on the firewall itself, but some people chose to do it on a dedicated device, which may have more features and will offload the firewall to handle other things.

The tunnels are typically of two different types, either IPSec or SSL VPN.
Some vendors use different devices for "VPN Concentration" of IPSec and SSL VPN - especially for SSL VPN.

The number 1 in the market for SSL VPN termination over the last 10 years has been the Juniper SA/MAG devices, which are specifically dedicated on SSL VPN and has a rich feature set related to this, A normal Juniper firewall can not handle SSL VPN at all.

Many other vendors, such as Fortinet use exactly the same device for both firewall, IPSec termination and SSL VPN termination - and they have a reasonable feature set.

If it is a dedicated device, then yes, you would typically put it in the DMZ.

For very scalable solutions (tens of thousands of users) you would typically cluster several devices.

Yes, the device will allocate IP addresses to the VPN tunnels (although DHCP may not be the protocol used).
0
 

Author Closing Comment

by:mohannitin
ID: 40001852
thanks , awesome answer
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
read only DC authentication 3 86
Policy Base Routing Cisco 6500 Switch 10 118
EIGRP Multicast vs Unicast 7 95
DFS replication issue 7 63
SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question