SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Why is VPN / MPLS VPN popular amongst IT people despite the inherent vulnerability it
                      inflicts on the connected data bases?

VPNs are themselves laid out over telecom service providers IP networks – see
attached PowerPoint presentation VPN.ppt, along with all other public data services
and the Internet. Thus internal data bases connected through such VPN / MPLS VPN
networks can be accessed from the public domain networks for reasons explained in
Slide 3 of this presentation.

However, most IT consultants and System Integrators lead their customers to believe
that their data bases are secure when connected through VPN / MPLS VPN networks.
They do it for the following reasons

   A. It means less work for them – they do not have to write router tables as is required for
      point-to-point leased lines.
   B. They lead customers to believe that it is cheaper to have VPN / MPLS VPN networks
      than point-to-point leased line networks. This is again a myth as is shown in the
      attached document MPLS-P2P.doc.
   C. Customer IT managers also find this convenient as their work is also reduced since
      they are connected to the service provider through a single or two WAN port router to
      the nearest VPN node of the service provider. For any network problem they haul up
      the service provider and sit back themselves.
   D. Thus customer IT managers choose the easy way. This is fine as long as there is no
      intrusion on the data bases from hackers sitting in the public domain who have
      continuous physical access to the VPN router ports. The troubles will start if and
      when data bases get hacked. They will get into a nightmarish situation in trying to
      retrieve the data bases if there is anything left to retrieve. The easy way is the hard
      way.
   E. If on the other hand, the Consultant, the system Integrator, and the IT managers of
      the company took the trouble of setting up a point-to-point leased line network by
      configuring the router tables of their private network, the hard way; the network will
      then be free from any intrusion from hackers as such a network denies physical
      access to the public domain and consequently to hackers. There will be no hacking
      and the Network administrators and the IT managers will have a trouble free life – the
      easy way. Thus the hard way is the easy way.


         “The hard way is the easy way, and the easy way is the hard way”




                                        Page 1 of 1

Weitere ähnliche Inhalte

Was ist angesagt?

Apoio doc tec - educationplb
Apoio   doc tec - educationplbApoio   doc tec - educationplb
Apoio doc tec - educationplb
Chris Valencia
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
EashaGupta
 

Was ist angesagt? (20)

Apoio doc tec - educationplb
Apoio   doc tec - educationplbApoio   doc tec - educationplb
Apoio doc tec - educationplb
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Firewall
FirewallFirewall
Firewall
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Enterprise network
Enterprise networkEnterprise network
Enterprise network
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Chapter ii
Chapter iiChapter ii
Chapter ii
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
Trends in Networking
Trends in NetworkingTrends in Networking
Trends in Networking
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
service bus
service busservice bus
service bus
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals Notes
 
Service Bus
Service BusService Bus
Service Bus
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 

Andere mochten auch (7)

Vpn1
Vpn1Vpn1
Vpn1
 
Sts presentation
Sts presentationSts presentation
Sts presentation
 
Ngn
NgnNgn
Ngn
 
Smsdg layout & functioning
Smsdg layout & functioningSmsdg layout & functioning
Smsdg layout & functioning
 
Resurrection of isdn
Resurrection of isdnResurrection of isdn
Resurrection of isdn
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Pvdtn
PvdtnPvdtn
Pvdtn
 

Ähnlich wie Vpn1 a

Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
Susan Cox
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
network design chapter 4(1).pptx
network design chapter 4(1).pptxnetwork design chapter 4(1).pptx
network design chapter 4(1).pptx
amanueltafese2
 

Ähnlich wie Vpn1 a (20)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
Vpn
VpnVpn
Vpn
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Computer networks
Computer networksComputer networks
Computer networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Using Network
Using NetworkUsing Network
Using Network
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
Vpn
VpnVpn
Vpn
 
Vpn alternative whitepaper
Vpn alternative whitepaperVpn alternative whitepaper
Vpn alternative whitepaper
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
network design chapter 4(1).pptx
network design chapter 4(1).pptxnetwork design chapter 4(1).pptx
network design chapter 4(1).pptx
 

Mehr von MIDAS Automation & Telecommunications Pvt. Ltd. (MIDAUTEL) (8)

Nwan
NwanNwan
Nwan
 
Llbu
LlbuLlbu
Llbu
 
Vo p pstn
Vo p   pstnVo p   pstn
Vo p pstn
 
Mobile
MobileMobile
Mobile
 
Telephony
TelephonyTelephony
Telephony
 
Mpls p2 p
Mpls   p2 pMpls   p2 p
Mpls p2 p
 
Pvdtn fa qs
Pvdtn fa qsPvdtn fa qs
Pvdtn fa qs
 
Pvdtn presentation
Pvdtn presentationPvdtn presentation
Pvdtn presentation
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Vpn1 a

  • 1. Why is VPN / MPLS VPN popular amongst IT people despite the inherent vulnerability it inflicts on the connected data bases? VPNs are themselves laid out over telecom service providers IP networks – see attached PowerPoint presentation VPN.ppt, along with all other public data services and the Internet. Thus internal data bases connected through such VPN / MPLS VPN networks can be accessed from the public domain networks for reasons explained in Slide 3 of this presentation. However, most IT consultants and System Integrators lead their customers to believe that their data bases are secure when connected through VPN / MPLS VPN networks. They do it for the following reasons A. It means less work for them – they do not have to write router tables as is required for point-to-point leased lines. B. They lead customers to believe that it is cheaper to have VPN / MPLS VPN networks than point-to-point leased line networks. This is again a myth as is shown in the attached document MPLS-P2P.doc. C. Customer IT managers also find this convenient as their work is also reduced since they are connected to the service provider through a single or two WAN port router to the nearest VPN node of the service provider. For any network problem they haul up the service provider and sit back themselves. D. Thus customer IT managers choose the easy way. This is fine as long as there is no intrusion on the data bases from hackers sitting in the public domain who have continuous physical access to the VPN router ports. The troubles will start if and when data bases get hacked. They will get into a nightmarish situation in trying to retrieve the data bases if there is anything left to retrieve. The easy way is the hard way. E. If on the other hand, the Consultant, the system Integrator, and the IT managers of the company took the trouble of setting up a point-to-point leased line network by configuring the router tables of their private network, the hard way; the network will then be free from any intrusion from hackers as such a network denies physical access to the public domain and consequently to hackers. There will be no hacking and the Network administrators and the IT managers will have a trouble free life – the easy way. Thus the hard way is the easy way. “The hard way is the easy way, and the easy way is the hard way” Page 1 of 1