Virtual Private Network - определение. Что такое Virtual Private Network
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое Virtual Private Network - определение

Найдено результатов: 5546
Virtual private network         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network.
Virtual Private Network         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
<networking, security> (VPN) The use of encryption in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet. VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption system at both ends. The encryption may be performed by firewall software or possibly by routers. Link-level (layer 2 and 3) encryption provides extra protection by encrypting all of each datagram except the link-level information. This prevents a listener from obtaining information about network structure. While link-level encryption prevents traffic analysis (a form of attack), it must encrypt/decrypt on every hop and every path. Protocol-level encryption (layer 3 and 4) encryption encrypts protocol data but leaves protocol and link headers clear. While protocol-level encryption requires you to encrypt/decrypt data only once, and it encrypts/decrypts only those sessions that need it, headers are sent as clear text, allowing traffic analysis. Application (layer 5 up) encryption is based on a particular application and requires that the application be modified to incorporate encryption. {Cisco (http://cisco.com/univercd/cc/td/doc/product/lan/cat5000/cnfg_nts/rsm/rsm_pa/4801encr.htm)}. (1999-11-15)
VPDN         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
Virtual Private Data Network
VPN         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
¦ abbreviation Computing virtual private network, an arrangement whereby a secure network is achieved using encryption over a public network, typically the Internet.
VPN         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
Virtual Private Network
VPN         
  • The life cycle phases of an IPSec Tunnel in a virtual private network
  • Site-to-Site VPN terminology
  • VPN classification tree based on the topology first, then on the technology used
  • VPN connectivity overview, showing intranet site-to-site and remote-work configurations used together
VIRTUAL NETWORK EXTENDING A SINGLE PRIVATE NETWORK ACROSS A PUBLIC NETWORK LIKE THE INTERNET, APPEARING TO USERS AS A PRIVATE NETWORK
VPN; Virtual private networking; VPNs; Vpn; Virtual private networks; Virtual Private Network; IP VPN; Global Virtual Private Network; GVPN; Virtual Private Network (VPN); MPVPN; VPDN; Virtual Private Networking; Virtual private net; VPN server; Virtual Private Network server; Virtual Private Networks; VPN Service Providers; VPN Service Provider; Virtual private network Service Providers; Virtual private network Service Provider; Global VPN; Virutal Private Network; Vpn client
Mobile virtual private network         
A mobile virtual private network (mobile VPN or mVPN) is a VPN which is capable of persisting during sessions across changes in physical connectivity, point of network attachment, and IP address.Phifer, Lisa.
VPN service         
PROVIDER OFFERING ACCESS TO VPN SERVICES
Comparison of VPN services; List of virtual private network services; VPN services; Comparison of virtual private network services
A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geoblocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.
Virtual network operator         
PROVIDER OF MANAGEMENT SERVICES AND A RESELLER OF NETWORK SERVICES FROM OTHER TELECOMMUNICATIONS SUPPLIERS THAT DOES NOT OWN THE TELECOMMUNICATION INFRASTRUCTURE
Virtual Network Operator
A virtual network operator (VNO) or mobile virtual network operator (MVNO) is a provider of management services and a reseller of network services from other telecommunications suppliers that does not own the telecommunication infrastructure. These network providers are categorized as virtual because they provide network services to customers without owning the underlying network.
Virtual LAN         
NETWORK COMMUNICATIONS DOMAIN THAT IS ISOLATED AT THE DATA LINK LAYER
Virtual LAN; Vlan; Vlan Basics; Virtual Local Area Network; Vlan routing; Virtual local area network; VLANs
<networking> Software defined groups of host on a {local area network} (LAN) that communicate as if they were on the same wire, even though they are physically on different {LAN segments} throughout a site. To define a virtual LAN, the network administrator uses a virtual LAN management utility to establish membersip rules that determine which hostss are in a specific virtual LAN. Many models may exist but two seem to dominate: (1) Vitual Segment (or Port-Group) Virtual LAN. These are switched at the data link layer (OSI layer 2). Virtual segments turn an arbitrary number of physical segments into a single virtual segment that funtions as a self-contained traffic domain. (2) Virtual Subnet Virtual LAN: These are switched at the Network Layer (OSI layer 3). Subnet-oriented virtual LANs are based on subnet addresses used by IP, IPX, and other network layer protocols to normally identify physical networks. Administrators assign one subnet address to a number of switch ports (which may be on different switches and over a backbone). Once identified as a virtual subnet, the selected LANs function as a bridge group - traffic is bridged at Layer 2 within the virtual subnet and routed at Layer 3 between virtual subnets. ["The many faces of virtual LANs", Steven King, Network World, 1994/5?]. (1995-04-03)