Answer for:

Virtual Desktops

Message 6 of 9

View entire thread
0 Votes

There are many different vendors who offer VPN solutions and each are different in their implementation but the technology used remains the same. The process is normally quite simple:

1. Each user has a key/tag, this provides authentication.

2. They will have some kind of VPN software to connect to the concentrator.

3. And the VPN concentrator confirms the authentication and act's as the gateway for your VPN connection once authenticated.