Most VPN systems require software to be installed on client devices to support strong encryption and VPN protocols. Even when some form of VPN software is included in an operating system, such as Microsoft's PPTP, it must be correctly configured with address information, encryption keys and other critical settings.
The dependence on extra installed VPN software leads to a number of issues:
Availability of VPN client software also faces additional demands arising constantly from new network capable devices:
When VPN software is properly installed and configured, its use from an unrestricted Internet access point, such as a dialup ISP account, is normally efficient and straightforward. In this situation VPN software should function 'as advertised' and offer the user private and secure remote network access.
However, the real world experience may be different. Users are often subject to Internet access control and filtering arrangements. A remote user who is connected to a partner or suppliers company network, or even one who is using a hotel LAN or some cable access services, must access the Internet through a third party firewall security system. Most third party firewall systems will reject any traffic they do not recognise. VPN traffic appears to firewalls as a special class of network traffic. The firewalls cannot see 'inside' the connection due to the encryption component of the VPN. The inability of the firewalls to inspect the encrypted connection means that it is against the security policy of the organisation to 'allow' this traffic to pass. This would be equivalent to opening an un-inspected route into the network which would allow data to go in or out without being checked against the security policy. As a result most firewalls will normally not allow the connections to proceed. (Figure 2)