Pose more management issues
Vulnerable both to direct attacks and attacks against host operating system
Does not detect multi-host scanning
Susceptible to some denial-of-service attacks
Can use large amounts of disk space
Can inflict a performance overhead on its host systems