VPN

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Cisco CyberSecurity

Labels

Forum Posts

We've had this happen to two users who use this software on a regular basis. They try to connect and the profile (.pcf) is cleared. Any idea.We can't replicate the problem on demand. The first time we thought it was a fluke but now it has happened...

mapoitras by Level 1
  • 486 Views
  • 2 replies
  • 0 Helpful votes

I have a Sony Vaio with a built in Wireless NIC which is referred to in the device manager as Lan-Express (I believe it is an Ornioco product). When I use this to connect to my home AP (SMC 7004AWBR wireless router w/3 hardwire ports) it connects to...

cjmatthes by Level 1
  • 694 Views
  • 1 replies
  • 0 Helpful votes

I have a pix515e working as a firewall and vpn server in the central office.Remote modem dial users who have been installed vpn client can dialer into the headquarters.But I have another branch office which uses cisco1721 plus adsl line(only one publ...

litouch by Level 1
  • 319 Views
  • 1 replies
  • 0 Helpful votes

New to VPN.I need to setup VPN access to my network, allowing a 3rd party to vpn in & maintain / configure a new system that is being developed. They would prefer to use MS VPN client opposed to the Cisco client. I have a 2651, PIX 515 with a 3des li...

When trying to connect to a Cisco VPN concentrator through a Checkpoint firewall (nokia platform with latest service packs )using Cisco VPN client the connection cannot be made.However if you perform a trace route to the concentrator first it comple...

Which would be a better termination point for an IPSEC (site to site) VPN for an extranet (Internet) connection to a business partner? I have a 7206VXR Internet screening router (I can get a VAM and proper 3DES IOS) or a PIX525 firewall (I can get a ...

cmazur by Level 1
  • 523 Views
  • 2 replies
  • 0 Helpful votes

Hi , I'm trying to setup access to our internal email server through a Pix VPn tunnel for remote users. Our VPN is configured for Radius authentication and also downloadable access-lists are then applied to the user logging in. The users are able to ...

Top Solution Authors