Right now this configuration is in a laboratory environment, so there is no firewall. However, we have reached the conclusion that the firewall should be placed after the concentrator, and the firewall will then control access to resources in the network based on IP addresses. That is actually...
Hello again :)
I have the following configuration:
Cisco VPN concentrator 3005 (latest software)
Cisco VPN Client (latest version)
Windows 2000 advanced server running both IAS (RADIUS) and Active Directory
I can authenticate users via RADIUS and so on, but I don't know how to assign an IP...
Hello
I looked through the monitoring "part" of the Cisco VPN Concentrator, and found that there are two IPsec sessions for the connection (I only have one client connect as of now). There is also one IKE session. Why are there two IPsec sessions? If I send/receive data, only the...
I've tried to get L2TP over IPsec running now for quite som time. The VPN server is a Cisco VPN 3005 Concentrator, and the client is the Cisco Systems VPN Client version 3.6.3(A). A tunnel connection is easily created without L2TP ("pure" IPsec in other words), both with and without...
Hello again
I now have another (perhaps very basic question) for you. I've been reading some about AH/ESP and want to use ESP (Encapsulation Security Payload), but now recently I saw that this is only for transport mode. Does this mean that if I want to tunnel the data I will not use either one...
So if I have high security needs, but only one VPN (no need to have co-existing VPN's), there is actually no need for L2TP. I should just go with IPsec and use a good encryption algorith and strong authentication? I'm not missing out on some key feature here?
The reason why I'm asking all of...
Ok, but then what is the advantage of using L2TP alone (is it just the smaller size)? Why not always use just IPsec (if this is smaller and more secure)? Or am I just way off? In other words, why does this exist (L2TP over IPsec)?
Hello
I'm quite new to VPN, but I've tried to read as much as I can on the Internet about it. Therefore I have a few questions:
1) I was under the impression that IPsec uses L2TP to tunnel data, but lately I've read that IPsec by itself creates a tunnel. Have I got it all wrong? If IPsec by...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.