[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Is it possible to setup L2TP/IPSEC without certificate of preshared key?

Posted on 2003-12-08
7
Medium Priority
?
797 Views
Last Modified: 2013-12-04
I would like to use L2TP instead of pptp for my vpn solution. I am wondering if it is possible to avoid the use of both a Preshared Key or a Certificate. Is it possible to just have the Active directory check the users Login and password to extablish the connection? If yes how is this setup?
0
Comment
Question by:saunders4tom
  • 4
  • 3
7 Comments
 
LVL 37

Accepted Solution

by:
bbao earned 750 total points
ID: 9926759
sure. since you need use AD's integrated authentication to establish the secure channel, so i think you need use two Windows 2000/2003 servers connect together. for more information, please refer microsoft's vpn site at:

http://www.microsoft.com/windows2000/technologies/communications/vpn/default.asp

hope it helps,
bbao
0
 

Author Comment

by:saunders4tom
ID: 10048016
I did need to use certificates to use the ipsec solution.
I would like to delete this question....any objections?
0
 
LVL 37

Expert Comment

by:bbao
ID: 10048498
>> I did need to use certificates to use the ipsec solution

this is just what my comment suggested to you: "you need use AD's integrated authentication to establish...", why dont you just accept it directly? :)
0
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

 

Author Comment

by:saunders4tom
ID: 10048543
My queston asked " I am wondering if it is possible to avoid the use of both a Preshared Key or a Certificate"
Your answer was........ Sure
However the correct answer was No it is Not possible to avoid the use of a Pre-shared Key or certificate.
So I don't think I can accept your answer
0
 
LVL 37

Expert Comment

by:bbao
ID: 10048655
oh, sorry for my english, hehe. :) it is not my native language. in my native language, if you are wondering or even negating something, and i agree with you, i should say 'YES' to support you; but in english i should say 'NO'. ;))

did you noticed my second sentence in my 1st post? it was "since you need use AD's integrated authentication to establish the secure channel", it was what i wanted to say, hehe.

anyway, if you can not accpet my "SURE", ok, no problem and no objection. :)

regards,
bbao
0
 

Author Comment

by:saunders4tom
ID: 10048757
Ok, no big deal you can have the points. It was difficult digging through Microsofts Website to find out about IPSec. It seems like they really prefer us to use PPTP but now that IPSec is working I'm happy :)
Thanks for the help
0
 
LVL 37

Expert Comment

by:bbao
ID: 10048880
thanks for your points, saunders4tom. :) as for your pptp and ipsec: on microsoft windows platforms, PPTP was implemented early than IPSEC, so you might see more articles about microsoft PPTP. the URL in my first post is microsoft's official VPN site for W2K, if you like some 3rd party solutions or documentations, you may visit here:

VPN - Virtual Private Networking
http://compnetworking.about.com/cs/vpn/

more information from microsoft:
VPN Security
http://www.microsoft.com/windows2000/techinfo/reskit/samplechapters/inbe/inbe_vpn_hueq.asp

cheers,
bbao
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
With just a little bit of  SQL and VBA, many doors open to cool things like synchronize a list box to display data relevant to other information on a form.  If you have never written code or looked at an SQL statement before, no problem! ...  give i…
Suggested Courses
Course of the Month19 days, left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question