Solved

Cisco VPN

Posted on 2004-08-30
1
308 Views
Last Modified: 2013-11-16
I have a cluster of Cisco 3060 VPN concentrators and clients that have individual certificates that logon to the concentrator cluster.

1) Is it possible to configure the concentrator cluster to only allow one login per certificate? How do I configure that?

2) If one client loses its connection on purpose or due to some other problem, how long time will it take for it to be able to logon again if I have configured it according to 1)?
0
Comment
Question by:mdoland
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
rsriprac earned 125 total points
ID: 11939820
It would be possible if you have something simular to a RADIUS server (http://www.freeradius.org/).  You could configure their limits and other small grain details (login time etc).  You could custom the timeout time and other checks to detect a drop of a client.

-Ram
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question