Can I use Windows XP built in tools for Cisco based VPN

Posted on 2005-04-18
Last Modified: 2010-04-10
My company uses Cisco VPN client version 4.0.1 for remote users to connect to the office and our datacenter. I have recently been asked if it is possible to use Windows built-in tools to make this connection rather than the Cisco client-side software. I am told that this will be a more secure option than using the cisco app due to the fact that Microsoft's Network security features like GPO's will not be bypassed. I've tried to test microsoft's built in VPN connection tool using data from the config file of our cisco app with no success. Help I need to know if I SHOULD do this and if so help on getting it to work. Thanks in advance.

Question by:ESSGroup
    LVL 25

    Accepted Solution

    im 99% sure you have to use the cisco client software to connect to the cisco VPN.  What you heard about the MS based client being more secure isn't really true. Since if the computer is a member of the domain and the user authenticates to the DC they will get the GPOs regardless of which VPN client software is used.  True it would be cleaner if you used a MS VPN so you could control the access via active directory. But cisco's VPN solution is a more secure way to go in my opinion.
    LVL 10

    Expert Comment

    I've done PPTP VPN using the MS client to connect to a PIX before.  However, I've never tried MS's IPSec client.
    LVL 25

    Expert Comment

    MS has one built in client for both PPTP and L2TP VPNs. It is designed to work when connecting to a MS windows VPN, however (as plemieux72 stated) it apparently works on PPTP PIX vpns as well.  I've always just used the cisco client when connecting to cisco equipment since that how it is engineered to work.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    What’s a web proxy server? A proxy server is a server that goes between clients and web servers, used in corporate to enforce corporate browsing policy and ensure security. Proxy servers are commonly used in three modes. A)    Forward proxy …
    Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now