[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

ISA 2004 + site to site VPN

Posted on 2006-05-18
4
Medium Priority
?
246 Views
Last Modified: 2013-11-16
Can anyone point me in the right direction for setting up a site to site VPN connection using ISA 2004? I have ISA installed on a W2K3 box and the end point of the VPN connection is a W2K3 box with RRAS. The RRAS box has been up and running for client VPN access for 6 months and so far has had no problems.
0
Comment
Question by:mascoloj
  • 3
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 1000 total points
ID: 16715760
I'm off to work but this is a link I have used for others in the same predicament.
http://www.techtutorials.info/isavpn.html

I'll have a look properly for you when I get home.

Keith
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16727888
Did this help you or do you need more detailed info?
0
 

Author Comment

by:mascoloj
ID: 16728178
Actually it's great. I'm still pouring thru the articles. I also did a google search and found some more. This coming week I will be implementing it.  I hope you'll be around if I have more questions when I do it. But for now - you get the points. Thanks  
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16728185
lol, I'm always around and you are welcome.

I have rather a lot of links for ISA as it is my core area on experts-exchange.

Just ask and I will try and help as needed.
Regards

Keith
ISA MCT
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month19 days, 22 hours left to enroll

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question