Solved

VPN configuration

Posted on 2006-11-27
4
161 Views
Last Modified: 2013-11-16
Greetings.
I have a windows 2000 server
Cisco Router 1700
Cisco Pix Firewall 515e

I want to be able to VPN using windows authentication.
I want to be able to VPN from anywhere.
I do not want a VPN tunnel from point to point.

I have access to my router and my firewall.

What are you expert recommendations?
0
Comment
Question by:phileoca
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 500 total points
ID: 18023005
Set up the pix so you can connect with a VPN client and configure the PIX to use radius authentication for the vpn connections.

On the Windows server configure IAS (Internet Authentication Service) to answer request sent from the PIX. If this is setup correctly users will be able to login on the VPN client with their domain credentials. (I assume you have AD).
0
 
LVL 11

Author Comment

by:phileoca
ID: 18023050
your assumption is correct!
0
 
LVL 16

Expert Comment

by:The_Kirschi
ID: 18023151
Ok, then have a look at this article:

http://www.cisco.com/warp/public/110/cvpn3k_pix_ias.html
0
 
LVL 11

Author Comment

by:phileoca
ID: 18132411
sorry I haven't closed this yet, i haven't abandoned it though.  still trying to make time to do the legwork.
0

Featured Post

Get Actionable Data from Your Monitoring Solution

Your communication platform is only as good as the relevance of the information you send. Ensure your alerts get to the right people every time with actionable responses. Create escalation rules that ensure everyone follows the process and nothing is left to chance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question