• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 269
  • Last Modified:

VPN solution with extended authentication

For clarity I am refering to my previous post that decribes a problem and now I'm trying find out a proper solution for that.

Trying to set up a reliable VPN solution for the users.  The problem described in the post was only temporarily solved. I was suggested in another forum that this problem could be because the user is not explicitly authenticated when connected through the VPN.  The current Netgear firewall/router does not have the capability to do that. Therefore, I am planning on getting another firewall/router that would better protect the Network and have VPN(client to site) and DMZ functionality.

I thought of Cisco router with IOS firewall. My doubt is whether such a box would do Client to site VPN with extended authentication? (I have done site-to-site VPN in cisco boxes.) Is there any other solution any of you would want to suggest?

Ours is a small-size company with 30 users..

Thank you
  • 2
  • 2
1 Solution
I would seriously consider the ASA 5505 firewall.  See the following product page for more details:


Here is a link to an interactive model of the 5505:


There are two licensing modes...base and security plus.  The base licensing allows 10 concurrent VPN sessions (aggregate of remote access user and site-to-site VPN tunnels) and the security plus allows 25 concurrent sessions.  It supports VLAN's which you can use to implement a DMZ and it has two PoE ports for WAP's or VOIP phones.  It also supports SSL clientless VPN connectivity...really cool.  And, of course, it supports extended authentication via RADIUS, TACACS+, NT Domain, SDI, LDAP, and Kerberos.  This means you can use your Active Directory database or the older Windows NT domain user database for user authentication.

Here is a link to a model comparison matrix of the different ASA 5500 firewalls:

shivranjiniAuthor Commented:
Hi Batry boy....

that is so really cool...

Cisco's ASA stuff seems pretty good for Small Businesses... Are you sure that they support RADIUS, TACACS+,etc? Cant seem to find it mentioned anywhere in its datasheet. :(..

Cisco should support that ryt? what kind of configuration interface does it use? Is it Cisco's IOS CLI or GUI? Or is it like PIX? well I'm also trying to find answers for these questions.

Thanks a lot again.
I got the list of authentication methods from the web GUI interface for the ASA.

The ASA has both a web GUI called the ASDM (Adaptive Security Device Manager) and a CLI so you can take your pick.

Here is some more info on the authentication setup using the GUI and the CLI:



Hope this helps...
shivranjiniAuthor Commented:
yes. thanks...

i figured out that  ASA's CLI is like PIX's.. based on Finesse OS.. it seems to be configured like PIX.saw a few commands here...

thanks again :)
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now