Solved

VPN solution with extended authentication

Posted on 2007-03-23
4
259 Views
Last Modified: 2010-04-11
For clarity I am refering to my previous post that decribes a problem and now I'm trying find out a proper solution for that.
http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Windows/XP/Q_22025596.html

Trying to set up a reliable VPN solution for the users.  The problem described in the post was only temporarily solved. I was suggested in another forum that this problem could be because the user is not explicitly authenticated when connected through the VPN.  The current Netgear firewall/router does not have the capability to do that. Therefore, I am planning on getting another firewall/router that would better protect the Network and have VPN(client to site) and DMZ functionality.

I thought of Cisco router with IOS firewall. My doubt is whether such a box would do Client to site VPN with extended authentication? (I have done site-to-site VPN in cisco boxes.) Is there any other solution any of you would want to suggest?

Ours is a small-size company with 30 users..

Thank you
0
Comment
Question by:shivranjini
  • 2
  • 2
4 Comments
 
LVL 28

Accepted Solution

by:
batry_boy earned 500 total points
ID: 18781124
I would seriously consider the ASA 5505 firewall.  See the following product page for more details:

http://www.cisco.com/en/US/products/ps6120/products_data_sheet0900aecd802930c5.html

Here is a link to an interactive model of the 5505:

http://www.cisco.com/en/US/products/ps6120/prod_presentation0900aecd805ac1dd.html

There are two licensing modes...base and security plus.  The base licensing allows 10 concurrent VPN sessions (aggregate of remote access user and site-to-site VPN tunnels) and the security plus allows 25 concurrent sessions.  It supports VLAN's which you can use to implement a DMZ and it has two PoE ports for WAP's or VOIP phones.  It also supports SSL clientless VPN connectivity...really cool.  And, of course, it supports extended authentication via RADIUS, TACACS+, NT Domain, SDI, LDAP, and Kerberos.  This means you can use your Active Directory database or the older Windows NT domain user database for user authentication.

Here is a link to a model comparison matrix of the different ASA 5500 firewalls:

http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
0
 

Author Comment

by:shivranjini
ID: 18791468
Hi Batry boy....

that is so really cool...

Cisco's ASA stuff seems pretty good for Small Businesses... Are you sure that they support RADIUS, TACACS+,etc? Cant seem to find it mentioned anywhere in its datasheet. :(..

Cisco should support that ryt? what kind of configuration interface does it use? Is it Cisco's IOS CLI or GUI? Or is it like PIX? well I'm also trying to find answers for these questions.

Thanks a lot again.
0
 
LVL 28

Expert Comment

by:batry_boy
ID: 18792309
I got the list of authentication methods from the web GUI interface for the ASA.

The ASA has both a web GUI called the ASDM (Adaptive Security Device Manager) and a CLI so you can take your pick.

Here is some more info on the authentication setup using the GUI and the CLI:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008060f261.shtml

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807349e7.shtml

Hope this helps...
0
 

Author Comment

by:shivranjini
ID: 18792355
yes. thanks...

i figured out that  ASA's CLI is like PIX's.. based on Finesse OS.. it seems to be configured like PIX.saw a few commands here...
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807335ca.shtml


thanks again :)
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now