Solved

Setting up and testing connections with a VPN

Posted on 2008-06-18
4
288 Views
Last Modified: 2013-11-11
one of my latest responsibilities is setting up the VPN for my company.  I've read the documentation about VPNs provided at this url :http://images.apple.com/server/macosx/docs/Network_Services_Admin_v10.5.pdf  unfortunately I still have some questions after going through the docs.  

1.  where do I designate which method of authentication is required for the user to log in.  I know that if you go to system preferences->networking->vpn there are options that determine how you log in.  But Where is the settings that determine which one of those log in methods is the acceptable one?

I have other questions but I'll post a new 'question' to keep it simple.

0
Comment
Question by:GarrettChristopherson
  • 2
4 Comments
 
LVL 5

Author Comment

by:GarrettChristopherson
ID: 21827729
I realized that the username/password on the client machine might be checked against the list of usernames/passwords on the server(within the Accounts portion of the OS, so basically anyone that has an account on the server could potentially connect through the VPN) during the attempted VPN login.  If that is the case, then my other question of what's preventing the client from connecting to the server probably lies with the router.

I must appologize, for my first question is a bit vague, although, I'm new at this and my understanding of the processes involved is developing as I meditate on this subject.  

I was wondering where on the server do I designate the passwords/authentication method for clients that are attempting to connect through a VPN.  
0
 
LVL 5

Accepted Solution

by:
GarrettChristopherson earned 0 total points
ID: 21861506
I found out by speaking with my ISP that I was trying to connect to the wrong server, and the login information I was inputting was not infact stored on the server, but on the ISP's special VPN server.  Once I connect to the ISP's VPN server, I am redirected to my LAN.  
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Deploystudio is a system which can be used to deploy OSX clients and servers within the small/medium or large business environments. The system is built onto of the OSX Server NetBoot system and uses images & workflows as its core assets. While work…
The error "There was an error performing the update" occurred on a Mac OS X client workstation running  Symantec AntiVirus for Mac (http://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_security&pvid=825_1) - the Enterprise product vers…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now