Solved

Setting up and testing connections with a VPN

Posted on 2008-06-18
4
289 Views
Last Modified: 2013-11-11
one of my latest responsibilities is setting up the VPN for my company.  I've read the documentation about VPNs provided at this url :http://images.apple.com/server/macosx/docs/Network_Services_Admin_v10.5.pdf  unfortunately I still have some questions after going through the docs.  

1.  where do I designate which method of authentication is required for the user to log in.  I know that if you go to system preferences->networking->vpn there are options that determine how you log in.  But Where is the settings that determine which one of those log in methods is the acceptable one?

I have other questions but I'll post a new 'question' to keep it simple.

0
Comment
Question by:GarrettChristopherson
  • 2
4 Comments
 
LVL 5

Author Comment

by:GarrettChristopherson
ID: 21827729
I realized that the username/password on the client machine might be checked against the list of usernames/passwords on the server(within the Accounts portion of the OS, so basically anyone that has an account on the server could potentially connect through the VPN) during the attempted VPN login.  If that is the case, then my other question of what's preventing the client from connecting to the server probably lies with the router.

I must appologize, for my first question is a bit vague, although, I'm new at this and my understanding of the processes involved is developing as I meditate on this subject.  

I was wondering where on the server do I designate the passwords/authentication method for clients that are attempting to connect through a VPN.  
0
 
LVL 5

Accepted Solution

by:
GarrettChristopherson earned 0 total points
ID: 21861506
I found out by speaking with my ISP that I was trying to connect to the wrong server, and the login information I was inputting was not infact stored on the server, but on the ISP's special VPN server.  Once I connect to the ISP's VPN server, I am redirected to my LAN.  
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Some of you may have heard that SonicWALL has finally released an app for iOS devices giving us long awaited connectivity for our iPhone's, iPod's, and iPad's. This guide is just a quick rundown on how to get up and running quickly using the app. …
Do you come here a lot? Are you lazy like me and don't want to go through the "trouble" of having to click your Dock's Safari icon and then having to click your Experts Exchange Favorites bookmark to get here? Well then this article is for you.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now