Solved

Can vodafone block IPSec traffic?

Posted on 2008-10-31
1
1,176 Views
Last Modified: 2012-05-05
for the company i work for i have recently developed a remorte site GPRS/3G soultion, where wireless routers have been installed with IPSec configured to create a VPN tunnel to our corporate network.

i installed a router a week ago and after 4 days it becoame uncontactable, i got another router out that i configured a few weeks ago, and that stoped working as well, but all our ADSL routers that have the same configuration on them are all ok. our wireless routers are failing at IKE phase 2 which i think is a bit odd, the only thing that is diferent between our ADSL routers and wireless GPRS/3G routers is the service provider.

i was wondering if Vodafone have the ability to block IPSec traffic,
i was thinking maybe they are doing this so companies dont stream VOIP traffic over an encrypted tunnel,
as i understand it they dont want any VOIP traffic over the network?


0
Comment
Question by:CraigShag
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 250 total points
ID: 22858154
They certainly could - but its unlikely they do so as to avoid voip traffic.  Some sort of NAT is more likely.

Your best solution is to ask them - say you are trying to use the cisco vpn client to talk to your employer's server for secure email, and its stopped working, and is there any reason why that would be the case?
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question