?
Solved

Can vodafone block IPSec traffic?

Posted on 2008-10-31
1
Medium Priority
?
1,191 Views
Last Modified: 2012-05-05
for the company i work for i have recently developed a remorte site GPRS/3G soultion, where wireless routers have been installed with IPSec configured to create a VPN tunnel to our corporate network.

i installed a router a week ago and after 4 days it becoame uncontactable, i got another router out that i configured a few weeks ago, and that stoped working as well, but all our ADSL routers that have the same configuration on them are all ok. our wireless routers are failing at IKE phase 2 which i think is a bit odd, the only thing that is diferent between our ADSL routers and wireless GPRS/3G routers is the service provider.

i was wondering if Vodafone have the ability to block IPSec traffic,
i was thinking maybe they are doing this so companies dont stream VOIP traffic over an encrypted tunnel,
as i understand it they dont want any VOIP traffic over the network?


0
Comment
Question by:CraigShag
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 750 total points
ID: 22858154
They certainly could - but its unlikely they do so as to avoid voip traffic.  Some sort of NAT is more likely.

Your best solution is to ask them - say you are trying to use the cisco vpn client to talk to your employer's server for secure email, and its stopped working, and is there any reason why that would be the case?
0

Featured Post

Want to be a Web Developer? Get Certified Today!

Enroll in the Certified Web Development Professional course package to learn HTML, Javascript, and PHP. Build a solid foundation to work toward your dream job!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question