Solved

Using a SIM Card for a Data Connection

Posted on 2010-08-17
6
1,048 Views
Last Modified: 2012-06-21
Hello,

I have been having a problem with getting a computer to connect to the Internet using a SIm card in a Toshiba Tecra A11 via VPN. When the laptop connects to the Internet I can dial into my VPN succesfully but once it is connected it is not being seen from our network. When Using a Data Card (via USB) on the same network it connects succesfully and when dailing into the VPN it connects and is visible from our network. Both cards use the same DNS servers etc when initially connected.

Any Suggestions would be greatly appreciated.
0
Comment
Question by:cplit
  • 3
  • 3
6 Comments
 
LVL 90

Expert Comment

by:John Hurst
ID: 33460298
Presumably the software for the internal card is different than the software in the USB card. Do I have that correct?
That is more likely the problem than the SIM card itself. Cellular networks present a double NAT type of connection which are troublesome to most VPN applications. Different cellular cards/software present themselves differently to VPN applications.

I don't know if you can do anything. I wound up changing VPN applications to get around these problems.
... Thinkpads_User
0
 

Author Comment

by:cplit
ID: 33480896
Yes that is correct, I use a different software for the Data Card and the Internal SIM. The Software I use for the Internal SIM is the Toshiba Wireless Software. I imagine it would be quite difficult to find software that is not vendor specific for the internal SIM. Which VPN client did you end up using in order to get a connection?
0
 
LVL 90

Accepted Solution

by:
John Hurst earned 250 total points
ID: 33480925
The strongest VPN client I have ever used is NCP Secure Entry (www.ncp-e.com) . It works through just about anything (including my own data card). Even Juniper Netscreen (which OEM'd from SafeNet for years) has now switched to NCP Secure Entry.  They do have a full function trial, so if you try and it still does not work, you have not lost anything. ... Thinkpads_User
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:cplit
ID: 33697402
We will give NCP a crack and see how we go. Thanks for all your help :)
0
 

Author Closing Comment

by:cplit
ID: 33697410
Will post an update wheter or not was succesful but will not able to test for some time as the laptop is out of our reach
0
 
LVL 90

Expert Comment

by:John Hurst
ID: 33697424
Thank you for the points, and good luck going forward. .... Thinkapds_User
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

With the purchase of CloudCommand by Comcast customers are left in a bind as subscriptions expire and render the AP's disabled. The following will explain how to flash your Ubiquiti AP's with CloudCommand firmware back to Ubiquiti firmware. HOWTO…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now