Solved

How to deploy VPN settings

Posted on 2010-08-25
6
507 Views
Last Modified: 2012-05-10
Hi experts,

I'm in the process of creating an access database that will use a VPN connection to a remote SQLServer. Is there an easy way to install/deploy the VPN settings onto a users PC/Laptop without me having to talk them through setting up the VPN connection manually?

Thanks in advance
0
Comment
Question by:dataflowjoe
6 Comments
 
LVL 2

Expert Comment

by:texasjpm
Comment Utility
Are you running a Cisco VPN client? If so you can setup a profile on your PC the way you want it to be on the user’s PC. Then you can email him the .pcf file that is created. You can find the .pcf file under "C:\Program Files\Cisco Systems\VPN Client\Profiles". All the end user will need to do is go to "Connection Entries" and "Import" and select the *.pcf file and his client will be configured just as you had set it.
0
 
LVL 2

Author Comment

by:dataflowjoe
Comment Utility
I'm using the native Windows VPN which was setup in the 'Network and Sharing Center' using the 'Connect to a Workplace' option
0
 
LVL 4

Expert Comment

by:Allvirtual
Comment Utility
NCP has an Enterprise solution with a managed client and the Secure Enterprise Management Server. But it is only economical if you have a certain number of VPN users, like 50+ or so.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 2

Expert Comment

by:texasjpm
Comment Utility
With the native VPN setup i know of no way to deploy the settings to another users PC. Sorry...
0
 
LVL 39

Accepted Solution

by:
als315 earned 500 total points
Comment Utility
0
 
LVL 2

Author Closing Comment

by:dataflowjoe
Comment Utility
Thanks that's great, sorry for taking so long getting back
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

In a multiple monitor setup, if you don't want to use AutoCenter to position your popup forms, you have a problem: where will they appear?  Sometimes you may have an additional problem: where the devil did they go?  If you last had a popup form open…
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now