Solved

vpn on an ipad

Posted on 2011-03-23
4
785 Views
Last Modified: 2012-06-21
Hi,

I am trying to connect an ipad to the vpn. the vpn is on the firewall by sonicwall. Has anyone here successfully connected an ipad to the sonicwall vpn? If so, what exactly did you do?

The Ipad is having me chose between L2TP, PPTP and IPSec, and then later on is asking me to chose between Off, Manual and Auto; with regard to a proxy.
0
Comment
Question by:mejdelman
4 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 500 total points
ID: 35202285
See http://www.solved.it/vpn_l2tp_iphone_ipad_ipod_touch_apple_1.php

or

http://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=6579

You'll need to modify some settings on the sonicwall.  If you don't control the sonicwall, I don't think you can use a normal IPsec VPN.  
0
 
LVL 6

Expert Comment

by:theonlyallan
ID: 35398820
IPSec VPN does not work with any Apple iDevices... That feature is for Cisco firewalls only..

The iPad can only connect via L2TP..  PPTP will work if you have it set to passthrough to something like a Windows Server running RRAS..

1  - First you need to change the WAN Group VPN encryption to AES-128..  
2 - Set a Pre-Shared Key
3 - Create a User, and assigned VPN Subnets
4 - Activate the L2TP server in the Sonicwall and assign the DHCP IP address ranges and DNS

on iPad
1 - Create a VPN using L2TP
2 - Put in IP Address of the WAN, Pre-Shared Key, User name and Password.

Everything should connect.
0
 

Author Comment

by:mejdelman
ID: 35725578
I am new to this. What is going on?
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now