Solved

I-Phone IPsec connectivity

Posted on 2012-03-12
8
171 Views
Last Modified: 2014-01-22
For connecting I Phone to IPsec via Cisco software I would like to know what type of licenses are required.
How licensing is calculated for this.

What type of licensing is required for this.
0
Comment
Question by:SrikantRajeev
  • 3
  • 3
8 Comments
 
LVL 8

Accepted Solution

by:
Elmar-H earned 500 total points
ID: 37709407
a vpn user license on cisco router
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37709517
what is the difference between Cisco Any connect & the IPSec available in IPhone
0
 
LVL 8

Assisted Solution

by:Elmar-H
Elmar-H earned 500 total points
ID: 37709587
0
Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37713028
Can I use Cisco 3825 as the router for the users to connect via the I-Phone ?
0
 
LVL 8

Assisted Solution

by:Elmar-H
Elmar-H earned 500 total points
ID: 37713391
for the internet access? yes.
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37785929
Any one aware for 3900 series router how many IPSec sessions it can support
0
 
LVL 28

Expert Comment

by:jhyiesla
ID: 39799483
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
managing a small network 6 97
md5 password 3 74
Guest Wireless in a Business Environment 6 96
Routing protocols 5 19
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

837 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question