[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

I-Phone IPsec connectivity

Posted on 2012-03-12
8
Medium Priority
?
192 Views
Last Modified: 2014-01-22
For connecting I Phone to IPsec via Cisco software I would like to know what type of licenses are required.
How licensing is calculated for this.

What type of licensing is required for this.
0
Comment
Question by:SrikantRajeev
  • 3
  • 3
7 Comments
 
LVL 8

Accepted Solution

by:
Elmar Koschka earned 2000 total points
ID: 37709407
a vpn user license on cisco router
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37709517
what is the difference between Cisco Any connect & the IPSec available in IPhone
0
 
LVL 8

Assisted Solution

by:Elmar Koschka
Elmar Koschka earned 2000 total points
ID: 37709587
0
Prepare for an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program curriculum features two internationally recognized certifications from the EC-Council at no additional time or cost.

 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37713028
Can I use Cisco 3825 as the router for the users to connect via the I-Phone ?
0
 
LVL 8

Assisted Solution

by:Elmar Koschka
Elmar Koschka earned 2000 total points
ID: 37713391
for the internet access? yes.
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37785929
Any one aware for 3900 series router how many IPSec sessions it can support
0
 
LVL 28

Expert Comment

by:jhyiesla
ID: 39799483
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

591 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question