Solved

I-Phone IPsec connectivity

Posted on 2012-03-12
8
179 Views
Last Modified: 2014-01-22
For connecting I Phone to IPsec via Cisco software I would like to know what type of licenses are required.
How licensing is calculated for this.

What type of licensing is required for this.
0
Comment
Question by:SrikantRajeev
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
8 Comments
 
LVL 8

Accepted Solution

by:
Elmar-H earned 500 total points
ID: 37709407
a vpn user license on cisco router
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37709517
what is the difference between Cisco Any connect & the IPSec available in IPhone
0
 
LVL 8

Assisted Solution

by:Elmar-H
Elmar-H earned 500 total points
ID: 37709587
0
Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37713028
Can I use Cisco 3825 as the router for the users to connect via the I-Phone ?
0
 
LVL 8

Assisted Solution

by:Elmar-H
Elmar-H earned 500 total points
ID: 37713391
for the internet access? yes.
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37785929
Any one aware for 3900 series router how many IPSec sessions it can support
0
 
LVL 28

Expert Comment

by:jhyiesla
ID: 39799483
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question