Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

IPad VPN?

Posted on 2012-03-12
6
Medium Priority
?
598 Views
Last Modified: 2012-03-14
We have a few partners in the company who want to VPN into the system using their IPad's.

I am wondering how this is done as I have not done it myself before.

they are using a Draytek Vigor 2820 Router, which hosts the VPN connections
0
Comment
Question by:Neal58
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 14

Accepted Solution

by:
plug1 earned 1400 total points
ID: 37713398
I take it they want to VPN inand then RDP to servers or do you have a mac network?

Anyway.. on the iPad go into settings, then General, then Network, then scroll down to VPN and add you connection settings. Once this has been set up you can then use an RDP app like RDP lite to connect to servers etc. The draytek itself doesnt care what device connects to it as long as you enter the correct settings.
0
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 600 total points
ID: 37714154
The ipad will do L2TP, PPTP, OR IPSEC VPN.
0
 
LVL 4

Author Comment

by:Neal58
ID: 37714160
Is RDP the only VPN function or would there be a way to browse shared folders?
0
Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
LVL 14

Expert Comment

by:plug1
ID: 37714248
0
 
LVL 4

Author Comment

by:Neal58
ID: 37714262
cool, will give this a go
0
 
LVL 14

Expert Comment

by:plug1
ID: 37714290
No bother, let me know how you get on..
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question