Android App for Cisco VPN Client

Posted on 2012-03-30
Medium Priority
Last Modified: 2012-12-19
I have cisco router configured for IPSec Client vpn access.
I use Ipad which has cisco client vpn software by which i can connect to Cisco router via IPSec.
I want Android phone to connect to Cisco router. Let me know what application should i use in Android for this
Question by:SrikantRajeev
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3

Expert Comment

ID: 37787781
The Cisco Anyconnect will work, but you have to root your device first.

Author Comment

ID: 37794501
let me know how to root my device for this.

Author Comment

ID: 37885428
let me know how to root my device for this.
LVL 20

Accepted Solution

rauenpc earned 1500 total points
ID: 38644433
For Android to connect via VPN, you can go the Anyconnect route as mentioned (which may require rooting), or you need to setup the VPN tunnel on the router to accept L2TP as a protocol for VPN connections. Android natively supports this method. I have not personally configured this on a Cisco router, but have done it on the ASA running 8.4.1 code and higher. Another result of this configuration will allow you to use the native vpn client in Windows (2000, XP, Vista, 7) and not require the Cisco client to be installed.

One thing to make a note of on L2TP VPN configuration is that there is no group specified, meaning that the group ends up being the DefaultRAgroup so if you have a need to treat some Android devices different than others based on the user then this may not work out so well.

The following configuration guide from Cisco would be a starting point.

Or, if you want to do L2TP on an ASA, I have config examples I can share.

Author Closing Comment

ID: 38704993

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month15 days, 14 hours left to enroll

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question