?
Solved

Remote Access VPN Setup

Posted on 2013-05-24
3
Medium Priority
?
499 Views
Last Modified: 2013-05-24
What are the things to look for when setting remote access VPN up or troubleshooting steps to lookout for.

No reference to config is necessary.

Thanks for your comments
0
Comment
Question by:Akinsd
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
activematx earned 2000 total points
ID: 39195582
Make sure the remote sites have a different IP address subnet than the connecting VPN site.

Are you trying to setup up user to site, or site to site?
0
 
LVL 18

Author Comment

by:Akinsd
ID: 39195695
I've requested that this question be deleted for the following reason:

Sorry for the mixup
0
 
LVL 18

Author Comment

by:Akinsd
ID: 39195698
Remote Access (User to Site)
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question