?
Solved

Open Source VPN Client

Posted on 2013-06-25
8
Medium Priority
?
678 Views
Last Modified: 2013-07-21
i need one open source vpn client for our office that is flexible enough to connect to any vpn server,currently we are using asa 5505,with Cisco vpn client with ipsec which does not seem to work on windows 8....any vpn client ipsec/ssl open source advised will be highly appreciated
0
Comment
Question by:vagabond1214
  • 3
  • 2
6 Comments
 
LVL 99

Accepted Solution

by:
John Hurst earned 2000 total points
ID: 39275938
Take a look at Shrew Soft for a free (and possibly open source) VPN client. I know it works in Windows 7 but I do not know about Windows 8.

If you want a top notch VPN client that will work when the going gets tough, I use NCP Secure Entry on Windows 8 Pro 64-bit. It works a treat. It is not free and not open source, but it is really good. www.ncp-e.com 

.... Thinkpads_User
0
 
LVL 71

Expert Comment

by:Qlemo
ID: 39277801
I can confirm above said - free = ShrewSoft, commercial = NCP. Both are versatile, and able to connect to Cisco and many other (IPSec) devices. No known issues with W8 with both.
0
 

Author Comment

by:vagabond1214
ID: 39318936
i got one thsnks
0
Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

 

Author Comment

by:vagabond1214
ID: 39318957
I've requested that this question be closed as follows:

Accepted answer: 0 points for vagabond1214's comment #a39318936

for the following reason:

i found it
0
 
LVL 99

Expert Comment

by:John Hurst
ID: 39318958
No answer given so this question should be deleted.

... Thinkpads_User
0
 
LVL 99

Expert Comment

by:John Hurst
ID: 39320720
@vagabond1214 - What is the solution you found please?

.... Thinkpads_User
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this article, we’ll look at how to deploy ProxySQL.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month13 days, 16 hours left to enroll

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question