Solved

VPN - IPSEC between my windows 8 and an remotly AIX 7.1 server....possible?

Posted on 2014-01-16
5
620 Views
Last Modified: 2014-01-21
Hi,

I have an AIX 7.1 server on a lab connected to its local network, but it can be accesible from internet.  Is possible to connect windows 8 as VPN client to an AIX 7.1 server?

I have found google but no success.

Thanks.
0
Comment
Question by:sminfo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 96

Assisted Solution

by:Experienced Member
Experienced Member earned 500 total points
ID: 39785053
For VPN IPsec on Windows 8 / 8.1, I use NCP Secure Entry. I find it to be best overall. Go to www.ncp-e.com and you can get a trial version to see if it works.

.... Thinkpads_User
0
 

Author Comment

by:sminfo
ID: 39785065
but have you tried to connect this client to an AIX box using ipsec?
0
 
LVL 96

Accepted Solution

by:
Experienced Member earned 500 total points
ID: 39785193
IPsec is a protocol that is not box dependent. So long as the AIX end provides vanilla IPsec with 2 phases, authentication and the basic IPsec protocol, it should work. That is why I mentioned the trial version.

I have NCP running on my Windows 8.1 Pro 64-bit machine and it connects to a variety of Juniper and Cisco boxes.

I have not tried it on AIX as the need has not presented itself to me.

.... Thinkpads_User
0
 

Author Closing Comment

by:sminfo
ID: 39796819
Well.. I wrote the support and they told me to test the trial.. but to tell the truth I don't know if it will work... Thanks..
0
 
LVL 96

Expert Comment

by:Experienced Member
ID: 39796828
Thank you for the update. You can always post more questions here and NCP is very good with technical support on their trial product.

... Thinkpads_User
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question