>IMO the easiest way to set up VPN access using Secure Client is with a
>pre-share; have the client initiate the key exchange and ditch the
>notion of using a server as CA. Use a nice alphanumeric sequence of 18
>characters or more on both ends- though it requires individual config on
>the clien
IMO the easiest way to set up VPN access using Secure Client is with a
pre-share; have the client initiate the key exchange and ditch the
notion of using a server as CA. Use a nice alphanumeric sequence of 18
characters or more on both ends- though it requires individual config on
the client sid
You can use either of the three or you can add the users manually to the
router. Depending on the amount of users, you may want to use a TACACS+
Server or something along that line.
Don
"Patrick Gannon" <[EMAIL PROTECTED]> wrote in message
60B00056DADCD311BC7600508B9B1AC607BBB7@SERVER2">news:60
Hello all,
I am implementing Cisco Secure VPN client v. 1.1 in a client-router
config. The router has IOS firewall feature set with IPsec capability. I
will be using a third-party CA (Verisign). Will I need to implement a
RADIUS, TACAS, or Kerberos server anywhere on my network, or wil
4 matches
Mail list logo