I would like to connect wireless laptops to our VPN using a Nortel Contivity VPN gateway and RSA SecurID authentication....
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The catch is that the switch requires a group ID and password as well, and I'm not sure where to place those credentials in the SoftRemote Client in order to connect to this VPN
The Nortel VPN gateway uses XAUTH for RSE SecurID user authentication. XAUTH is an extension to standard IKE authentication that occurs after phase one pre-shared key authentication, before phase two IPsec tunnel establishment. Therefore, you should follow your VPN client's instructions for configuring a pre-shared key (not a certificate).
In SoftRemote, under the Phase 1 branch of the VPN gateway's configuration, choose Authentication Method = Pre-Shared Key; Extended Authentication. Then enter the Nortel's Group ID and password by clicking on the My Identity configuration. Choose ID Type = Domain Name, enter the Group ID in the field beneath ID Type, and then click on Pre-Shared Key to enter your Nortel's VPN gateway's password.
The wireless user will be prompted to enter his or her SecurID one-time password after IKE phase one authentication is successful using that pre-shared key. This ensures that a laptop with an installed VPN client and saved pre-shared key cannot be used to break into the VPN without the user's SecurID token.
Dig Deeper on WLAN Security
Related Q&A from Lisa Phifer
Whether you need a basic open source mobile device management tool for your company's Apple or Android devices, or something more customized, you ...continue reading
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network.continue reading
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.