The simplest way to do this is to act like a hacker. Snoop around the network traffic, either on the device itself...
or a port on the network. In the case of IPsec, for example, you would see encapsulating security payload (ESP) frames (Protocol 50). Yet, when you look inside the packet payload, you will only see garbled characters -- no clear text at all. Network snooping tools are easily available on the Internet and are simple to use. Of these, Wireshark is probably the most popular tool. You may find this resource on how to do penetration testing on your VPN useful.
Email your VPN-related questions to firstname.lastname@example.org
Related Q&A from Rainer Enders, VPN expert
Administrators don't have to worry about interoperability; integrated mobile application and device management is the best approach.continue reading
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.continue reading
To ensure mobile device security, VPN expert Rainer Enders explains that it is crucial to monitor changed states and block software modifications.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.