Solved

How to setup an iBook to access NT Domain via VPN

Posted on 2001-09-14
5
182 Views
Last Modified: 2013-12-23
Currently I have several users that access our NT Domain remotely via VPN using Win98, NT and 2000. Now a couple of MAC users within the company want to access network resources remotely via VPN.

Knowing very little about MACs how, specifically, do I configure their MACs for VPN access to the network.


Thanks for the help.
0
Comment
Question by:jpitkin
5 Comments
 
LVL 2

Expert Comment

by:tobyk
ID: 6485652
I can't say that I know how the client is setup on the Macintosh but I know that if you add services for macintosh, and appletalk (even if using TCP/Ip) and create a macintosh accessable UAM volume users can access network resources as that is what I do on our network
0
 
LVL 13

Accepted Solution

by:
hstiles earned 50 total points
ID: 6528174
I found an SMB client for Macintosh called DAVE (great name)

http://www.thursby.com/products/dave.html

this would allow you to access SMB resources, perform domain logons, etc... from a Macintosh.  If you only have 1 or 2 mac users on your network, it might be better to push SMB functionality down to them, rather than create additional overheads on your NT servers by installing and configuring File & Print Services for Macs.
0
 

Expert Comment

by:CleanupPing
ID: 9160313
jpitkin:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now