?
Solved

VPN Setup

Posted on 2003-12-07
3
Medium Priority
?
937 Views
Last Modified: 2010-04-14
Hi,

I'm new at VPN setup procedures though I have many years of experience in pc repair, I've never had the chance to set up a VPN server.

Here's my W2K server info:

IP: 192.168.1.9
SM: 255.255.255.0
Domain: marcomnet.svr
Router: Linksys dsl/cable router

Now, do I need to register a DNS adress? How can my VPN clients find my server marcomnet.svr if its not registered with the registrar?

Like I said I need step by step procedures for the server setup, please use the computer jargons and no need to elaborate on the procedures so much, as said before I'm a PC and server technician and as funny as it sounds I've never played around with VPN!!

Thanks in advance!

Mario
0
Comment
Question by:Marcomnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 10

Accepted Solution

by:
BloodRed earned 2000 total points
ID: 9894222
0
 
LVL 15

Expert Comment

by:Rob Stone
ID: 9895407
This link may also be of help:
http://www.microsoft.com/windows2000/en/server/help/

(Networking > VPN)
0
 
LVL 13

Expert Comment

by:Gnart
ID: 9896657
Does your Linksys dsl/router support VPN end tunnels?  VPN is end to end... You want to set the VPN end-point on the router.

1) Determine and setup your IPSec encryption.
2) Determine and setup your authentication.
3) Setup your key (end-point must agree on type of encryption and data).
4) You can register your domain - IPSec uses FQDN - or use DDNS....
5) You can specifiy which traffic requires encryption

The client will be the other end point...
1) Client needs to setup VPN end point.
2) Use same key when access your end-point
3) ISAKMP and IPSec will take care of the rest.

cheers
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses
Course of the Month10 days, 6 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question