Solved

W2k at home (dsl), W2k Server at work.  How can I get to data on Server from home?

Posted on 2003-12-11
3
148 Views
Last Modified: 2013-12-04
I would like to access data on my Windows 2000 Server located at the office, from my home computer.  How can I do that?  Setup a VPN?  How do I set up a VPN?  Do I need a VPN router or can I use the Linksys router currently on the office network.  I have Windows 2000 on my home computer.  I must set this up by the weekend.  Thank you very much.
0
Comment
Question by:jimdorman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Expert Comment

by:Gnart
ID: 9925741
You have two choices.  VPN is end-to-end.  You can set your VPN using one of the following model:

Office network <--> router (end) <= vpn tunnel =>(end) router <--> home network
Office network <--> router (end) <= vpn tunnel =>(end) home computer
Office computer (end) <= vpn tunnel =>(end) router <--> home network
Office computer (end) <= vpn tunnel =>(end) home computer

It depends on your LinkSys router model, it may or may not have VPN capabilities.
The model that has VP has VPN capabilities.  You can look it up.  Here is the setup for LinkSys (you follow similar step for other vendor)

1.  Access router configuration and go to VPN tab
2.  Give the tunnel a name.
3.  Enable it
4.  Set the local IP (either subnet or machine IP) you allow to access.
5.  Set the remote IP (either subnet or machine IP) you allow to connect.

6. Set Encryption:  DES or 3DES (stronger but slower)
7. Set Authentication (ISAKMP) MD5 or SHA (stronger)
7- SHA has two groups (1 = 768bits, 2 = 1024 bits) 2 is stronger (advanced button)
8.  Let the router perform key management.

9.  Set PFS (perfect forward secrecy)  for ISAKMP phase 2
9-  Leave it alone unless you are sure both end support this.
A.  Set shared key - The same key must be set for both sides - case sensitive
A-  It is used to exchange secret key.
B-  Set key life time - for how long before the end would renegotiate a new key.

Go through the above settings and set the other end point.  Watch out for settings:
The IP address settings are known as peer - it allows only those IP.
ISAKMP compare Security Association using:
Key must match for it to work.
Encryption must match......

cheers
0
 
LVL 37

Expert Comment

by:bbao
ID: 9926587
i think another key factor you should consider is, how to access your data? the sub-questions are: how are the data stored? how do you access the data at office, you want use same methods to access the data remotely? i believe there is a firewall between your office and the internet, what is it and its internet policy? who manages the firewall, you?
0
 
LVL 37

Accepted Solution

by:
bbao earned 500 total points
ID: 10054734
jimdorman, any feedback please?
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question