Solved

can i simulate an IPSec or pptp VPN connection using only 2 PC's?

Posted on 2004-03-23
3
203 Views
Last Modified: 2006-11-17
I have a win2000 client configured PC and win2000 server configured PC, and i wish to simulate a vpn connection (either IPSec or PPTP).  
I want to know is it possible to directly connect these two machines and simulate either an IPSec VPN connection or a PPTP VPN connection?
Also what additional devices\services would be required to configure and test these two PC's?
0
Comment
Question by:mcweeneyp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 16

Accepted Solution

by:
JammyPak earned 20 total points
ID: 10658505
You will need to simulate an 'inside' network and an 'outside' network...

If you have 2 hubs/switches, that would be best. Label one as inside, and one as outside. In your server you would want to have 2 network cards, one in each switch. Ideally you would have a 3rd pc to be an 'inside' host, plugged into the 'inside' switch. Assign IP addresses on the inside to be on the same subnet (ex. 10.1.1.0). Plug your client pc into the 'outside' switch. Assign IP addresses on the outside network to be on the same subnet (ex. 192.168.0.0) (but different from the inside). Then you'll need to install RRAS on the server, and you'll need to configure a PPTP VPN connection on the Win2000 client pc, specifying the outside address of the server as the VPN host to connect to. Conect to the VPN from the client, and try to access the 'inside' pc.

Here's some links to help out...

http://www.cramsession.com/articles/files/configure-a-w2k-vpn---ste-9172003-1029.asp

http://www.winnetmag.com/Article/ArticleID/21322/21322.html
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question