Solved

Accessing client computers behind a firewall from the internet

Posted on 2004-03-26
3
379 Views
Last Modified: 2013-11-29
I have a small network using windows 2003 server and NAT to provide internet access to client computers on my network.  Some of the users want to be able to access remote desktop, file sharing, or FTP from home over the interet.  I know I can map ports to local IPs, but I was wondering if there was a way to create a discrete name for each of the clients that would work on all ports, something like client1.router's.internet.ip  Other suggestions for something like this also greatly appreciated.
0
Comment
Question by:mhab12
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Accepted Solution

by:
PennGwyn earned 500 total points
ID: 10691122
The obvious solutions are to statically NAT all the clients (ugh!) or dump NAT entirely.  Somehow I doubt that either is practical.

So the next best would be to implement a VPN, allowing authorized users to connect in from remote locations and get access to private resources on the LAN.

0
 

Expert Comment

by:brianclay
ID: 10691783
What type of firwall are your running?  If you are running a Cisco, you could build access lists (of all the users internet ip addresses) that give total access (ip, udp, tcp, icmp) to a particular list.
0
 

Author Comment

by:mhab12
ID: 10692334
I am using the Routing and Remote Access feature of Windows 2k3 for my router.  Any info on how to statically NAT address would be very helpful.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question