Solved

Setting up simple VPN - Overview

Posted on 2004-03-30
2
1,028 Views
Last Modified: 2010-04-12
Greetings,

I'd like to set up a connection between two offices, the second office office requires to see a shared drive on a server and print to a large format printer in the first office.  I assume the best way to do this is VPN.

I'd like to set up a vpn enabled router at each end.  Is this the best and most straightforward way to go?

I am familiar with Linksys routers, I know they are inexpensive, will a proper linksys router be ok for this purpose?  There are less than 6 total users in both places.  Would it be better to get a more expensive firewall/router device?

Do I need fixed ip addresses at both ends?

Am I overlooking anything here?  These are Mac networks at both ends but I don't think that will make any difference.

Thank you.

0
Comment
Question by:skykuhl
2 Comments
 
LVL 11

Accepted Solution

by:
ewtaylor earned 105 total points
Comment Utility
A VPN is for sure the way to go. This will allow each user to be connected as if it is one big office. The best thing is that if you do a router to router vpn it will all be invisible to the user. Since CISCO bought linksys they have come a long way to easing the administration and setup of networking. It sounds likeyou are on it. Of course a pix would be better/more expandable but with only 6 users in both places the linksys will work just fine. The macs might present a problem, as far as name resolution (I am not real familiar with MAC networking) but it should work. Yes you need fixed up addresses on both ends of the tunnel. You could look into something like dynamic dns but fixed ip addresses would work better.
0
 
LVL 20

Assisted Solution

by:What90
What90 earned 20 total points
Comment Utility
Just to add, if the Macs are running TCP/IP then they won't cause any problems. Make sure you get identical linksys boxes at each end (helps troubleshooting).

As ewtaylor said get a router to router vpn solution. Check with a Linksys reseller to get the right model type for your environment.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Preface Having the need * to contact many different companies with different infrastructures * do remote maintenance in their network required us to implement a more flexible routing solution. As RAS, PPTP, L2TP and VPN Client connections are no…
Using Windows 2008 RRAS, I was able to successfully VPN into the network, but I was having problems restricting my test user from accessing certain things on the network.  I used Google in order to try to find out how to stop people from accessing c…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now