Solved

Remote Access to Corporate Network

Posted on 2004-04-16
2
224 Views
Last Modified: 2010-03-18
The remote connection to our corporate network is thru a tunnel that requires a secure ID to be entered.  


If I leave my computer on and connected to the network in my office, and then attempt to use Windows 2000 remote networking to allow me to connect TO my work computer FROM my home computer:

1.  Will it work?

2.  Is the connection likely to be detected by the corporate IT department?  This may not be within policy.

Thanks
0
Comment
Question by:jseverson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 10846367
Hi jseverson,
Whoa STOP this is against the member agreement - and you will receive no help on that from here - sorry most of us are sysadmins

Cheers!
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
ID: 10846422
also your comment

>>secure ID

makes me think your using RSA secure login, probably via a RADIUS server (though Im making an educated guess)
any corporate enviroment that takes security that seriously will not have a hole in the firewall for you to hit your work PC from home.


Pete
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RRAS AND DNS 15 85
Surface Pro 4 wifi 4 51
Monitor changes to folder and file permissions - automated reporting 6 107
Where is the second IP address? 8 50
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question