Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Remote Access to Corporate Network

Posted on 2004-04-16
2
Medium Priority
?
227 Views
Last Modified: 2010-03-18
The remote connection to our corporate network is thru a tunnel that requires a secure ID to be entered.  


If I leave my computer on and connected to the network in my office, and then attempt to use Windows 2000 remote networking to allow me to connect TO my work computer FROM my home computer:

1.  Will it work?

2.  Is the connection likely to be detected by the corporate IT department?  This may not be within policy.

Thanks
0
Comment
Question by:jseverson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 10846367
Hi jseverson,
Whoa STOP this is against the member agreement - and you will receive no help on that from here - sorry most of us are sysadmins

Cheers!
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 2000 total points
ID: 10846422
also your comment

>>secure ID

makes me think your using RSA secure login, probably via a RADIUS server (though Im making an educated guess)
any corporate enviroment that takes security that seriously will not have a hole in the firewall for you to hit your work PC from home.


Pete
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question