Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Access My Network from a phone line

Posted on 2004-10-22
Medium Priority
Last Modified: 2010-03-18

I have a windows 2000 server  and it have internet access via a  sattelite. I'd like to know how can i get people to get access to the internet from my server using their phone line. I'm looking for at least 100 people. what material should i buy? what kind of router? ...etc and How to configure those material.
but i don't have many phone line available. If there is a material that can split the phone line..?
what can i do if i don't have many phone lines.
Question by:NandyGeorges
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 33

Accepted Solution

humeniuk earned 2000 total points
ID: 12387079
You can configure Windows 2000 Server to act as Remote Access Server, which will accept both dial-up connections and VPN connections.  You can read about this at www.microsoft.com/resources/documentation/windows/2000/server/reskit/en-us/intnetwk/part2/intch07.mspx.  You can also take a look at the MS support webcast re. Routing and Remote Access in Windows 2000 Server at http://support.microsoft.com/default.aspx?kbid=325421.

However, each dial-up connection will require its own phone line and modem.  If you have ten modems and ten phone lines, you will be able to accept only ten connections at a time.  A VPN (virtual private network) would be a much more effective means of remote access as it would provide faster connections and a greater capacity without the additional expense of the multiple modems and ongoing cost of the multiple phone lines.  However, your users would need internet access to be able to connect to the server.

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question