Posted on 2004-11-04
Last Modified: 2010-04-10
Hi All

Quick outline  - we have a 2003 domain running in native mode. We are based in UK but have a server in Germany that is in our domain.  We have VPN users that login via our German Domain and need to be able to have visibility of our shares on the server (within the UK domain) that resides in Germany.

OK a bit more we are linked via two way trusts as we have a disjointed name space no plans to change this.  We use Checkpoint Secure Remote to access VPN over a Checkpoint NG firewall.  Any suggestions?  It is pretty urgent so hence the points.
    LVL 2

    Assisted Solution

    Create a GPO for the users that need to access the shares giving them the proper rights.
    They do have a VPN established already right? Then just have them remote desktop to the server. Or if you wanted to be a bit more safe about it, designate a server as a Terminal Services Server and map to the share from it. At least then they are not working directly off your server.
    LVL 1

    Accepted Solution

    if u be already connected with the vpn server, u can map driver usind the command line just like this:
    net use k: \\server ip address\share name

    the user must have the properly rights to make this map
    ps: do not use netbios names with the command, use ip address

    Expert Comment

    I am assuming that the VPN is already established. What you need to do is open up the following ports on your Firewall for connections comming from you German Office:

    TCP & UDP:
    137, 138, 139

    TCP Only

    Then you should give the users proper rights (Permissions & Security) to the shares that they need to access.
    LVL 2

    Expert Comment

    Over a secure encrypted VPN link, would you really want to set-up firewall rules between sites?  I take it each site can trust each other, so no one in Germany will try hack the UK site, and vice-versa?

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
    PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now