Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium



Posted on 2004-11-04
Medium Priority
Last Modified: 2010-04-10
Hi All

Quick outline  - we have a 2003 domain running in native mode. We are based in UK but have a server in Germany that is in our domain.  We have VPN users that login via our German Domain and need to be able to have visibility of our shares on the server (within the UK domain) that resides in Germany.

OK a bit more we are linked via two way trusts as we have a disjointed name space no plans to change this.  We use Checkpoint Secure Remote to access VPN over a Checkpoint NG firewall.  Any suggestions?  It is pretty urgent so hence the points.

Assisted Solution

apostle12 earned 750 total points
ID: 12500840
Create a GPO for the users that need to access the shares giving them the proper rights.
They do have a VPN established already right? Then just have them remote desktop to the server. Or if you wanted to be a bit more safe about it, designate a server as a Terminal Services Server and map to the share from it. At least then they are not working directly off your server.

Accepted Solution

nostravamus earned 750 total points
ID: 12504193
if u be already connected with the vpn server, u can map driver usind the command line just like this:
net use k: \\server ip address\share name

the user must have the properly rights to make this map
ps: do not use netbios names with the command, use ip address

Expert Comment

ID: 12504547
I am assuming that the VPN is already established. What you need to do is open up the following ports on your Firewall for connections comming from you German Office:

137, 138, 139

TCP Only

Then you should give the users proper rights (Permissions & Security) to the shares that they need to access.

Expert Comment

ID: 12526247
Over a secure encrypted VPN link, would you really want to set-up firewall rules between sites?  I take it each site can trust each other, so no one in Germany will try hack the UK site, and vice-versa?

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question