Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


VPN configuration help

Posted on 2005-04-21
Medium Priority
Last Modified: 2010-04-18
So I am want to implement a VPN using IPSec tunnel mode (transport if I have to). I am using Smoothwall as a firewall solution and I have a few questions on this one- so I will make sure to reward points graciously. I will need this VPN connection to support my road warriors (laptops- dynamic IP's, Home users (dynamic IP's), and Site-to-Site (Static). Now I know virtually nothing about how this works. We are a domain here at my work and I am guessing they will need to authenticate into our domain somehow- but I do not want to be joing their home PC's to our domain.

A) I am guessing the IPSec client will take the authentication load/role?

B) I need IPSec clients for the people I delegate to have VPN access- can you recommend any free ones?

Ok so on my internal network side- I have learned that I need to setup a Routing and Remote Access Server. I read that it is not particularly wise to set this up on a Domain Controller- so I have chosen my WIndows 2003 Server (which is only our print server).

C) As there anything you can suggest for the config on this server?

D) And finally, once the connection is established- what resources can the users access? How do I make these resources available once they are connected? They will primarily need access to their Users folders (which are mapped on their work pc's)

Thanks guys
Question by:Trihimbulus
  • 2

Expert Comment

ID: 13834359
HI some thoughts.
A: IPSEC is an encryption protocol not authentication. That is done by endpoints. Follow the suggestions in the following link: http://www.microsoft.com/windows2000/techinfo/planning/security/ipsecsteps.asp


Accepted Solution

joedoe58 earned 1000 total points
ID: 13834382
The rights every user gets is depending on what you allow the user to do on the domain since they have to log in to the domain

Featured Post

Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Enter Foreign and Special Characters Enter characters you can't find on a keyboard using its ASCII code ... and learn how to make a handy reference for yourself using Excel ~ Use these codes in any Windows application! ... whether it is a Micr…

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question