Creating a VPN

Posted on 2006-03-29
Last Modified: 2010-03-19
What are the steps to create a VPN. And what are the configuration to be done to allow someone to access his work computer from his laptop while on the field?
Question by:chriska
    LVL 32

    Expert Comment

    You need two things, a CLIENT and a SERVER.  Most popular operating systems have a VPN client included.  Most server OSs have a VPN server capability.

    Under Windows Server you create a VPN server by enabing it under the ROUTING AND REMOTE ACCESS control panel.

    On Windows clients you create a VPN connection in the same place you do a dial-up connection.

    LVL 4

    Accepted Solution

    there are serveral ways to set up a VPN.

    you can set up a software VPN from within windows, so someone can connect to a specific windows computer remotely.
    this requires a VPN server and a VPN client to be set up

    here is an article on how to set  up a VPN server
    or here if you wish to use a vpn server installed within your 2003server

    and here is a link to setting up the client on the laptop

    or you can have a hardware based VPN so a user can connect back to the office network.

    the hardware based VPN is better in my opinion, more stable and secure. the way it works is to have a hardware firewall/router such as 'sonicwall' that has a vpn lience, then the client would run a piece of software on his laptop that alows him to safely connect to his office LAN, once connected he would have access to all the ussual stuff on the network.

    one think to mention is some routers seem to have issues allowing VPN pass through, so if you have connections issues and all else fails try another router.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Join & Write a Comment

    Suggested Solutions

    I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
    Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    730 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now