?
Solved

Windows SBS 2003 VPN implementation

Posted on 2006-03-30
3
Medium Priority
?
457 Views
Last Modified: 2007-12-19
I am a VPN newbie.

Here is the setup.

SBS - Hub - Cisco pix - Cisco router - Internet connection

Currently the SBS is used as a file server to the other 15 PCs on the hub.

I want to implement a simple VPN solution.  Probably PPTP with MS-Chap v2.
Is it feasible to put a second NIC in the S.B.S. and connect it directly to the router bypassing the firewall.
Or would this be a big security risk?

Any help would be greatly appreciated.  Thank you.
0
Comment
Question by:paulmmalone
  • 2
3 Comments
 
LVL 15

Accepted Solution

by:
Juan Ocasio earned 250 total points
ID: 16335054
THat is feasible but a Tremendous risk as you would expose yourself directly tothe internet.  YOu definietly need to have a firewall in from of all connections to the internet.  Is your Cisco router managed by your ISP?  If so is it acting as a firewall or are all ports wide open?
0
 

Author Comment

by:paulmmalone
ID: 16335199
Thanks for the quick response.  I really appreciate the help.
I have to go through a Cisco Pix 500 series Firewall and then to a Cisco Router then to the internet

So then I guess I should make sure TCP port 1723 and GRE protocol 47 are open through both the firewall and the router.

So you think putting a Second nic in my SBS and hocking that up the firewall and making sure those ports are open would work?

Thanks again.
0
 
LVL 15

Expert Comment

by:Juan Ocasio
ID: 16343028
Yes.  You should add another NIC card to your Server hook that up to the Cisco PIX and the other NIC of course is hooked up to your internal network.  Then all you should have to do is open up the ports and then set up routing and remote access to allow VPN connections.

Check out this site for more info.

http://www.chicagotech.net/vpnsetup.htm

HTH

jocasio

Good Luck! and post a reply if you get stumped
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Integration Management Part 2
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question