Solved

Hamachi help Please.

Posted on 2006-11-15
6
813 Views
Last Modified: 2008-01-09
Hi,

I recently was advised by an expert to at least use hamachi for a VPN service. I want to try and secure my network mainly for terminal services. I can understand this to a certain extent.

I have created a network on my end and created a network on another Pc. I have joined them and they are seeing each other ok.

I dont really understand this in the sence of a VPN. If i have hamachi running on one Pc and Hamachi running on another Pc - Does this mean that the only communication that can be established is between these two Pc's and if PC 3 tried to for instance terminal server in it wont let it through? Just not quite sure  how this works once i have set up the networks.

thank you
0
Comment
Question by:DCHMIEL
  • 2
  • 2
  • 2
6 Comments
 
LVL 43

Assisted Solution

by:Steve Knight
Steve Knight earned 200 total points
ID: 17946138
Well as no-one else seems to have got here I'll give a go as far as I understand hamachi.

When you setup it on a PC you get allocated a private 5.x.x.x range address fro the VPN connection to that machine.  The other machines or machines somewhere out on the net. also get a 5.x.x.x address and you can choose who you allow in to the machine.  Once they get to your machine they appear directly there on your server having gone through the encrypted tunnel between the 5.x.x.x addresses.  You can several hundred machines on your private VPN I think and there are more facilities if you pay for it.

I've only tried it one machine to one machine but it does seem pretty smart.  Keep this open and someone else will be able to give you more details.

Steve
0
 
LVL 2

Author Comment

by:DCHMIEL
ID: 17946522
Thx Steve and will leave open.
0
 
LVL 2

Author Comment

by:DCHMIEL
ID: 17964067
Hi,

I will most likely test this over the weekend anyway.

Would you in your opnion think that i just install it on each server or would you need to include an install on every single PC i include.

Thank you
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 43

Expert Comment

by:Steve Knight
ID: 17964120
You'd need to install it on any device you want to connect to or from.  However I believe if you buy the payed for version you can configure it to connect a whole network -- i.e. if you install it on your one server then you can get to your other devices.

Surprised you haven't had any other feedback on this one... will see if I can find anyone else to advise more that knows about it.

Steve
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 300 total points
ID: 17964722
Hi Steve & DCHMIEL . Though I have used it, more for experimental purposes and concerns about it being used where it shouldn't, I too have only used it between two machines. However, the fellow who introduced me to it assured me, at the time, it worked great for a star type configuration with one primary computer/server, such as a file server, and numerous remote clients working simultaneously.
 
He also suggested he "believed", it even works in a true hub and spoke arrangement where 2 clients can converse with one another, but had not tested it. A major security concern that should be verified before enabling that 3rd client in many situations.

On a totally unrelated subject, if working with the free version of Hamachi, running it a service is a definite asset. Following links may be of some help to you:
to run it as a service:
http://www.itsatechworld.com/2006/01/17/hamachi-vpn-solution/
batch file to set up service more easily, see near end of thread.
http://forums.hamachi.cc/viewtopic.php?t=522&postdays=0&postorder=asc&highlight=batch&start=15  
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 17979415
Thanks DCHMIEL,
--Rob
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now