Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How do I configure a VPN

Posted on 2007-03-20
3
Medium Priority
?
179 Views
Last Modified: 2010-04-18
1. I have a server with the following software installed:
Windows 2003 Server, Active Directory, Exchange Server 2003, DHCP is configured:

2. I have (2) network cards installed:
Card (1) is a private IP 192.168.1.2
Card (2) is a public IP (70.88.17.73) which I got from Comcast
Subnet mask: 255.255.255.252
DNS: 68.87.68.162

3. I have a CAT 5 cable connected from the server directly to the Comcast modem.

4. HOW DO I CONFIGURE A VPN?

 
0
Comment
Question by:Paul-Kelley
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Accepted Solution

by:
Anet367 earned 2000 total points
ID: 18756531
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20286944
Forced accept.

Computer101
EE Admin
0

Featured Post

Enroll in October's Free Course of the Month

Do you work with and analyze data? Enroll in October's Course of the Month for 7+ hours of SQL training, allowing you to quickly and efficiently store or retrieve data. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question