Solved

Site-to-site VPN on Domain Controllers

Posted on 2008-06-22
6
264 Views
Last Modified: 2010-04-07
Earlier I asked a question about geographically distributed domain controllers:
http://www.experts-exchange.com/Networking/Protocols/DNS/Q_23506611.html#a21843736

After the question closed KCTS posted a comment regarding the potential usefulness of "site to site VPN." I would like to know the typical uses for site-to-site VPN, especially in the scenario I described earlier.

I am guessing this is a means of assuring secure connectivity between two servers without exposing their ports to the open Internet. It will help if someone can give me a refresher course on the means by which VPN does its magic.  

It will help if someone can supply me with links regarding how to set up site-to-site VPN on servers. Finally, if there are common mistakes to avoid, please let me know what they are.

Thanks so much.

0
Comment
Question by:kennethfine
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 21843802
If your routers support hardware VPN themselves (some do - some  don't), it would be worth using that in my opinion, if not then you can set-up Windows to provide the VPN. There are some articles on this at
http://technet.microsoft.com/en-gb/network/bb545442.aspx
and a discussion at
http://www.microsoft.com/technet/community/chats/trans/windowsNET/wnet0107.mspx
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843830
I have ordered this:
http://www.buy.com/prod/netgear-prosafe-dual-wan-gigabit-vpn-firewall-4-x-10-100-1000base-t/q/loc/101/205877562.html

It is a firewall device. I believe this offers the hardware VPN capabilities you're describing, yes?
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843843
hmmm although one thing I'm contemplating is that this VPN functionality will need to be on both ends of the connection, and I don't have two of these gadgets. Is this compliant with a standard? In other words, if I have an in-hardware VPN implementation on one end and a windows-provided VPN on the other will it play nice?
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 
LVL 70

Accepted Solution

by:
KCTS earned 500 total points
ID: 21843845
I'm not familiar with this product, but it would seem to offer hardware VPN and it would make sense to use it - It you have one at each site, then connecting them should be straight forward.
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843850
What if I have windows-provided VPN on one end and hardware on another? do they adhere to a compatible standard? or?
0
 
LVL 70

Expert Comment

by:KCTS
ID: 21843871
In theory yes...
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question