?
Solved

Site-to-site VPN on Domain Controllers

Posted on 2008-06-22
6
Medium Priority
?
271 Views
Last Modified: 2010-04-07
Earlier I asked a question about geographically distributed domain controllers:
http://www.experts-exchange.com/Networking/Protocols/DNS/Q_23506611.html#a21843736

After the question closed KCTS posted a comment regarding the potential usefulness of "site to site VPN." I would like to know the typical uses for site-to-site VPN, especially in the scenario I described earlier.

I am guessing this is a means of assuring secure connectivity between two servers without exposing their ports to the open Internet. It will help if someone can give me a refresher course on the means by which VPN does its magic.  

It will help if someone can supply me with links regarding how to set up site-to-site VPN on servers. Finally, if there are common mistakes to avoid, please let me know what they are.

Thanks so much.

0
Comment
Question by:kennethfine
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 21843802
If your routers support hardware VPN themselves (some do - some  don't), it would be worth using that in my opinion, if not then you can set-up Windows to provide the VPN. There are some articles on this at
http://technet.microsoft.com/en-gb/network/bb545442.aspx
and a discussion at
http://www.microsoft.com/technet/community/chats/trans/windowsNET/wnet0107.mspx
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843830
I have ordered this:
http://www.buy.com/prod/netgear-prosafe-dual-wan-gigabit-vpn-firewall-4-x-10-100-1000base-t/q/loc/101/205877562.html

It is a firewall device. I believe this offers the hardware VPN capabilities you're describing, yes?
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843843
hmmm although one thing I'm contemplating is that this VPN functionality will need to be on both ends of the connection, and I don't have two of these gadgets. Is this compliant with a standard? In other words, if I have an in-hardware VPN implementation on one end and a windows-provided VPN on the other will it play nice?
0
Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 21843845
I'm not familiar with this product, but it would seem to offer hardware VPN and it would make sense to use it - It you have one at each site, then connecting them should be straight forward.
0
 
LVL 6

Author Comment

by:kennethfine
ID: 21843850
What if I have windows-provided VPN on one end and hardware on another? do they adhere to a compatible standard? or?
0
 
LVL 70

Expert Comment

by:KCTS
ID: 21843871
In theory yes...
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 21 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question