Solved

How do i securely map a network drive over the internet?

Posted on 2009-05-07
2
949 Views
Last Modified: 2012-05-06
Hi

We need to access a share that sits on a 2003 server housed at a datacentre. Without going down the VPN route I configured the Windows firewall to allow file sharing, created a share and gave certain users access to it. I can now map this share remotely (\\external ip of server\sharename) and can gain access to it after entering the correct username and password. My question is: How secure a method of accessing the server is this? Am I opening up a whole host of security problems?

Nick
0
Comment
Question by:nlbtaylor
2 Comments
 
LVL 4

Accepted Solution

by:
Andy1988 earned 500 total points
ID: 24327523
I very strongly recommend against doing this. You would have to open and forward a number of ports (135-139, 445) and this just screams MASSIVE SECURITY RISK.

I would recommend setting up an ftp service on the server, or using a vpn solution (something like hamachi).

Server 2003 comes with it's own built in FTP service you can install via add/remove windows components. Microsoft guide to set it up: http://support.microsoft.com/kb/323384
0
 
LVL 5

Expert Comment

by:CoSmismgr
ID: 24327650
On the server hosting the share, create an IPSEC policy to secure the communication.
I would also enforce a strong password policy.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The 6120xp switches seem to have a bug when you create a fiber port channel when you have a UCS fabric interconnects talking to them.  If you follow the Cisco guide for the UCS, the FC Port channel will never come up and it will say that there are n…
Usually shares are where we want them for our users and we tend to take them for granted. There are times, however, when those shares may disappear causing difficulty for your users. One of the first things to try is searching for files that shou…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question