Solved

How do i securely map a network drive over the internet?

Posted on 2009-05-07
2
959 Views
Last Modified: 2012-05-06
Hi

We need to access a share that sits on a 2003 server housed at a datacentre. Without going down the VPN route I configured the Windows firewall to allow file sharing, created a share and gave certain users access to it. I can now map this share remotely (\\external ip of server\sharename) and can gain access to it after entering the correct username and password. My question is: How secure a method of accessing the server is this? Am I opening up a whole host of security problems?

Nick
0
Comment
Question by:nlbtaylor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 4

Accepted Solution

by:
Andy1988 earned 500 total points
ID: 24327523
I very strongly recommend against doing this. You would have to open and forward a number of ports (135-139, 445) and this just screams MASSIVE SECURITY RISK.

I would recommend setting up an ftp service on the server, or using a vpn solution (something like hamachi).

Server 2003 comes with it's own built in FTP service you can install via add/remove windows components. Microsoft guide to set it up: http://support.microsoft.com/kb/323384
0
 
LVL 5

Expert Comment

by:CoSmismgr
ID: 24327650
On the server hosting the share, create an IPSEC policy to secure the communication.
I would also enforce a strong password policy.
0

Featured Post

Comparison of Amazon Drive, Google Drive, OneDrive

What is Best for Backup: Amazon Drive, Google Drive or MS OneDrive? In this free whitepaper we look at their performance, pricing, and platform availability to help you decide which cloud drive is right for your situation. Download and read the results of our testing for free!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Requirements: root access via SSH, telnet, or other.. Alternately, access from the server administrator to run a counter-strike server, and the proper access rights to do so. Enough free disk space (and allowed to use this much, eg disk quota): 6…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question