Having a client-server session over a WAN

We are going to connect to our server over a wan via vpn appliance per the suggestion of EE experts. I am considering the Sonicwall ssl 2000 http://www.sonicwall.com/us/products/12033.html
Does anyone have experience with this that they could share. I am wondering if my client machine can have the windows user logon screen at startup so that when an employee puts their credentials in, they are logging into the server. I don't want the employee to have to log into windows, open a browser window to start a vpn connection, and have access to server resources. I want the employee to log on to the server as if they were logging on to the server and have a session as if they were logging on from a client machine at headquarters.
Who is Participating?
Rick_O_ShayConnect With a Mentor Commented:
If you don't want to use a browser to connect and log in then any of the IPSEC VPN router solutions would be fine. I believe Sonicwall has those too.

It would still require some work from the user and a login to the VPN first via the IPSEC VPN client software on their PC. That is one of the reasons SSL became popular because it runs with just a browser and no extra client is required.
That will be done using Windows' Remote Desktop Connection. The Sonicwall will allow you to forward the necessary ports to the server you are remotely connecting to.

Keep in mind though that you are allowing Windows Logon to happen across the Internet via RDP which is not encrypted.
SSL normally uses a browser for connecting. What you are asking for can be done with an IPSEC VPN cleint session. That requires the user to start the VPN client software to create the tunnel session then they can do whatever you allow on the corporate network.
Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

pat_the_batAuthor Commented:
So would something like this be more appropriate for what I am trying to do? Cisco Systems
Asa 5505 VPN Edition with 10 SSL User License 3DES/AES
pat_the_batAuthor Commented:
Okay, so then when the user at the remote site sits down at their computer, and they have the Windows blue logon screen, they hit control-alt-delete, and enter their credentials to logon on to the domain? Or are you saying that no matter what, they need to logon to the local machine, then perform an authentication procedure of some sort, and then.... ?
Sorry. I was looking at it from the point of view of the VPN device and the protocol in use and your statment about not using a browser.

By the way there is a note about the Sonicwall ssl 2000 being only available in Japan.
JDLoanerConnect With a Mentor Commented:
PAT - Really the only way for users to be able to login to a remote server(like you said with their Windows Credentials, CTRL-ALT-DEL style) through an encrypted session would be to first initiate a VPN connection, and then open a RDP session over that VPN tunnel.

The VPN tunnel can be initiated several ways; a couple of which have been described above, with the endpoint being any of the devices you listed. The ASA is definitely an expensive option and really any hardware-based VPN endpoint will be. There are free software-based options that would live on a server facing the Internet and would still allow for the "easiest" method for the user; being a browser-based SSL VPN Connection.

OpenVPN is a very good and stable option for providing a "free" SSL endpoint for users to encryption their session with.  http://openvpn.net/
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.