Improve company productivity with a Business Account.Sign Up

x
?
Solved

how to block torrent usage during the windows vpn connection session?

Posted on 2013-06-27
5
Medium Priority
?
363 Views
Last Modified: 2013-07-24
we use windows server 2008 r2 as a vpn server - pptp with the network policy server enabled. How do I prevent user using p2p program while connected to vpn server?
0
Comment
Question by:okamon
  • 3
  • 2
5 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39283913
Use split tunneling in the server. That way, even if the users use p2p or anything, it will go locally and will not come through vpn. In any case, when you configure vpn you define explicitly what traffic is permitted. Rest is denied.

Best,
0
 

Author Comment

by:okamon
ID: 39285935
how to Use split tunneling in the server?
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 1350 total points
ID: 39286355
I am not a perfect windows guy. But this one should help.

http://technet.microsoft.com/en-us/library/bb878117.aspx

Best,
0
 

Author Comment

by:okamon
ID: 39302496
this is not on server .. this is on the client machine though
0
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39302770
you do not need to worry about client/server. Split tunnelling will take care. Just follow the link and enable the options.
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question