Solved

open source vpn

Posted on 2013-12-07
8
224 Views
Last Modified: 2014-01-28
Does anyone know a good open source vpn to use for a small office for remote access?
0
Comment
Question by:Jack_son_
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 19

Assisted Solution

by:n2fc
n2fc earned 100 total points
ID: 39703365
Try Hamachi...

Download & info here:

https://secure.logmein.com/products/hamachi/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 100 total points
ID: 39703376
you can try OpenVPN
also maybe you can use some of your existing infrastructure in the office - are you running win server? have some router or NAS - it could be possible to use some of these devices as VPN server
0
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 200 total points
ID: 39703380
If you want a client application, ShrewSoft is free and it works decently well.

... Thinkpads_User
0
 

Author Comment

by:Jack_son_
ID: 39703432
yes, we do have windows OS's, which version for that do you recomend for this solution?
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 200 total points
ID: 39703454
For Shrew Soft, go to the Shrew Soft page

https://www.shrew.net/

I expect the newest version would be fine.

.... Thinkpads_User
0
 
LVL 19

Expert Comment

by:helpfinder
ID: 39703473
if you are running windows server you can establish SSTP VPN. No doubts there is a lot of documentation how to set it up on the internet
0
 
LVL 17

Accepted Solution

by:
Sikhumbuzo Ntsada earned 100 total points
ID: 39705791
Another major player is Untangle, try them here, it's not free though.
0
 

Author Comment

by:Jack_son_
ID: 39721956
Okay, thanks - trying to find something low to no cost.  Looks like for openvpn you have to purchase seats, does anyone know the cost?
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now