Solved

Access to Network Share through VPN

Posted on 2014-03-30
2
392 Views
Last Modified: 2014-04-15
Hello Experts

Some VPN laptop clients cannot connect to a server share unless I turn off their windows (home/work) private firewall.  We use a draytek router with the smartVPN client.

 I really don't like the idea of turning off Windows Firewall.  If the firewall is off, is it possible for those on the same Wi-Fi network to access files on the client's laptop?  If so, how do I prevent this?  Is there a rule I can create that will prevent this (e.g., only permit incoming traffic from our VPN?).

Thanks,
Mike
0
Comment
Question by:jumptohigh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 500 total points
ID: 39964945
Hi Mike,

Killing the firewall does not grant sudden access rights to fellow wifi users.

What i recommend in enable the firewall and enable firewall logging to see what ports are being blocked. Once you have this mapped tell the firewall to grant these ports.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 39964965
I've seen this situation before. What I've done to resolve it is to create a batch file on the user's home Pc that maps the drives for them.

The batch file commands would look like this:

net use \\servername\sharename1
net use \\servername\sharename2
net use \\servername\sharename3

They would run the batch file after connecting to the VPN. It worked well for me.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question