question about vpn

Viewing 1 post (of 1 total)
  • Author

  • gogi100

    I have a domain network with AD, DHCP and DNS under win server2003. the company have 4Mbps speed internet with static public address. in branch offices of the company’s computers also have the Win XP Pro and Internet 1Mbps also with static addresses. So I want that branch officies attach to my network and use shared folders, run a program for the database. database is located on a server with the ad. also I want that users in the local network to be able to attach to the branch offices, where there are also small programs and databases used by these programs. This small database is also located on these computers.
    Therefore it is necessary to configure VPN server on the edge of my local network (one nic card will be in the local network and the other will be public and will use the internet). I have a license to win serrver 2000, and that I will install rras vpn server. Now the following questions, if I use the L2TP/IPSec tunnel protocol, how to install certificates and where to put them? if you need anything else to users from the local network database applications run on computers branch offices network, VPN client? Do I need VPN clients log into the domain as I signed up to any computer network, or you just establish a VPN connection to the north and pass through the user who posted the ad in? If users need to register a domain how to do that is. how to set that as soon as the vpn client windows raised, it will automatically launch a VPN connection?

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: