• Access from VPN to internal network with an ISA server

    Hi there, How do I configure access from vpn clients -> internal network in a ISA server? thanks, Carlos

    Nine2Five25 pointsBadges:
  • Why is user unable to access Outlook when connected to the VPN?

    We are using Exchange Server 2003. One user cannot authenticate to Microsoft Outlook using her domain account and credentials when connected through the virtual private network (VPN). Even though she is using her domain credentials, she receives a message stating that she is using a wrong password...

    Exchange Ask the Experts580 pointsBadges:
  • VPN CONNECTION SHARING

    on my network i log in to the internet to access international sites through a VPN account.There is just one account with a couple of user.How can i then share this connection to the entire network???

    Wachen60 pointsBadges:
  • setup vpn network

    hi there i'm trying to get some info on how to go about setting up vpn networks for 1 company but 4 sub-offices around the country.

    Abu1230 pointsBadges:
  • Cisco 2811 router and need to create a VPN

    I have a Cisco 2811 router and need to create a VPN to another site but not sure what their endpoint device is. What I am looking for is a white paper on how to configure the Cisco router for a VPN. Can anyone help me?

    Cyberref5 pointsBadges:
  • Sonicwall to Sonicwall VPN is only one way

    I have 2 Sonicwalls and have created a VPN between them. From the remote site you can access all the computers and files at the main office. From the main office you cannot ping or connect to any computer at the remote location. This VPN needs to be two way. There are workgroups at each location...

    Hadden30 pointsBadges:
  • What hardware is needed for VPN

    Hi Guys, I'm hoping you can help me. I need to find out what extra hardware I will need to get to provide VPN access into my workplace. We currently have a DSL connection into a Westell 2200 Modem into a Linksys BEFW11S4 router into a Windows 2003 server with one nic. My questions are: 1) Do I need...

    Fullonjohn5 pointsBadges:
  • How can I run Exchange in two office?

    I have an office in the US which controls my exchange server and I VPN out to my 2nd office in Peru. I want to run a second instance of Exchange in my Peru office so our email system does not go down if my US office is down. How do I do that now that everything is setup the way it is. I have DC in...

    Notanexpert15 pointsBadges:
  • Network Redeisgn

    Hi, I am serving as a system admin for an organization. We have ISA 2004 network, with Exchange 2003 Standard edition server, 2 Microsoft SQL server 2005 Standard edition for database projects, Windows 2003 domain controller in two sites A and B using active directory services. These two sites are...

    NetworkSanjay5 pointsBadges:
  • Differeance b/w VPN and tunneling , REdirect remote PC traffic thorugh WAN

    how does VPN and tunnelling differ from each other ? , and what are the ways one can redirect a remote PC host traffic to other remote host traffic and then to server on WAN ? for example Node A in Alaska .. node B in New york .. node A is accessing some server C... i want all traffic of node A...

    Spidy10 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • ‘You are not authorized to access that database’ error message for Lotus Notes user

    I have a Lotus Notes user who keeps receiving the error message: "You are not authorized to access that database." when working with his local copy of his email file. To my knowledge, he is not using a different ID file. The first two times this happened, we deleted the local copy of his email file...

    Domino Ask The Experts435 pointsBadges:
  • Connecting Domain Controllers

    My company has expanded and bought more buildings that are miles away from the offices we currently use. How would i best connect Domain Controllers at outlying sites to the primary DC and Exchange Server here in the original offices. Could i Use a VPN. Would i need to establish a trust even if the...

    Shocktroop275 pointsBadges:
  • Can make VPN connection, but can’t ping server or access resources

    I set up PPTP VPN through our D-Link DFL-200 hardware firewall here at our company so that people could access network resources from home. The problem is, when at home, they can make a VPN connection just fine, but they can't ping the file server here at work, nor can they access or see any...

    Davemd10 pointsBadges:
  • VPN Tips and Tricks

    When trying to connect to the office network via VPN from hotels, airports etc, what problems could a novice encounter? For instance the local firewall might complicate the connection, the Proxy required at the office network is not on. Does anyone have other problems that can arise, and solutions...

    AenE15 pointsBadges:
  • 3 sites, How to setup Active directory

    Hey guys, I am deploying a network for a business, here is the plan There are 3 sites A,B,C site A: 43 clients, all the servers are in a rack in the basement site B: 20 clients site C: 20 clients i want AD fcourse but i'm wondering if it is possible to use site A domain controller as PDC, and put a...

    Muckvv5 pointsBadges:
  • DIffernece between MPLS & VPN

    i want to know about the basic & major working differnces between MPLS connectivity & VPN coneectivity . In which environment MPLS or VPN connectivity can be deployed to give optimum solution. Please revert me or send me the document or white paper regarding the above. sathish kumar.s Network...

    31032920 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Paranoid about protecting my MAC address–Please read my story

    What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my...

    DonBlake0 pointsBadges:
  • Crypto Tunneling

    I am seeking a faily simple explanation of "What is a crypto-tunnel?" "How does a crypto tunnel work?" and a sketch of what they look like..

    Aucado5410 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following