Hi all!
I'm currently doing research for a white paper and would like to hear from people who have implemented anti-intrusion systems only to be hacked anyway. I'd like to know what firewall software you had running, how you discovered the attack, what general actions you took to thwart the...
My company uses an Nortel Contivity VPN switch. It allows you to map drives, use corporate email etc. Almost like being at work. It's also very secure by using IPsec and 2 factor authentication which the company demanded before allowing a PC from an untrusted network access to corporate...
DR is a big subject and is unique to every company. Software and hardware only play a supporting role and can be quite expensive. Ask yourself or your boss these sorts of questions.
- What level of disaster? A dead hard drive or the building burning down?
- What specific systems (computer and...
You're right about the topology being an issue. It was for me! The IP you're client's are being given by the concentrator is probably on a different network. When the client is trying to authenticate, it is sending a broadcast packet to find an authentication server and the packet isn't being...
I use different equipment (Nortel Contivity) but here's how I got all that working.
1) make sure the remote PC has logged onto the network (domain) sucessfully before .
2) Make a hardware profile with the network card disabled and use this profile when connecting via VPN
3) Add the domain...
There are several posts in this thread I can answer. Can I ask those who haven't received a response to a question in this thread to start a new thread? I get confused really easily %-)
Are you telling it to install and run as a service? If you tell it to run as an application, it won't work in 2000 or XP. For W2K the earliest version you can use is 2.62. For XP, I know that version 4.10 is supported.
Cheers
Sifer
Hi Beachcomber!
A VPN connection will work but in our testing, the performance of Access databases over a 56k modem was thoroughly unacceptable. Perhaps if your remote users had cable or DSL the situation would be different. We had to make it very clear to our users that using Access databases...
This is usually due to the server being on a different network segment. Servers and clients use broadcast messages to advertise their presence on the network but broadcasts aren't passed through the router to keep congestion down. Using a wins server may reslove the problem
Cheers
Here's a couple of things to try.
1) Use the following syntax when mapping: \\192.168.x.x\sharename
2) Try specifying using a different user name to connect to the share.
Here's part of the fix I implemented for my company. On the Contivity VPN client (i'm using 4_12.03 running as a service), select "logoff on connect" in the options menu. What this will do is log off the current windows user/session while keeping the internet connection and VPN tunnel...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.