Google Answers Logo
View Question
 
Q: VPN's ( Answered 5 out of 5 stars,   1 Comment )
Question  
Subject: VPN's
Category: Computers > Software
Asked by: skip9801-ga
List Price: $5.00
Posted: 28 Jul 2004 06:00 PDT
Expires: 27 Aug 2004 06:00 PDT
Question ID: 380200
How do I configure a windows xp profl workstation to use a vpn?

Do I need to add a piece of software?
Answer  
Subject: Re: VPN's
Answered By: palitoy-ga on 28 Jul 2004 07:32 PDT
Rated:5 out of 5 stars
 
Hello Skip9801

Thank-you for your question which I will use a number of online guides
to help answer as it is very difficult to answer within the
limitations of Google Answers and the time limit suggested by a $5
question.  The guides I will direct you towards have images and
set-by-step instructions on how to set up and use your VPN.

Windows XP Professional contains all the software you require to use a VPN.

To configure a Windows XP VPN Server:
http://www.onecomputerguy.com/networking/xp_vpn_server.htm

To configure a Windows XP VPN Client:
http://www.onecomputerguy.com/networking/xp_vpn.htm

Troubleshooting Networks:
http://www.onecomputerguy.com/networking/trouble.htm

If you require information on connecting other Windows operating
systems to the VPN, this page will direct you to the best guide:
http://www.onecomputerguy.com/networking.htm

Some other useful guides on this subject are:
http://support.microsoft.com/?kbid=305550
http://www.homenethelp.com/vpn/
http://www.net.ttu.edu/docs/vpn/winxpvpn.htm
http://www.mcgill.ca/ics/tools/vpn/winxp/
http://compnetworking.about.com/od/vpn/ht/newvpnwindowsxp.htm
http://www.pctechnicians.ca/help/XPVPN.html

If you need any further information on this subject please ask for
clarification and I will do my best to help you.
skip9801-ga rated this answer:5 out of 5 stars
Thanks for the very detailed, informative answer.  I see that setting
up a vpn has many more issues and concerns that is indicated in some
of the manuals I have seen.

Comments  
Subject: Re: VPN's
From: wwg-ga on 28 Jul 2004 08:37 PDT
 
I won't even try to answer the question directly, but merely to make
some comments. A VPN is a way to conceal the content of traffic moving
between one (user or site or computer or program or ...) to another
over a publicly accessible channel (eg, the Internet). In order to do
this, some way of exchanging (in a SECURE fashion) secret information
(ie, key(s)) is required beforehand. This can be accomplished in some
clever and tricky ways if both ends cooperate correctly. Once the
key(s) have been exchanged (SECURELY), some encryption algorithm is
needed (there are many) and a correct implementation must be used
correctly. Several good algorithms (no practical method is known to
break them directly) are (more or less, depending...) easily defeated
if used in particular ways; and of course, misimplementations of
otherwise good algorithms are not likely to be satisfactory.

Having all of that prepared, both ends must 'dance together' (as it
were) lest some mistep give away information to some attacker. And
behind the scenes at both ends, it is necessary that the application
(perhaps a database) talk to the operating system to dispatch traffic
to the right place via the cryptosystem handling the VPN.
Misconfiguration at that stage can reveal much, perhaps everything
you'd like to conceal from others.

Since there are no standard, known good, VPNs from anyone, and since
(some) operating systems are notorious for security leaks and such,
setting up a VPN which does what is desired is not trivial. In
particular, it cannot be (reasonably) done by blinding using a 'VPN
solution' from some vendor, whether or not provided builtin to some
operating system. Part of the reason is that a properly operating VPN
does not produce error messages, nor do would be attackers succeed in
reading the traffic. Improperly working VPNs may not produce error
messages, and successful attackers are unlikely to tell you about it.
In both cases, the other end may receive the information sent. If the
real world does not flag failure, and the software cannot, how can one
identify a properly functioning VPN? This is a serious problem and
there is no known solution, only various workarounds. The least
reasonable of those is blind faith that it's all working right.

Welcome to the world of attempts at secure communication. It's an
interesting place (remember the Chinese curse?). ww

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy