Create a vpn connection

Assignment Help Computer Networking
Reference no: EM131516282

Question: Create a VPN Connection

For this project, you will set up a very simple VPN connection between two computers on a LAN. More complex, and therefore more secure, VPN software, such as OpenVPN, is a better solution for long-term use. However, the process for setting up this software is beyond the scope of this book. Also, if you were setting up a VPN connection over the Internet, you would have to configure your router for port forwarding on the VPN port, which for PPTP VPN as used in this project is 1723

First you will set up the host, or server, for the VPN connection. Then you'll set up the client computer for the connection.

1. Windows 7 and 8 have PPTP VPN services embedded in the OS. Using a Windows 7 or Windows 8.1 computer, open the Network Connections window. (For Windows 8.1, right-click the Start button and click Network Connections. For Windows 7, open the Network and Sharing Center and click Change adapter settings.)

2. In the Network Connections window, press ALT on your keyboard. The menu bar appears. Click File and click New Incoming Connection. If necessary, enter an admin password in the UAC box and click Yes.

3. Check the user account that you want to allow VPN access to this computer. For best security, it should not be an administrator account, and it should have a very strong password. Click Next.

4. Check the Through the Internet option and click Next.

5. Make sure that Internet Protocol Version 4 (TCP/IPv4) is checked and click Allow access.

6. Write down the computer name, and then click Close.

7. Open a command prompt and use ipconfig to determine the computer's IP address. Write this information down as well.

8. Next, you need to open Windows Firewall to allow incoming traffic on TCP port 1723, which is the port PPTP uses. Open the Network and Sharing Center and click Windows Firewall.

9. In Windows Firewall, click Advanced settings. Click Inbound Rules.

10. In the right pane, click New Rule.

11. Click Port, and click Next. If necessary, select TCP.

12. In the Specific local ports box, type 1723. Click Next three times.

13. In the Name box, enter a name for the firewall rule and click Finish. Close all windows. Next you will enable the client computer to initiate the VPN connection.

14. On a different Windows 7 or 8.1 computer, right-click the network icon in the icon tray. Click Open Network and Sharing Center. Then click Set up a new connection or network.

15. Click Connect to a workplace, then click Next.

16. Click Use my Internet connection (VPN), type the IP address of the VPN host computer in the first field and the name of the computer in the second field. Click Create.

17. In the next dialog box, type the username that you authorized to use the VPN connection in the first field and the password in the second field. Click Connect or, in Windows 8.1, click OK. The connection is made.

Reference no: EM131516282

Questions Cloud

How race is central to any discussion of crime fiction : what different conclusions does your interpretation lead you to regarding how race is central to any discussion of crime fiction?
What feelings does the image evoke : What feelings does the image evoke?Does it have a distinct beginning, middle and end? If it's a visual text, what does it look like? What colors are used?
Define use ssh in ubuntu : In this project, you learn to use SSH in Ubuntu. Using the Ubuntu VMs you created in the case projects in Chapters 2 and 3, follow the steps to use SSH.
Create an assessment plan for the mini-unit : Create an assessment plan for the mini-unit that includes demonstrating alignment between formal and informal assessment strategies.
Create a vpn connection : For this project, you will set up a very simple VPN connection between two computers on a LAN. More complex, and therefore more secure, VPN software.
What distinguishes a virus from other types of malware : What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
What does teaching for social justice mean to you : How will this affect your interactions with students and families? What does "teaching for social justice" mean to you?
What is the difference between an ids and an ips : What kinds of issues might indicate a misconfigured ACL?
Describe characteristics of the english immersion program : describe the characteristics of the English immersion program in terms of instructional strategies and time spent in the classroom with other ELL students

Reviews

Write a Review

Computer Networking Questions & Answers

  Explore three reasons for utilizing professional networking

Discuss three reasons for utilizing professional networking during the job-hunting process. Note:Some potential points to consider include: developing a professional network.

  Difference between persistent and non-persistent http

Show what is the difference between "persistent" and "non-persistent" HTTP?

  Network topology & communication

You have been asked by Redline Motors & Equipment, a local motor and performance parts company, to install a network in its new office. The corporate office use to be located within the warehouse, and a small office was leased in a remote location..

  Case study- handmade furniture ltd

Assignment case study: HandMade Furniture Ltd. Each office worker has their own PC. There is a mixture of Windows XP, Windows 7 and Windows 8 installed together with various versions of Microsoft Office

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

  Explain how signal and signal management calls

Describe how signal and signal management calls are used in creating a process and terminating it after certain interval. Give a simple example to illustrate this routine.

  Describe two data transmission technologies associated

Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitations of each technology and protocol.

  Evolution of ethernet from a coaxial cable bus to hub

was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network

  What is the size of data in the ipv4 datagram

An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the size of data in the IPv4 datagram?

  Research and discuss packet-switched networks

Research and discuss packet-switched networks

  What are some causes of the number of bytes

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured. What are the source and destination MAC address in Frame 546

  Data transmission protocol

A certain data transmission protocol the parity error detection concept is used. what does this mean?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd