Does anyone have any suggestion?
Its a pure 'standalone' software solution. Easier to install and
MUCH higher performance.
Jeani Rudi wrote in message <6o4abs$e8o$2...@ionews.ionet.net>...
If replying by e-mail please mail wol. Anything else may get missed amongst
the spam.
Just make sure to have the RRAS update loaded on both your server, and if
you are going to have
modem access on this server, make sure the clients are running DUN 1.2.
I am having serious thoughts of removing this and going with another
solution at together, read this :
> fyi: This article appeared in the June 8 issue of Computer World on page
6.
>
> Windows nt security is getting worse.
>
> That's the assessment of top security experts following their
discovery
> last week of yet another security vulnerability in Windows NT that leaves
the
> operating system wide open to password and denial-of-service attacks on
virtual
> private networks.
>
> At least 12 major security breaches have been found so far this year
by
> so-called "white-hat" hackers -- people who look for flaws to expose
rather
> than exploit -- and posted on independent Windows NT security World Wide
Web pages (see box at right).
>
>
>
> The latest glitch cropped up in Microsoft Corp.'s implementation of
the
> Point-to-Point-Tunneling Protocol (PPTP), which the company includes free
as
> part of the
> Remote Access Service in Windows NT 4.0, said Bruce Schneier, head
> cryptographer at Counterpane Systems, Inc., a Minneapolis-based security
> consulting
> firm.
>
> "We found several major security flaws in Microsoft's PPTP that will
let
> hackers sniff passwords across the network, break the encryption scheme,
read
> confidential data and mount denial-of-service attacks against PPTP
> servers," Schneier said. "The security problems in NT will only worsen as
> Microsoft increases
> the complexity of the [operating system]."
>
> Microsoft's version of PPTP -- not the actual protocol itself -- is
so
> severe that "there's no real way to fix it," added Peter Mudge, director
of
the
> L0pht group,
> seven white-hat hackers based in Boston.
>
> Schneier and Mudge advise businesses to use the IPSec protocol
standard
> instead of Microsoft's PPTP. IPSec was designed by the Internet
Engineering
Task
> Force, a standards group.
>
> FRIGHTENING
>
> "This is scary stuff. I'm glad we don't have a [virtual private
network],"
> said Keith Langford, information systems coordinator at The Merrick
Printing
> Co. in
> Louisville, Ky.
>
> Langford and Matthew Merrick, the company's vice president of IS,
said
> although Microsoft has always responded "very promptly" when they have
> approached
> the Redmond, Wash., software maker with problems, they still won't
expose
> Merrick Printing's NT networks to the Internet.
>
> Microsoft has acknowledged the flaw in its version of the PPTP
protocol.
> Microsoft said it is working on a fix that it expects to post "soon." But
> Microsoft officials
> denied Schneier's and Mudge's assertions that its PPTP protocol
couldn't
> be fixed.
>
> KNOWN PROBLEM
>
> Another IS security manager at a Washington-based defense contracting
> firm, who requested anonymity, said he has resisted pressure from his
> management to
> use the Microsoft protocol because he was aware of the flaws.
>
> The security manager said he "fought tooth and nail" to use other
vendors'
> virtual private network products rather than Microsoft's PPTP.
>
> "I've known all along that Microsoft's PPTP is subject to dictionary
> attacks, and it's vulnerable to weak passwords as well. The new problems
are
> the nail in the
> coffin," he said.
>
> NT's popularity has made it the target of an increasing number of
hacks.
>
> "Hacking NT has clearly become a favorite blood sport among the
hacker
> underground," observed Mark Fabro, director of the advanced security
assessment
> division of Secure Computing Corp. in Toronto. NT can be "a secure
> operating system," but only if network administrators are well versed on
> current security
> issues and have updated their NT servers with the latest fixes and
> patches, he said
Good luck.
Jonathon wrote in message <6ntrjn$l3$1...@pollux.dnai.com>...