If I had a dollar for every time my wife has told me "Don't worry... lots of guys occasionally experience high latency..."
-sc From: Andy Shook [mailto:[email protected]] Sent: Wednesday, August 12, 2009 6:55 PM To: NT System Admin Issues Subject: RE: PC in domain across stable VPN tunnel? +1 and I would also advise to modify slow link detection via GPO to suit your needs, if your limited by pipe size [1] [1] You're welcome, sc Shook From: Steven M. Caesare [mailto:[email protected]] Sent: Wednesday, August 12, 2009 6:51 PM To: NT System Admin Issues Subject: RE: PC in domain across stable VPN tunnel? My laptop is part of my home domain and I VPN home from. I typically use cached credentials, and other than occasionally having to re-map drives, it simply works. It was, however, joined to the domain on a local LAN then VPN'ed in after that. -sc From: Tom Miller [mailto:[email protected]] Sent: Wednesday, August 12, 2009 5:18 PM To: NT System Admin Issues Subject: PC in domain across stable VPN tunnel? Hey folks: I have about 15 sites that have 2- 5 users/PCs that have "business class" broadband (a bit faster than typical home access). Soon I plan to provide each site a soho firewall and will have a VPN tunnel from each site to here at HQ. I'd love to be able to add these PCs to our domain so I could enforce our various GPOs at these locations. Has anyone done this? I already have several tunnels like this at other locations but haven't added the PCs to the domain. I'm not sure about the cross-tunnel authentication, but if it's not too slow (no mapped drives or logon scripts), I'd do it. It would be nice to have these users log into the domain as well. Comments, suggestions, words of wisdom? Tom Miller Engineer, Information Technology Hampton-Newport News Community Services Board 757-788-0528 Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
