>>In a win2k world I assume that client hardening means patched to the
eyballs, NTFS + securewksta GPO template, no unneccessary users and no
services listening on non vpn interfaces...?

Exactly, plus the threat of beheading or similar excuse for not keeping it
that way.


>>I'm new to this VPN lark.. what's EAP/LEAP?


LEAP is the on-air rekeying and authentication protocol that Cisco is
currently hyping.  Uses a RADIUS server I believe to token authenticate the
session.  In that way each Wireless-NIC get's its own on-air WEP key
essentially and the access point (AP) knows how to understand each one.
They don't have any stats yet on how many stations per AP are possible, but
it's a step in the right direction, though I wouldn't rely on it entirely
and would still use a VPN for encryption.  It also ties you to their
infrastructure (i.e. only their cards and AP support it).  But they do claim
to deliver QOS over that hardware as well.

>>I am thinking of going down this route. Anyone tried running 100 w2kpro
workstations through a (hardened) w2k server using VPN? I was hoping to be
able to use the VPN server to also allow internet based clients (ie people
accessing from home via thier local ISP) Would this be a bad idea?

All depends on the VPN server technology you are using.  MS PPTP dies at
about 30 stations performance wise.  Checkpoint Secure Client does quite a
bit better.  Ours goes to about 75 stations before either our ISP link or
the server slows things down.  Hardware VPNs are a bit better and usually
result in less issues, but you are usually more limited in terms of client
support.  Just make sure the VPN box is behind the firewall regardless of
what you do.

Cheers
Michel

Reply via email to