From: Rico on
In article <MPG.1e77f1c226ed7db598a01f(a)news.cable.ntlworld.com>, David Taylor <djtaylor(a)bigfoot.com> wrote:
>In article <9nkPf.31853$wl.17603(a)text.news.blueyonder.co.uk>,
>JM(a)blueyonder.co.uk says...
>> Setup VPN :-)
>
>Bzzzt, cheating, that's not using WEP and requires an endpoint ;)

It will work over a WEP encrypted connection

fundamentalism, fundamentally wrong.
From: Mark McIntyre on
On Wed, 08 Mar 2006 09:45:40 -0800, in alt.internet.wireless , Jeff
Liebermann <jeffl(a)comix.santa-cruz.ca.us> wrote:

>I don't have much experience with either of the above routers. Most
>of my VPN's are terminated with Sonicwall, Netscreen or products.

Can someone explain this 'termination' business? I'm puzzled as my
office VPN works absolutely fine through my SMC WBR8204 router, and
all I had to do was open some ports on the f/w. Furthermore I've read
various online articles about setting up VPNs and not seen any
particular mention of this.
Mark McIntyre
--

----== Posted via Newsfeeds.Com - Unlimited-Unrestricted-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
From: David Taylor on
> WEP with a decent passphrase (use hex key to embed in laptop) should be
> fine for most purposes. If you are the Bank of England maybe you need more.

That's the problem, there's no such thing as a decent passphrase. The
passphrase generators don't generate a key which is stronger than any
other, the implementation of WEP is simply weak.

> Why is someone going to sit around and hack your wireless network when just
> down the street the neighbor in the white house with blue shutters has a
> wide open network.

1. Bored teenager
2. The unsecured one might be out of range

> Think of this like a burglar alarm on your house, will it actually stop a
> determined thief, absolutely not, will it get 99.99% of them to try the

But I agree apart from 1. above.

David.
From: David Taylor on
> >Bzzzt, cheating, that's not using WEP and requires an endpoint ;)
>
> It will work over a WEP encrypted connection

The question was "is it possible to secure WEP"

The answer is NO.

You have to use something else.

David.
From: Derek Broughton on
Jeff Liebermann wrote:

> On Wed, 08 Mar 2006 22:27:31 +0000, Mark McIntyre
> <markmcintyre(a)spamcop.net> wrote:
>
>>On Wed, 08 Mar 2006 09:45:40 -0800, in alt.internet.wireless , Jeff
>>Liebermann <jeffl(a)comix.santa-cruz.ca.us> wrote:
>>
>>>I don't have much experience with either of the above routers. Most
>>>of my VPN's are terminated with Sonicwall, Netscreen or products.
>>
>>Can someone explain this 'termination' business?
>
> Sure. A VPN is a tunnel. A tunnel with only one end is a cave.
> There's no such thing as a VPN cave unless you need a place to store
> surplus bytes.
>
> When you connect through a VPN, the VPN server (termination) at the

hmmm. I think "termination=server" might have been sufficient for Mark's
question, but this is all good for me :-)

> Now, you connect to a remote VPN server (termination). It gives you
> an additional IP address on its network as 192.168.25.53. Note that
> this IP cannot be in the same class C IP block as your own LAN.

*ding*,*ding*,*ding*! How come? That's not what the Talisman help said -
it said "not in the DHCP range of your LAN". So my DHCP server is at
192.168.22.1 and gives out addresses in 192.168.22.100-150. I made the PPTP
server address 192.168.22.10 and _it's_ assigning addresses in
192.168.22.20-30 range. I guess that's wrong.

Thanks Jeff.
--
derek