From: Rico on 8 Mar 2006 16:06 In article <MPG.1e77f1c226ed7db598a01f(a)news.cable.ntlworld.com>, David Taylor <djtaylor(a)bigfoot.com> wrote: >In article <9nkPf.31853$wl.17603(a)text.news.blueyonder.co.uk>, >JM(a)blueyonder.co.uk says... >> Setup VPN :-) > >Bzzzt, cheating, that's not using WEP and requires an endpoint ;) It will work over a WEP encrypted connection fundamentalism, fundamentally wrong.
From: Mark McIntyre on 8 Mar 2006 17:27 On Wed, 08 Mar 2006 09:45:40 -0800, in alt.internet.wireless , Jeff Liebermann <jeffl(a)comix.santa-cruz.ca.us> wrote: >I don't have much experience with either of the above routers. Most >of my VPN's are terminated with Sonicwall, Netscreen or products. Can someone explain this 'termination' business? I'm puzzled as my office VPN works absolutely fine through my SMC WBR8204 router, and all I had to do was open some ports on the f/w. Furthermore I've read various online articles about setting up VPNs and not seen any particular mention of this. Mark McIntyre -- ----== Posted via Newsfeeds.Com - Unlimited-Unrestricted-Secure Usenet News==---- http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups ----= East and West-Coast Server Farms - Total Privacy via Encryption =----
From: David Taylor on 9 Mar 2006 02:29 > WEP with a decent passphrase (use hex key to embed in laptop) should be > fine for most purposes. If you are the Bank of England maybe you need more. That's the problem, there's no such thing as a decent passphrase. The passphrase generators don't generate a key which is stronger than any other, the implementation of WEP is simply weak. > Why is someone going to sit around and hack your wireless network when just > down the street the neighbor in the white house with blue shutters has a > wide open network. 1. Bored teenager 2. The unsecured one might be out of range > Think of this like a burglar alarm on your house, will it actually stop a > determined thief, absolutely not, will it get 99.99% of them to try the But I agree apart from 1. above. David.
From: David Taylor on 9 Mar 2006 02:30 > >Bzzzt, cheating, that's not using WEP and requires an endpoint ;) > > It will work over a WEP encrypted connection The question was "is it possible to secure WEP" The answer is NO. You have to use something else. David.
From: Derek Broughton on 9 Mar 2006 08:57
Jeff Liebermann wrote: > On Wed, 08 Mar 2006 22:27:31 +0000, Mark McIntyre > <markmcintyre(a)spamcop.net> wrote: > >>On Wed, 08 Mar 2006 09:45:40 -0800, in alt.internet.wireless , Jeff >>Liebermann <jeffl(a)comix.santa-cruz.ca.us> wrote: >> >>>I don't have much experience with either of the above routers. Most >>>of my VPN's are terminated with Sonicwall, Netscreen or products. >> >>Can someone explain this 'termination' business? > > Sure. A VPN is a tunnel. A tunnel with only one end is a cave. > There's no such thing as a VPN cave unless you need a place to store > surplus bytes. > > When you connect through a VPN, the VPN server (termination) at the hmmm. I think "termination=server" might have been sufficient for Mark's question, but this is all good for me :-) > Now, you connect to a remote VPN server (termination). It gives you > an additional IP address on its network as 192.168.25.53. Note that > this IP cannot be in the same class C IP block as your own LAN. *ding*,*ding*,*ding*! How come? That's not what the Talisman help said - it said "not in the DHCP range of your LAN". So my DHCP server is at 192.168.22.1 and gives out addresses in 192.168.22.100-150. I made the PPTP server address 192.168.22.10 and _it's_ assigning addresses in 192.168.22.20-30 range. I guess that's wrong. Thanks Jeff. -- derek |