THE WELCH COMPANY
440 Davis Court #1602
San Francisco, CA 94111-2496
415 781 5700
rodwelch@pacbell.net
S U M M A R Y
DIARY: November 13, 2004 10:20 AM Saturday;
Rod Welch
Called Morris on working with Netmeeting and a firewall on W2K, XP.
1...Summary/Objective
2...Research Netmeeting Configured with Router Firewall
..............
Click here to comment!
CONTACTS
0201 - Intel Corporation O-00000704 0201
020101 - Mr. Morris E. Jones;
SUBJECTS
Default Null Subject Account for Blank Record
0903 -
0903 - ..
0904 - Summary/Objective
0905 -
090501 - Follow up ref SDS 2 GN57, ref SDS 1 5H4G.
090502 -
090503 - Worked on configuring Netmeeting; will continue this evening.
090505 - ..
090506 - Submitted email to Morris with link to this record confirming
090507 - progress, and planning. Sent a copy to Gary.
090508 -
090509 -
090510 -
090511 -
090512 -
090514 - ..
0906 -
0907 -
0908 - Background
0909 -
090901 - The other day, Gary and I tried setting up Netmeeting to jointly work
090902 - on the SDS Subject Index for something. possibly to consider how to
090903 - transfer multiple account structures from one user to another, rather
090904 - than do this one account at a time.
090906 - ..
090907 - Gary had to locate Netmeeting on computer under XP, because Microsoft
090908 - has dropped support in XP to use a different system. For some reason
090909 - the new Microsoft system was not tried during this call. Gary found
090910 - the Netmeeting program on his computer under the XP program -- not
090911 - sure which directory.
090913 - ..
090914 - We used instructions from the record on 020110 when Morris used
090915 - netmeeting, ref SDS 1 5H4G, to demonstrate advantages of Microsoft
090916 - programs, principally trying to use Word and Outlook for intelligence
090917 - support enabled by SDS, as outlined in NWO. ref OF 12 A56M
090919 - ..
090920 - Those instructions call for obtaining an IP address by calling Help
090921 - and About... from within the Netmeeting program.
090923 - ..
090924 - At that time, this procedure yielded only a single IP Address....
090925 -
090926 - 192.168.0.2
090928 - ..
090929 - The record on 020110 says that an IP address that begins with 192...
090930 - is not adequate for using Netmeeting. ref SDS 1 XV5G
090932 - ..
090933 - Gary and I worked on configuring a Netmeeting session for about 30
090934 - minutes or so, but could get an IP address for making a connection.
090936 - ..
090937 - Today, Morris said...
090938 -
090939 - 1. Router firewall is blocking Netmeeting from finding IP address.
090941 - ..
090942 - 2. IP address beginning with 192...., is not good for Netmeeting. Need another
090943 - assigned each time people sign on.
090945 - ..
090946 - 3. Need to enable TCP port.... 1053
090948 - ..
090949 - 4. To look up firewall status, open IE.
090950 -
090951 - Routers with firewalls typically store access data at...
090952 - 192.168.1.1
090954 - ..
090955 - 5. Enter at the address line (location bar) for IE....
090956 -
090957 - 192.168.0.1 press Enter
090959 - ..
090960 - 6. This opens a dialog that asks for a username and a password.
090961 -
090962 - Found these access codes for username and password in the
090963 - record on acquistion of the router on 030814. ref SDS 3
090964 - 6L5J
090966 - ..
090967 - 7. This opens a session for configuring...
090968 -
090969 - Netgear Cable/DSL Web Safe Router RP614v2
090971 - ..
090972 - 8. There are options along the left side of the screen. Under
090973 - Advanced, there is an option for Port Forwarding. Select Port
090974 - Forwarding.
090976 - ..
090977 - 9. This opens another location that has a field for....
090978 -
090979 - Services
090981 - ..
090982 - This has a pull down arrow, that shows an option for
090983 -
090984 - Netmeeting
090986 - ..
090987 - 10. Select Netmeeting for Services, and click "Apply" near the
090988 - bottom of the screen.
090990 - ..
090991 - 11. Then check Netmeeting Help About to see if there is another IP
090992 - address.
090994 - ..
090995 - None of this worked to produce an IP address.
090997 - ..
090998 - Morris explained that firewalls are intended to prevent access, and we
090999 - are attempting to set up access through the Internet. He advised that
091000 - at Intel, Netmeeting has been configured to permit internal use across
091001 - their intranet network.
091003 - ..
091004 - By this time, Morris was in a hurry for another task. We will work on
091005 - it some more this evening after dinner, OA 2000.
091007 - ..
091008 - After the call, did some research on the Internet and found sources
091009 - with ideas. Sent a letter to Morris linked to this record which
091010 - Morris can review. ref SDS 0 HL4U
091011 -
091013 - ..
0911 -
0912 -
0913 - 1937 Called Morris
0914 -
091401 - He has a new project to help Steven install a new hard disk in his
091402 - computer. We investigated the configuration for about 30 minutes.
091404 - ..
091405 - Initially, tried to disconnect the DSL modem from the router and
091406 - connect directly to the computer to bypass the firewall. This failed
091407 - because the connection requires software to connect from the computer
091408 - to the DSL service provider server. That software has to be be
091409 - installed and configured.
091411 - ..
091412 - Morris read through the 4 ideas proposed in the research, per below.
091413 - ref SDS 0 NG4I
091415 - ..
091416 - Finally, decided that connecting Netmeeting with the router presents
091417 - too many connection and security issues.
091419 - ..
091420 - Morris suggested trying Windows Messenger.
091421 -
091422 - http://messenger.msn.com/
091424 - ..
091425 - This requires setting up a hotmail email account, and the description
091426 - says....
091427 -
091428 - Talk online, in real time, with friends, family, and
091429 - colleagues. It's faster than e-mail, more discreet than a
091430 - phone call, and best of all - it's free!*
091432 - ..
091433 - This does not sound like Netmeeting support for demonstrating things
091434 - on another user's computer.
091435 -
091436 -
091437 -
091438 -
091439 -
091440 -
091442 - ..
091443 - Research Netmeeting Configured with Router Firewall
091444 -
091445 - Found on the Internte....
091446 -
091447 - Netmeeting IP address firewall
091448 -
091449 - ...and found a location...
091451 - ..
091452 - http://support.microsoft.com/kb/q158623
091453 -
091454 - ...with the title....
091455 -
091456 - How to Establish NetMeeting Connections Through a Firewall
091458 - ..
091459 - This article says in part...
091460 -
091461 - ...describes how to use Microsoft NetMeeting to establish
091462 - connections over the Internet when you use a firewall to connect to
091463 - the Internet.
091465 - ..
091466 - NetMeeting uses the following Internet Protocol (IP) ports...
091467 -
091468 - Port Purpose
091469 - -------------------------------------
091470 - 389 Internet Locator Server [Transmission Control
091471 - Protocol (TCP)]
091472 - 522 User Location Server (TCP)
091473 - 1503 T.120 (TCP)
091474 - 1720 H.323 call setup (TCP)
091475 - 1731 Audio call control (TCP)
091476 - Dynamic H.323 call control (TCP)
091477 - Dynamic H.323 streaming [Realtime Transport Protocol (RTP)
091478 - over User
091480 - ..
091481 - To establish outbound NetMeeting connections through a firewall,
091482 - the firewall must be configured to do the following:
091484 - ..
091485 - Pass through primary TCP connections on ports 522, 389, 1503,
091486 - 1720 and 1731.
091488 - ..
091489 - Pass through secondary UDP connections on dynamically
091490 - assigned ports (1024-65535).
091491 -
091492 -
091493 -
091495 - ..
091496 - Further research found....
091497 -
091498 - http://www.meetingbywire.com/Firewalls.htm
091499 -
091500 - ...which says in part...
091501 -
091502 - There are four types of products that seem to be problems for
091503 - NetMeeting users -- most used to be corporate only problems but
091504 - lately home users setting up networks or running on full time
091505 - connections ( cable modem and dsl connections) have come upon the
091506 - same issues:
091507 -
091508 - 1. NAT routers (these are mostly used to provide access to the
091509 - internet for a LAN via a single routable IP address)
091511 - ..
091512 - 2. Proxy servers (often these are used in the same situation as
091513 - NATs but sometimes have extensive firewall functions)
091515 - ..
091516 - 3. LAN Firewalls - usually these provide some sort of NAT
091517 - function in addition to extensive LAN protection features
091519 - ..
091520 - 4. Personal firewall products (Black Ice Defender, Zone
091521 - Alarm, Norton's NIS (formerly AtGaurd), McAfee's Conseal)
091523 - ..
091524 - NetMeeting has particular problems operating with these products
091525 - because it uses the H.323 protocol - which for some reason has
091526 - embedded IP address information. The NetMeeting resource kit has
091527 - information on H.323 and firewalls that might be useful
091528 -
091529 - http://www.microsoft.com/windows/NetMeeting/Corp/reskit/Chapter4/default.asp
091531 - ..
091532 - This location then has a letter from another engineer that provides
091533 - more details on configuring routers for using Netmeeting, saying in
091534 - part...
091535 -
091536 - ...the router will function as an H.323 proxy, but ONLY on an
091537 - outgoing call. You can observe this by doing two things. First, go
091538 - to the Log tab, click the Enable Access log radio button and then
091539 - set the logging address to 255 so that the SNMP log messages are
091540 - broadcast to the entire LAN subnet. Don't forget to click Apply.
091541 - Second, the stardard reporting tools included in the router web
091542 - interface will not get you the information that you need. You want
091543 - to get a free product called SNMP Trap Watcher that will log all
091544 - messages coming out of the router. This can be downloaded for free
091545 - by going to the BTT Software site at
091546 -
091547 - http://www.bttsoftware.co.uk/
091549 - ..
091550 - Once you are running SNMP trap, you want to filter out a number of
091551 - messages (BFREE), but I will ignore this detail for now. If you
091552 - make an outgoing call, you will see that the router actually knows
091553 - that H.323 is in use and will allow the outgoing connection.
091554 - Pretty cool, eh?
091556 - ..
091557 - The gotcha is that the target machine being called must NOT be
091558 - behind a firewall or NAT device *OR* be on a H.323 gateway that is
091559 - NOT behind a firewall or NAT device *OR* the router itself must
091560 - have some sort of H.323 knowledge (more on this below #2). This is
091561 - almost NEVER the case and for good reason.
091563 - ..
091564 - Given the amount of virii, script kiddies and other advertising
091565 - lossage, you really have to be nuts NOT to have a consumer system
091566 - (i.e., Windows) behind a NAT firewall these days. So, as a result,
091567 - the Netmeeting calls will *always* fail. What to do? Thus far, I
091568 - have found four solutions, here they are with associated drawbacks:
091569 -
091570 - 1. Have both parties put their machines in the router DMZ. This
091571 - is usually the easiest and most direct way to explain to
091572 - somebody. Note that the documentation for the router says
091573 - that the specified hosts must not be DHCP but have hardwired
091574 - IP addresses. This is not true.
091576 - ..
091577 - I have local DHCP hosts that I have put in the DMZ; it works
091578 - fine, but you will have problems if the local host IP address
091579 - changes. These typically won't if you don't reboot. My hosts
091580 - stay up an average of two to three months between reboots (I
091581 - use UPS's), so this isn't a problem for me.
091583 - ..
091584 - The benefits of using the DMZ is that you can get an
091585 - unsolicated incoming call, if you keep netmeeting running.
091586 - This can be nice because the person calling you doen't have
091587 - to contact you first through some other channel to be ready
091588 - to get the call. This is important if you are doing support
091589 - work, for example. However, you can't have more than one
091590 - person at the same time on the local LANs making a call.
091592 - ..
091593 - The real problem is that the host that you are running in the
091594 - DMZ is now running around on the Internet with its electronic
091595 - pants down, so to speak. Remember what I said about being
091596 - nuts? Well, for the length of time that you are in the DMZ,
091597 - the bad guys can get at you and believe me, they are looking
091598 - ALL THE TIME.
091600 - ..
091601 - You must carefully close a number of ports and it isn't
091602 - directly obvious (or even possible) how to do this on some
091603 - versions of Windows. You have to load NetBEUI and the
091604 - Microsoft loopback device and then make sure that your WINS
091605 - Client is bound to only that. If you have XP, you also have
091606 - to go through the hassle of making it talk to these systems
091607 - because NETBEUI isn't included by default.
091609 - ..
091610 - Even the H.323 Gateway mentioned previously has this EXACT
091611 - SAME RISK: you must put the (Windows) system running the
091612 - gateway in the DMZ and worry about securing that. Sounds
091613 - risky and like a hassle? It is to me. I *NEVER* use this
091614 - unless I absolutely *have* to take a call from somebody who
091615 - can't do it any other way.
091617 - ..
091618 - I try really hard to use #2 below before I do this.
091619 -
091621 - ..
091622 - 2. Use the port triggering mechanism of the LinkSys router to
091623 - only allow ports to be opened on an incoming call. This has
091624 - the advantage of allowing you to get incoming calls without
091625 - being in the DMZ, but it is not quite completely secure or
091626 - convenient. To do this, you must have some idea of the ports
091627 - that Netmeeting uses and for what reason. For brevity (?), I
091628 - won't explain these further, but they are:
091630 - ..
091631 - Service Type Port or Port Range
091632 -
091633 - Internet Locator Server TCP 389
091634 - User Location Server TCP 522
091635 - T120 TCP 1503
091636 - H.323 Call Setup TCP 1720
091637 - Audio Call Control TCP 1731
091638 - H.323 call control TCP (*Dynamic) 1024-65535
091639 - H.323 streaming UDP (*Dynamic) 1024-65535
091641 - ..
091642 - It is these dynamic ports at the bottom of the list that are
091643 - the problem. H.323 negotiates channels to stream the audio
091644 - and video data. Since the router really has no idea of what
091645 - TCP/UDP ports these channels will be on, it can't forward
091646 - them, a priori. This is why Netmeeting will not work behind a
091647 - NAT device.
091649 - ..
091650 - However, you can use the LinkSys port triggering feature (as
091651 - what I think of as a 'hack') to get things to work. To set up
091652 - the appropriate triggering, you want to go to the advanced
091653 - tab of your router and select forwarding. Once you do this,
091654 - you must then select port triggering and fill in the above
091655 - values, viz:
091657 - ..
091658 - Application Trigger Incoming
091659 - Name Port Range Port Range
091660 -
091661 - 1. Netmeeting 389-389 389-389
091662 - 2. Netmeeting 522-522 522-522
091663 - 3. Netmeeting 1503-1503 1503-1503
091664 - 4. Netmeeting 1720-1720 1720-1720
091665 - 5. Netmeeting 1731-1731 1731-1731
091666 - 6. Netmeeting 1024-65335 1024-65335
091668 - ..
091669 - As always, don't for get to click Apply or your changes may
091670 - be lost if you switch to another page. The observant reader
091671 - (are there any still reading this?) will now notice that I
091672 - haven't said ANYTHING about an IP address for a machine to
091673 - get the calls to, yet. It isn't necessary. The way this works
091674 - is that when YOU make an OUTGOING call, use of ANY of these
091675 - ports will cause them ALL to be opened and an incoming
091676 - request on any of them to be forwarded to your computer.
091678 - ..
091679 - So what happens is that you call the other person and then
091680 - that person calls you. Both calls fail. Now that all the
091681 - ports are open and properly forwarded, the next call will
091682 - succeed, but you better be quick before they get closed.
091683 - More details on this can be found at...
091684 -
091685 - http://users2.ev1.net/~wufdog/Linky/NetMeeting.htm
091686 -
091687 - ...and....
091688 -
091689 - http://www.dslreports.com/forum/remark,1020195;root=equip,16;mode=flat
091691 - ..
091692 - The benefits of this are that now any host on your local LAN
091693 - can make an outgoing call, thus setting up things to get a
091694 - remote call, for a time. However, I don't know how long the
091695 - ports stay open and that's part of the problem. The router
091696 - does not know which port is the 'primary' port. So, outgoing
091697 - activity on ANY of them will cause them all to be triggered.
091699 - ..
091700 - If you have somebody else on your LAN using any of these port
091701 - ranges, then they may trigger the port triggering to their
091702 - machine and you may find that your call will drop. As above,
091703 - you can't have more than one person at a time on the local
091704 - LANs make a call.
091706 - ..
091707 - But the real problem I have is that having such a *huge*
091708 - range of port addresses triggered is a potential security
091709 - issue. Once you've triggered (and hence opened one port), you
091710 - have opened well over 60,000 other ports and they are now all
091711 - coming to your machine. Who knows what is listening on these
091712 - ports?? Script kiddies doing port scanning (and they do this
091713 - all the time) can now poke around on any port that you have
091714 - open in this range. They'll find out which ports are open for
091715 - you... This should not make you feel comfortable.
091717 - ..
091718 - Actually, it's not quite as bad as that; the major security
091719 - loop holes in Windows are ports 135, 137, 138 and 139 which
091720 - support NetBIOS file transfer, RPC and Windows Messenger
091721 - service. These are clearly not triggered by the above.
091722 - However, it's probably a good idea to filter these ports, to
091723 - prevent anybody in your subnet from publishing or accessing
091724 - remote shares and doing other things. I have them filtered.
091725 - Go to Advanced -> Filters page to do this. Note, you will no
091726 - longer be able to publish a share on the Internet. That's a
091727 - good thing most of the time.
091729 - ..
091730 - Another drawback of this approach is that you can't get an
091731 - unsolicated incoming call, even if you keep netmeeting
091732 - running. That is because port triggering works (and can only
091733 - work) when you (usually both of you) initiate an outgoing
091734 - call from your LAN to the WAN. So, the person calling you
091735 - must contact you first through some other channel to be ready
091736 - to get the call. This could be email in which you schedule a
091737 - time, but is typically a phone call.
091739 - ..
091740 - Finally, the router supports something called StateFul Packet
091741 - Inspection that will allow it to crack packets to figure out
091742 - what to open, but I don't know anything more about it as it
091743 - is still in beta.
091744 -
091746 - ..
091747 - 3. Use of Point to Point Tunneling Protocol (PPTP). You may have
091748 - noticed IPsec Pass Through and PPTP Pass Through listed on
091749 - the router advanced -> filters page. These allow you to set
091750 - up a host to host virtual private network if you enable them.
091752 - ..
091753 - I won't go into detail here, but you can set up *any* Windows
091754 - machine from 98 on up as a VPN client and any machine from NT
091755 - up as a VPN server. The client machine sets up a virtual
091756 - private network connection to the IP address of the remote
091757 - WAN. The remote router is then set to route port 1723 to the
091758 - machine doing the serving which has an incoming connection
091759 - configured.
091761 - ..
091762 - The advantages here are that once you've made the connection,
091763 - your client machine now shows up as a real IP host in the
091764 - target LAN. Netmeeting calls work trivially because there is
091765 - no NAT getting in the way; you are literally behind the
091766 - firewall and look local. You can call anybody on the LAN and
091767 - they can call you. Note that you have to set it up "the other
091768 - way around" if you want the remote person to be able to call
091769 - you.
091771 - ..
091772 - With this solution, you can now make an unsolicted call
091773 - whenever you want and not have to call somebody beforehand
091774 - (again, assuming that they are running netmeeting). You just
091775 - click on the remote connection and after some bit banging,
091776 - you are on the remote LAN with a remote IP address and can
091777 - make the call.
091779 - ..
091780 - NETBEUI is also forwarded, so you show up in the local
091781 - workgroup. This enables you to securely transfer data. It
091782 - also looks 'cute' to customers because they can now see that
091783 - you are actually there. You can do a "net send <host>" to
091784 - bother people.
091786 - ..
091787 - Both the video and audio of the call are now encrypted which
091788 - can be important if you are worried about being HIPAA
091789 - conformant or are just plain paranoid. No ports are opened up
091790 - besides 1723 which enforces security. This is my preferred
091791 - method, it's cheap and it works (mostly).
091793 - ..
091794 - There *are* a number of problems. The Microsoft PPTP product
091795 - is not robust in a couple of areas. The VPN link can go down
091796 - after a while for no apparent reason (even if you have a ping
091797 - -t running in the background).
091799 - ..
091800 - There are routing issues, also. Once you make the VPN call,
091801 - Windows will assume that the initiating client wants to route
091802 - ALL IP traffic over the VPN link. This means that if you are
091803 - listening to a net radio station, that traffic is now going
091804 - to get routed to the remote site which has to figure out what
091805 - to do with it. This can be a problem if the remote router
091806 - blocks the traffic or (more typically) doesn't have the
091807 - bandwidth for the radio and your netmeeting call.
091809 - ..
091810 - I have also had to reboot machines in order to unstick them,
091811 - which can be a problem if the machine is remote. It's another
091812 - phone call... The routing tables can get glitches (see
091813 - previous paragraph), but I can usually fix these by hand
091814 - tweaking things with the route command.
091816 - ..
091817 - If you use DHCP, the remote VPN server can sometimes get
091818 - mixed up and hand out the wrong IP address causing conflicts
091819 - (and hence loss of service). The longer you keep the system
091820 - up, the more likely this is.
091822 - ..
091823 - You can NOT configure a system with dual NICs to get an
091824 - incoming VPN call without Windows losing track of one of the
091825 - NICs. This is a real problem if you have highly available
091826 - machines (like three of mine); none of them can be servers.
091827 - It's a 'documented' issue. Who knows when it will be fixed...
091829 - ..
091830 - Security flaws have been found in a number of areas dealing
091831 - with authentication and buffer overflow. Since you are doing
091832 - encryption, you are going to use more network bandwidth and
091833 - the system doing the encryption will see more load. I have an
091834 - encrypting board on some of my slower systems to handle that
091835 - issue.
091837 - ..
091838 - It is possible that some regulatory agencies, comercial
091839 - agreements and/or governmental policy will forbid encrypted
091840 - traffic, particularly if you are going International.
091842 - ..
091843 - The main problem is that the user experience is no longer at
091844 - the consumer level. There are more things to click and when
091845 - things go wrong (as they frequently will), you'll need a
091846 - technical person around to kick the bits. That's a problem if
091847 - you are trying to support or talk to a remote non-technical
091848 - person.
091849 -
091851 - ..
091852 - 4. Use an encrypting router. Remember the BEFVP41 I mentioned
091853 - above? It can set up a VPN for you and route traffic between
091854 - the two subnets. You go to the VPN page and set up a tunnel
091855 - to your remote user and they do the same. Click connect and
091856 - you are all done. It took me about 10 minutes to set all this
091857 - up. What are the benefits? Because the router itself is now
091858 - handling the traffic and connections:
091860 - ..
091861 - a) Zero configuration changes to make on your local systems.
091863 - ..
091864 - b) It works for ANY kind of local host (Linux, Tops-20,
091865 - etc.) and ANY kind of port: Games, ftp, Telnet, WINS all
091866 - work.
091868 - ..
091869 - c) The router offloads the encryption, so your slow hosts
091870 - don't run out of gas.
091872 - ..
091873 - d) The router worries about keeping the VPN up and it seems
091874 - to do a great job. I have had zero (yes, that's "0")
091875 - downtime to my remote sites since I have started using
091876 - the BEFVP41.
091878 - ..
091879 - e) Great security; everybody is behind a firewall.
091881 - ..
091882 - f) Netmeeting calls are encrypted over the Internet.
091884 - ..
091885 - g) Unsolicted calls are now allowed in BOTH directions.
091887 - ..
091888 - h) Highly available systems continue to work.
091890 - ..
091891 - i) Windows 2000 and Windows XP have built in IPsec clients
091892 - that will allow you to use this from another site, even
091893 - if it doesn't have an encrypting router providing it
091894 - allows IPsec to go through unmolested on port 500.
091896 - ..
091897 - j) NO CHANGES IN THE TYPICAL END USER EXPERIENCE!!!
091898 -
091900 - ..
091901 - It should be obvious that I *love* this router. I can't wait
091902 - to get rid of my other BEFSR41 router. However, there are
091903 - some minor concerns that you should be aware of.
091904 -
091905 - a) There needs to be at least one (and better) two
091906 - routers.
091908 - ..
091909 - b) Cost: a BEFVP41 is at about twice the price of a
091910 - BEFSR41. I have seen the BEFSR41 go for about $60 US and
091911 - the BEFVP41 list for about $115 US. This cost issue is
091912 - what kept us using #3 until we got fed up with it.
091914 - ..
091915 - c) Because you are using encryption, you will use (some)
091916 - more bandwidth. This could be a problem on capped cable
091917 - lines or DSL lines with limited upload bandwidth
091919 - ..
091920 - d) You do need to have some technical chops to get it set
091921 - up (but you can basically forget about it after that).
091923 - ..
091924 - e) If you want it up all the time, you will need a UPS.
091926 - ..
091927 - f) It only makes sense for people that you call a lot. For
091928 - the arbitrary call to the arbitrary person, it's a
091929 - hassle to have to set up and tear down all those
091930 - tunnels. In our case, it has *eliminated* long distance
091931 - calls to remote sites. This could help offset the cost
091932 - of the router.
091934 - ..
091935 - g) The VPN'ed subnets now have *complete* access to each
091936 - other (i.e., there is no firewall protecting hosts on
091937 - one site from accesses by hosts on another). You may
091938 - have to take steps to secure hosts if you have people
091939 - poking around (like students, children or curious
091940 - adults). This is a real problem for Windows 98.
091942 - ..
091943 - h) It is possible that some regulatory agencies, commercial
091944 - agreements and/or governmental policy will forbid
091945 - encrypted traffic, particularly if you are going
091946 - International.
091948 - ..
091949 - i) Once it's up and people realize the call is free, you
091950 - sure do get bugged a lot!
091951 -
091953 - ..
091954 - Anyway, I hope that I've been of some help. The point that I
091955 - want to make here is that there should be less netmeeting
091956 - banging. Netmeeting usually works just great (when it works)
091957 - and you can get Macintosh clients. Unfortunately, for
091958 - efficiency reasons, it needs to negotiate seperate ports and
091959 - these can get you into trouble when you are running NAT
091960 - (which nearly all people do).
091961 -
091962 -
091963 -
091964 -
091965 -
091966 -
091967 -
091968 -
091969 -
091970 -
091971 -
091972 -
091973 -
091974 -
091975 -
091976 -
091977 -
091978 -
091979 -
091980 -
091981 -
091982 -
091983 -
091984 -
091985 -
091986 -
0920 -
Distribution. . . . See "CONTACTS"