Jump to content
RESET Forums (homeservershow.com)
Skippy

Windows VPN and VPN Services

Recommended Posts

Skippy
I've had my WHS 2011 going for a while, but only just set up a VPN. Now I know what a VPN does, but I'm wondering why set one up in WHS? What are the pros and cons of using WHS vs a VPN through CyberGhost?

I not a pirater or a hacker, but security and anonymity have been playing on my mind in this post Snowdon world. Does WHS mask my webtraffic from my ISP? Can this only be done thru a 3rd party VPN client? is the new IP assigned through my WHS VPN still a way to track me through my ISP?

Excuse the naivety of the questioning, but I am trying wrap my head around how much trust I should have in my windows VPN. I would have it anyway, as I want to allow access to my server when I am travelling. But the intensiveness of 3rd parties spying while online has got me a bit PO'd.
 

Share this post


Link to post
Share on other sites
Drashna Jaelre

Do you mean connect to WHS' VPN or connect WHS to a VPN service?

 

 

If you mean connecting to WHS' VPN, then here:

Are you sure that CyberGhost or whatever service is NOT logging your traffic? Are you sure they're not?

 

Using your own VPN server on WHS allows you to connect to your server, and route your traffic through your ISP. This is great for cellphones or mobile devices.  And it doesn't cost anything more than have a server that is on, and an internet connection.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Similar Content

    • nrf
      By nrf
      A recent change in my ISP setup forced me to deal with an issue I have been keeping on the back burner. A while back, I had to change to a new VPN client for work. I had difficulty connecting as it told me a firewall must be blocking IPSEC or UDP. Blaming it on the router I had circled thru several with some initial success but ultimately failure. Having no choice now, I have narrowed it down to my network switch. the VPN is IPsec to a cisco vpn server (port 4500 and all).
       
      Bottom line, with switches like GS108Tv2 and GS-1100-5 between my work pc and router (currently Sophos UTM 9) no problem. But my fancy tplink t1600g-28ts, no go. it validates the password ok but can't connect the vpn itself. 
       
      Any seasoned veterans out there have an idea how this switch could be messing it up?
      thanks in advance!
      nrf
    • lordcroci
      By lordcroci
      Hi there!
      I'm new around here, looked for the presentation thread but haven't found any! 
      Anyway I hope to be able to contribute (as far as my newbie's knowledge will be useful )....

      Speaking about what I'm trying to do, I have this amazing microserver gen8, on which I have 2 3tb wd red as storage and an ocz 125gb ssd on 5° port.. Installed a couple of days ago mr. PROXMOX (I'm a complete newbie to it too ) and configured the xpenology 6.0 that runs amazingly!
      Now.. I'm just wondering which is the best option to configure a vpn (possibily openvpn) and from my inexperience I found a couple of options:
      - try a container with turnkey debian 8 OpenVPN
      - install ubuntu on a VM and setup openvpn
      - try the vpn server on xpenology
       
      or the least pleasurable
      - install openvpn on my windows 10 pc and leave it turned on in way to access the microserver through vpn.. 
      What do you think is better to do? Considering that I am a real noob and will need some guide or some tutorial (already googled something and Have found a lot of material on the openvpn site.. but honestly can't find so much about proxmox and vpn)

      PS: sorry for my english, but I'm italian and I'm still learning!
       
      thanks a lot!
      Lordcroci
    • Camperdownfamily
      By Camperdownfamily
      I used to run a Win Home Server V1, then an Amahi Home Server and now I have built a Home Server based on Win 10 Pro.
       
      I have got everything running really well except for the VPN for remote access.  For some weird reason, I can connect remotely to my Home Server by VPN and it gives me an IP address on the home network ok, but I can't see, access or ping the Home Server itself - yet I can access every other piece of kit connected to the home network (printer, router, other PCs, etc.) through the VPN by entering their IP address into my browser or by pinging them through the command line Ping command with their IP address.
       
      It's as though, by providing access the the rest of the network, the Home Server has become invisible to itself and so I can't access anything on it.
       
      I have used the built-in Windows VPN on Win 10 Pro, rather than using a third party package.  I have been using Terry Walsh's "How to Build a Windows 10 Pro Home Server" e-book which has been excellent so far, except that on this, it tells you how to set up the VPN and then just says - go ahead and connect to your remote Home Server - but doesn't address any potential problems - like this one.
       
      Is this something anyone has seen before?  Any ideas what the problem could be?
    • doliveira
      By doliveira
      Hi,
       
      At my home office i have a HP Microserver N40L and i use “Windows Server 2012 R2 Essentials”.
       
      On the past i had some initial configuration and instability problems with Anywhere Access + VPN, but somehow i finally have them working properly and stable for the last months. 
       
      But last week i needed to format the server and install a brand new and clean “Windows Server 2012 R2 Essentials”.
       
      I have made the installation, then made all the updates, then i have added some roles and features and then i went to setup Anywhere Access + VPN and it’s giving me 2 errors (one saying that i have port 80 and 443 blocked and other saying i have more than one router on my network).
       
      Both errors do not exist, because besides manual confirmation that ports are open, no network configuration was changed since last week. And if all was working in the past, now all should also work.
       
      I have already try to turn all off and then try again to run the Anywhere Access + VPN repair wizard and the errors are still the same.
       
      I have already pass too many hours trying to identify what is wrong… and i can’t wait to much longer.
       
      So i have 2 requests to make to anyone reading this:
       
      1- If anyone has any idea of what is the problema, and wants to share the advice, great! Please do.
       
      2- I’m willing to hire and pay to an expert to remote login my server and solve the problem. I can provide remote access and be your remote eyes so you can see all the network setup. If you can do this, please reply to this thread with your email or send me a PM.
       
      ---------
       
      My network setup is as follows:
       
      ISP Router (in bridge mode) > Router TP-Link ER-5120 > Smart Switch TP-Link TL-SG108E
       
      Then Smart Switch then connects:
       
      - Port 1 to Router
      - Port 2 to Access Point TP Link TL-WA901ND (with QVLAN enable for private and public wifi networks)
      - Port 4 to Unmanaged Switch TP-Link TL-SG1016
       
      Then the Unmanaged Switch connects to my server and my home office computers.
       
      --------
       
      Thanks
       
    • doliveira
      By doliveira
      Hi,
       
      After I have setup my office network and installed the “Windows Server 2012 R2 Essentials” Connector on all the Windows 10 desktop computers, all the desktops connect auto-connect to the server using the desktop Connector. The internal LAN is setup as a private domain network.
       
      But with the Connector installation, I have noticed that it has also been created a VPN on all my desktop computer, inside my office on my internal LAN network that is disabled by default.
       
      In a simple way and to resume, all my desktop computers connect properly to the server using just the desktop connector, with the VPN disabled. 
       
      I just use / enable the VPN on the laptop computers, always when I’m outside the office.
       
      So my question is if I should also always enable the VPN by default on all my desktop computers that are located inside my office on my internal LAN network?
       
      Can anyone advise me on this? Are there any kind of advantages vs disadvantages on having the VPN on vs off inside the internal LAN?
       
      Thanks 
       

Project Fi now accepts iPhone!

Sign up with any phone now.



×