We have established a VPN in our office. How can we establish peer-to-peer wireless file transfers over that V...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The main advantage of peer-to-peer (ad hoc mode) wireless is avoiding the need for network infrastructure -- access points, switches, routers, gateways, firewalls. The main disadvantage is that you forego all of the functionality normally provided by that infrastructure -- in this case, your VPN gateway. There is no way to use your office VPN to secure file transfers conducted over peer-to-peer wireless connections.
However, depending on the VPN client, an end-to-end IPsec connection may work. Most remote access VPNs follow a client/server model: the VPN client connects to a VPN gateway at the edge of the network to be accessed. However, IPsec also supports gateway-to-gateway and host-to-host configurations. Tunnel mode IPsec creates site-to-site VPNs between gateways, while transport mode IPsec secures traffic between hosts. Check your VPN client's documentation to determine whether it supports transport mode. For example, if you use Windows XP/2000, see these instructions: part one, part two.
Alternatively, consider using a secure file transfer protocol, like SFTP. Links to several free SFTP clients can be found here. Or just enable WPA2-Personal security on the peer-to-peer wireless link to protect all messages sent over the air, including file transfer.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.