We have established a VPN in our office. How can we establish peer-to-peer wireless file transfers over that V...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The main advantage of peer-to-peer (ad hoc mode) wireless is avoiding the need for network infrastructure -- access points, switches, routers, gateways, firewalls. The main disadvantage is that you forego all of the functionality normally provided by that infrastructure -- in this case, your VPN gateway. There is no way to use your office VPN to secure file transfers conducted over peer-to-peer wireless connections.
However, depending on the VPN client, an end-to-end IPsec connection may work. Most remote access VPNs follow a client/server model: the VPN client connects to a VPN gateway at the edge of the network to be accessed. However, IPsec also supports gateway-to-gateway and host-to-host configurations. Tunnel mode IPsec creates site-to-site VPNs between gateways, while transport mode IPsec secures traffic between hosts. Check your VPN client's documentation to determine whether it supports transport mode. For example, if you use Windows XP/2000, see these instructions: part one, part two.
Alternatively, consider using a secure file transfer protocol, like SFTP. Links to several free SFTP clients can be found here. Or just enable WPA2-Personal security on the peer-to-peer wireless link to protect all messages sent over the air, including file transfer.
Dig Deeper on Troubleshooting Wireless Networks
Related Q&A from Lisa Phifer
Whether you need a basic open source mobile device management tool for your company's Apple or Android devices, or something more customized, you ...continue reading
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network.continue reading
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.