Hi Justin,
VPN comes in several flavours, e.g. software,Hardware then pptp (non
certificates), L2TP (with certificates), if your hosting company was
running either Windows 2000 or 2003 server, then setting up RRAS (the
technology that allows for VPN connections). At a very basic level you do
not need any hardware other than the Windows 2000/3 server an internet
connection and Windows 2000 pro/server Windows XP at the client end.
Software level vpn implemented on MS software uses either Windows
authentication or RADUIS (what all the DSL providers use to authenticate
their DSL users).
It is true to say that L2TP that uses certificates as part of it's
security is much better than PPTP in terms of security, but is much harder
to setup.
I understand VPN well enough to do my job, which includes connecting to
100+ servers every single day via VPN to support and review them and to
then connect to PC's local on those networks.
VPN does come with problems, like you have unhindered access to the remote
network, and if you had a virus it is very easy for that virus to travel
through the tunnel unhindered. Given my last comment if all your remote
computers are running Windows XP SP2, with a good virus product then this
is a good solution.
Software VPN's do solve a lot of business problems, there are
advantages/disadvantages of both hardware and software VPN's, but to move
data sync'ing with a SQL server, Access MDB the idea does work, I have
several clients who I have custom written VPN connection software bound
into access within a module to auto dial and sync data.
One of the major problems of exposing a SQL server directly on the web is
this what type of security is going to be used, SQL logins/Windows
Authentication. With SQL login's there are no lockouts based on getting
the password wrong x times, Windows Authentication, it means configuring
users on that server for each independent user.
--
Regards
Alex White MCDBA MCSE
http://www.intralan.co.uk