Hello, all,
First time here... some good info, some confusion. Maybe I can help?
I've been dealing with VPNs in some form for 4 years now, and here's some of what I know.
Windows network BROWSING: is terrible. In order to browse a remote network, your client needs to contact a browsemaster on the remote network (enabling NetBIOS broadcast *may* allow you to use a local browsemaster). Problem: browsemaster may change everytime someone reboots. Solution: WINS (or DDNS), though not 100% reliable, cuz still need to connect to browsemaster; WINS just makes it easier to find that guy. If you can distribute a list of names for the important computers (file server, print server, email server), then just connect with drive mapping or by directly connecting to the server, and completely avoid browsing (Windows browsing does *NOT* directly correlate with name resolution), then you are much better off. Still recommend WINS or DDNS (or at the very least, put entries in *everyone's* 'hosts' file (only need 'lmhosts' if you have an NT Domain)).
NetBIOS (aka SMB): very slow and not overly reliable over WAN/VPN. Would suggest Web/FTP/RemoteControl/TermServ solution if must have speed or working with large quantities of data. Since we are dealing with sub-T1 speeds, "large" can be as small as 10-20 MB.
Win2k (and I assume XP) IPSec client: is terrible. I've installed several IPSec products, and none of them are 1/10th as difficult or confusing to configure as M$'s. I know it can be done, I've seen it done, I've never done it (I have tried), my hat's off to anyone who's done it. My suggestion is to go with site-to-site (BEFVP41-t0-BEFVP41) VPN if you can. The BEFVP41 is not really designed for client-to-site VPN and will cause headaches if you try to stick that round peg into the square hole. Go with M$'s PPTP (included with Win2k server for "free" and relatively easy to set up, but known vulnerabilities), or get a dedicated product designed for client-to-site (Cisco, Check Point, Nortel, etc.) (more secure, but also more costly).
Get "connected" (according to router) but have no connectivity: Possible that ISP is allowing UDP 500 (IKE authentication for IPSec Tunnel), so router thinks it successfully connected (my theory, have not verified with Linksys), but ISP does not allow IP Protocol 50 (actual IPSec Tunnel). Some ISPs claim it's a "Business Service" and so won't allow it on their "residential" packages. Of course the "business" packages that *will* allow IP 50 do cost more...
Nice that the Linksys allows dynamic IPs for their VPNs in any fashion. That actually breaks the RFC's for IPSec, as I understand them, but sure makes the VPN routers more useful.
Final note: please don't bash Linksys too hard. They have the most features out of anyone for their price range ($300+ for another vendor for the same functionality, and it limits you to 8 IPs on your LAN), and I'm shocked that their products are as reliable as they are for the price! I used to be a Linksys basher (back when every mini-hub had at least one bad port), but they've been reasonably solid the past 2 or 3 years (no, I don't work for them). For the prices I pay, I am not overly surprised that their tech support is not stellar.
I will be setting up my BEFVP41's tonight. Based on what I've read here, I expect smooth sailing. Wish me luck.
And remember... browsing bad!
Hope this helps someone.