Now that we’ve introduced some fundamental concepts for building a Microsoft Windows Server 2003 VPN server, let’s step through a basic remote access VPN deployment.
The very first thing you must decide when building a Windows VPN server is whether to use Microsoft’s Internet Authentication Service (IAS) to authenticate users connecting to your VPN. IAS is Microsoft’s implementation of RADIUS, and when building a VPN server you can have user’s credentials passed off to IAS for verification or you can have users authenticated directly against Active Directory (AD).
Using IAS provides several advantages. First, it has better logging capabilities, including the ability to send data directly to an SQL database. Second, it provides a central destination at which you can point several VPN servers. This allows you to maintain one set of remote access policies that all of your VPN servers can use. In a nutshell, remote access policies can be characterized as a powerful way to define who is allowed access to the VPN. Assuming IAS is your choice for authentication, let’s jump right into the configuration of an IAS server.
Want to Read More About Windows Server 2003? Check out our Win 2003 High Availability Solutions Series. |
Follow the steps below to install your IAS server. If you are short on hardware, it can be installed on the same server you plan to use for VPN access. This is not recommended for a high security environment, however.
While the IAS admin interface is open, let’s add a remote access policy to allow access to users who are in a specified AD group (the two default groups will not allow anyone to access your VPN server). Here are the steps:
Finally, be sure to update the new remote access policy to prevent rogue computers on the remote user’s network from using the VPN connection to forward packets through the VPN server. Follow these steps:
Start » Administrative Tools » Internet Authentication Service » Remote Access Policies » right click your new policy and select properties » click Edit Profile… » IP tab » Input Filters… » New… » OK » click “Permit only the packets listed below” » OK » OK » OK
Our ISA server is now ready to receive authentication requests from a VPN server. Before you can begin configuring a VPN server, take care of these pre-requisites on the VPN server:
And now, here are the steps required to configure your new VPN server:
Client Side
Next you will need to setup a VPN connection from a client. Here are the steps on a Windows XP machine:
Start » Control Panel » Network Connections » Create a new connection » Next » Connect to the network at my workplace » Next » Virtual Private Network connection » Next » Choose a friendly name » Next » you probably want to select “Do not dial the initial connection” » Next » Enter the host name or IP address of your VPN server » Next » choose who to make the connection for » Next » Finish
That’s it! You should now be able to double click on the VPN connection you just created and logon with a user account that is a member of the group you granted VPN access to in the remote access policy created above.
You may notice that when you connect to the VPN you can’t access the Internet. This is a tricky issue to get around, and the solution depends on your network topology. One obstacle is the default IP filters created on the external NIC where Routing and Remote Access is configured. You can configure these from Routing and Remote Access » YOURSERVER » IP Routing » General » right click on your external interface and choose Properties » click on the Inbound Filters… and/or Outbound Filters … buttons. Be careful when changing these filters as they are created as a security measure.
To configure the split tunnel vs. full tunnel discussed above got to Start » Control Panel » Network Connections » right click your VPN connection » Properties » Networking tab » select Internet Protocol (TCP/IP) » Properties » Advanced… » check or uncheck “Use Default Gateway On Remote Network”. Un-checking this option will create a split tunnel when you initiate the VPN connection; leaving it checked creates a full tunnel.
Related Resources Virtual Private Networks on Technet |
To connect to PPTP or L2TP/IPSec (remember that L2TP/IPSec requires certificates) go to Start » Control Panel » Network Connections » right click your VPN connection » Properties » Networking tab » change the Type of VPN drop down box.
That’s all folks. Two final pieces of information that may come in handy if you roll out a Windows VPN server: 1) Where applicable, user account settings on the dial-up tab of an AD user object override the remote access policy settings created on the IAS server and 2) Windows Server 2003 Standard edition supports up to 1,000 concurrent connections.
This article was originally published on Enterprise Networking Planet.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.