نمایش نتایج: از شماره 1 تا 7 از مجموع 7

موضوع: Virtual Private Networking with Windows Server 2003: Deploying Site-to-Site VPNs

  
  1. #1
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272

    Virtual Private Networking with Windows Server 2003: Deploying Site-to-Site VPNs

    Introduction (Virtual Private Networking with Windows Server 2003: Deploying Site-to-Site VPNs)
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. With a VPN, you can send data between two computers across a shared or public network in a manner that emulates a point-to-point private link (such as a long haul T-Carrier-based wide area network [WAN] link). Virtual private networking is the act of creating and configuring a virtual private network.
    To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information, which allows the data to traverse the shared or public network to reach its endpoint. To emulate a private link, the data is encrypted for confidentiality. Packets that are intercepted on the shared or public network are indecipherable without the encryption keys. The logical link over which the private data is encapsulated and encrypted is a VPN connection.
    Figure 1 shows the logical equivalent of a VPN connection.
    Figure 1: The logical equivalent of a VPN connection
    Users working at home or on the road can use VPN connections to establish a remote access connection to an organization server by using the infrastructure provided by a public network such as the Internet. From the user's perspective, the VPN connection is a point-to-point connection between the computer (the VPN client) and an organization server (the VPN server). The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link.
    Organizations can also use VPN connections to establish site-to-site connections with geographically separate offices or with other organizations over a public network such as the Internet while maintaining secure communications. A site-to-site VPN connection across the Internet logically operates as a dedicated WAN link.
    With both remote access and site-to-site connections, an organization can use VPN connections to trade long-distance dial-up or leased lines for local dial-up or leased lines to an Internet service provider (ISP).
    There are two types of PPP-based site-to-site VPN technology in the Windows Server 2003 operating system:

    1. Point-to-Point Tunneling Protocol (PPTP)

      PPTP uses user-level Point-to-Point Protocol (PPP) authentication methods and Microsoft Point-to-Point Encryption (MPPE) for data encryption.
    2. Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (IPSec)

      L2TP with IPSec (L2TP/IPSec) uses user-level PPP authentication methods and IPSec for computer-level authentication using certificates and data authentication, integrity, and encryption.

    Note Using IPSec tunnel mode for site-to-site VPN connections is possible using computers running Windows Server 2003. Because the IPSec tunnel is not represented as a logical interface over which packets can be forwarded and received, routing protocols do not operate over IPSec tunnels. Because the configuration of IPSec tunnels for site-to-site VPN connections is vastly different, it is not discussed here. For more information, see article 252735, "How to Configure IPSec Tunneling in Windows 2000," in the Microsoft Knowledge Base.


    For encryption, you can use either link encryption or end-to-end encryption in addition to link encryption:

    • Link encryption encrypts the data only on the link between the routers. For PPTP connections, you must use MPPE in conjunction with MS-CHAP, MS-CHAP v2, or EAP-TLS authentication. For L2TP/IPSec connections, IPSec provides encryption on the link between the routers.
    • End-to-end encryption encrypts the data between the source host and its final destination. You can use IPSec after the site-to-site VPN connection is made to encrypt data from the source host to the destination host.

    Overview of Demand-Dial Routing in Windows Server 2003

    The Windows Server 2003 Routing and Remote Access service includes support for demand-dial routing (also known as dial-on-demand routing) over dial-up connections (such as analog phone lines or ISDN), VPN connections, and PPP over Ethernet (PPPoE) connections. Demand-dial routing is the forwarding of packets across a Point-to-Point Protocol (PPP) link. The PPP link is represented inside the Windows Server 2003 Routing and Remote Access service as a demand-dial interface, which can be used to create on-demand connections across dial-up, non-permanent, or persistent media. Demand-dial connections allow you to use dial-up telephone lines instead of leased lines for low-traffic situations and to leverage the connectivity of the Internet to connect branch offices with VPN connections.
    Demand-dial routing is not the same as remote access. While remote access connects a single computer to a network; demand-dial routing connects entire networks. However, both use PPP as the protocol through which to negotiate and authenticate the connection and encapsulate the data sent over it. As implemented in the Windows Server 2003 Routing and Remote Access service, both remote access and demand-dial connections can be enabled separately. However, they still share the same:

    • Dial-in properties behavior of user accounts.
    • Security (authentication protocols and encryption).
    • Remote access policies usage.
    • Windows or Remote Authentication Dial-In User Service (RADIUS) usage (for authentication, authorization, and accounting).
    • IP address assignment and configuration.
    • PPP features usage, such as Microsoft Point-to-Point Compression (MPPC), Multilink PPP, and Bandwidth Allocation Protocol (BAP).
    • Troubleshooting facilities, including event logging, Windows or RADIUS authentication and accounting logging, and tracing.

    While the concept of demand-dial routing is fairly simple, configuration of demand-dial routing is relatively complex. This complexity is due to the following factors:

    • Connection endpoint addressing. The connection must be made over public data networks, such as the analog phone system or the Internet. The endpoint of the connection must be identified by a phone number for dial-up connections, and either a fully qualified host name or IP address for VPN connections.
    • Authentication and authorization of the caller. Anyone calling the router must be authenticated and authorized. Authentication is based on the caller's set of credentials that are passed during the connection establishment process. The credentials that are passed must correspond to an account. Authorization is granted based on the dial-in properties of the account and remote access policies.
    • Differentiation between remote access clients and calling routers. Both routing and remote access services coexist on the same computer running Windows Server 2003. Both remote access clients and demand-dial routers can initiate a connection. The computer running Windows Server 2003 that answers a connection attempt must be able to distinguish a remote access client from a demand-dial router.

      If the user name, which is included in the authentication credentials sent by the router that initiates the connection (the calling router), matches the name of a demand-dial interface on the Windows Server 2003 that answers the connection attempt (the answering router), the connection is a demand-dial connection. Otherwise, the incoming connection is a remote access connection.
    • Configuration of both ends of the connection. Both ends of the connection must be configured, even if only one end of the connection is initiating a demand-dial connection. Configuring only one side of the connection means that packets are successfully routed in only one direction. Communication typically requires that information travel in both directions.
    • Configuration of static routes. You should not use dynamic routing protocols over temporary demand-dial connections. Therefore, routes for network IDs that are available across the demand-dial interface must be added, as static routes, to the routing tables of the demand-dial routers. You can add static routes manually or by using auto-static updates.

    Demand-dial Routing Updates

    While demand-dial routing can save connection costs, typical routing protocols rely on a periodic advertising process to communicate routing information. For example, RIP for IP advertises the contents of its routing table every 30 seconds on all interfaces. This behavior is not a problem for permanently connected LAN or WAN lines. For usage-sensitive dial-up WAN lines, this type of periodic behavior could cause the router to call another router every 30 seconds, which may result in an undesirable phone bill. Therefore, you should not run routing protocols across temporary dial-up WAN lines.
    If you do not use routing protocols to update the routing tables, then you must enter the routes as static routes. The static routes that correspond to the network IDs available across the interface are entered manually or automatically. The automatic entering of static routes for demand-dial interfaces is known as auto-static updates and is supported by the Windows Server 2003 Routing and Remote Access service. Auto-static updates are supported when you use RIP for IP, but not OSPF.
    When instructed, a demand-dial interface that is configured for auto-static updates sends a request across an active connection to request all of the routes of the router on the other side of the connection. In response to the request, all of the routes of the requested router are automatically entered as static routes in the routing table of the requesting router. The static routes are persistent; they are kept in the routing table even if the interface becomes disconnected or the router is restarted. An auto-static update is a one-time, one-way exchange of routing information.
    You can automate and schedule auto-static updates by executing the update as a Windows Server 2003 scheduled task. For more information, see the topic titled "Scheduling auto-static updates" in Windows Server 2003 Help and Support.
    Note The "auto" in auto-static refers to the automatic adding of the requested routes as static routes in the routing table. The sending of the request for routes is performed through an explicit action: either through the Routing and Remote Access snap-in or the Netsh utility while the demand-dial interface is in a connected state. Auto-static updates are not automatically performed every time a demand-dial connection is made.



    Introduction to Site-to-Site VPN connections

    A site-to-site VPN connection is a demand-dial connection that uses a VPN tunneling protocol such as PPTP or L2TP/IPSec to connect two portions of a private network. Each VPN router provides a routed connection to the network to which the VPN router is attached. On a site-to-site VPN connection, the packets sent from either router across the VPN connection typically do not originate at the routers.
    The calling router (the VPN client) initiates the connection. The answering router (the VPN server) listens for connection attempts, receives the connection attempt from the calling router, and responds to the request to create a connection. The calling router authenticates itself to the answering router. When using a mutual authentication protocol such as MS-CHAP v2 or EAP-TLS, the answering router also authenticates itself to the calling router.
    Table 1 lists the site-to-site VPN-capable Microsoft operating systems.
    Table 1 Site-to-Site VPN-Capable Microsoft Operating Systems


    VPN Tunneling Protocol Microsoft Operating System PPTP
    Windows Server 2003, Windows 2000 Server, Windows NT version 4.0 with the Routing and Remote Access Service (RRAS)
    L2TP/IPSec
    Windows Server 2003, Windows 2000 Server
    VPN routers can also be any computer that is capable of creating a routed PPTP connection using MPPE or a routed L2TP connection using IPSec encryption.

    On-demand vs. Persistent Connections

    A site-to-site VPN connection can be on-demand or persistent:

    • An on-demand site-to-site connection is a connection that is made when traffic must be forwarded across the connection. The connection is made, the traffic is forwarded, and the connection is terminated after a configured amount of idle time. You can configure idle disconnect behavior for the answering router by setting an idle disconnect on the Dial-in Constraints tab on the profile properties of the remote access policy that is used for the site-to-site VPN connection. You can configure idle disconnect behavior for the calling router on the Options tab on the properties of the demand-dial interface in the Routing and Remote Access snap-in.
    • A persistent site-to-site connection is always connected. If the connection is dropped, it is immediately retried. To configure the answering router for connection persistence, clear the Minutes server can remain idle before it is connected and Minutes client can be connected check boxes on the Dial-in Constraints tab on the profile properties of the remote access policy that is used for the site-to-site VPN connection (these settings are disabled by default). To configure the calling router for connection persistence, select Persistent connection on the Options tab from the properties of the demand-dial interface.

    If the calling router connects to the Internet by using a dial-up link such as an analog phone line or ISDN, then you need to configure a dial-up on-demand site-to-site VPN connection consisting of a single demand-dial interface at the answering router and two demand-dial interfaces at the calling router: one to connect to a local Internet service provider (ISP) and one for the site-to-site VPN connection. Dial-up on-demand site-to-site VPN connections also require an additional host route in the IP routing table of the calling router. For more information, see the topic titled "A dial-up router-to-router VPN connection" in Windows Server 2003 Help and Support.
    For either on-demand or persistent site-to-site VPN connections, the answering router is permanently connected to the Internet.

    Restricting the Initiation of Demand-dial Connections

    To prevent the calling router from making unnecessary connections, you can restrict the calling router from making on-demand site-to-site VPN connections in the following ways:

    • Demand-dial filtering. You can use demand-dial filtering to configure either the types of IP traffic that do not cause a demand-dial connection to be made or the types of IP traffic that cause a connection to be made. You can configure demand-dial filtering by right-clicking the demand-dial interface in the Network Interfaces node in the Routing and Remote Access snap-in, and then clicking Set IP Demand-dial Filters.
    • Dial-out hours. You can use dial-out hours to configure the hours that a calling router is either permitted or denied to make a site-to-site VPN connection. You can configure dial-out hours by right-clicking the demand-dial interface in the Network Interfaces node in the Routing and Remote Access snap-in, and then clicking Dial-out Hours.

    You can use remote access policies to configure the times when incoming demand-dial routing connections are allowed.

    One-way vs. Two-way Initiated Connections

    With one-way initiated connections, one VPN router is always the calling router and one VPN router is the always the answering router. One-way initiated connections are well suited to a permanent connection spoke-and-hub topology where the branch office router is the only router that initiates the connection. One-way initiated connections require the following:

    • The answering router is configured as a LAN and demand-dial router.
    • A user account is added for the authentication credentials of the calling router that is accessed and validated by the answering router.
    • A demand-dial interface is configured at the answering router with the same name as the user account that is used by the calling router. This demand-dial interface is not used to dial out, therefore it does is not configured with the host name or IP address of the calling router or with valid user credentials.

    With two-way initiated connections, either VPN router can be the calling router or answering router depending on who is initiating the connection. Both VPN routers must be configured to both initiate and accept a site-to-site VPN connection. You can use two-way initiated connections when the site-to-site VPN connection is not active 24 hours a day and traffic from either router is used to create an on-demand connection. Two-way initiated site-to-site VPN connections require the following:

    • Both routers are connected to the Internet by using a permanent WAN link.
    • Both routers are configured as LAN and demand-dial routers.
    • User accounts are added for both routers so that the authentication credentials for the calling router are accessed and validated by the answering router.
    • Demand-dial interfaces, with the same name as the user account that is used by the calling router, must be fully configured at both routers, including settings for the host name or IP address of the answering router and user account credentials.

    Table 2 lists a correct example configuration for two-way initiated demand-dial routing between Router 1, a demand-dial router in the Seattle site, and Router 2, a demand-dial router in the New York site.
    Table 2 Correct example configuration for two-way initiated demand-dial routing


    Router Demand-dial interface name User account name in user credentials Router 1
    DD_NewYork
    DD_Seattle
    Router 2
    DD_Seattle
    DD_NewYork
    Notice how the user account name in the user credentials of the demand-dial interface of one router matches the name of a demand-dial interface on the other router.











    موضوعات مشابه:

  2. #2
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Components of Windows Server 2003 Site-to-Site VPNs
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    Figure 2 shows the components of Windows Server 2003 site-to-site virtual private networks.
    Figure 2: Components of Windows Server 2003 site-to-site VPNs
    The major components are:

    • VPN routers
    • Internet infrastructure
    • Intranet infrastructure
    • Authentication, authorization, and accounting (AAA) infrastructure
    • Certificate infrastructure

    VPN Routers

    VPN routers either initiate or receive VPN-based demand-dial connections and consist of the following components:

    • Routing and Remote Access service. The Routing and Remote Access service on both the calling and answering router is configured using the Routing and Remote Access Server Setup Wizard.
    • Ports. A port is a logical or physical communications channel capable of supporting a single PPP connection. Physical ports are based on equipment installed in the VPN router. Virtual private network (VPN) ports are logical ports.
    • Demand-dial interfaces. A demand-dial interface configured on the calling router represents the PPP connection and contains configuration information such as the type of port to use, the addressing used to create the connection (an IP address or domain name), authentication methods, encryption requirements, and authentication credentials.

      For two-way initiated connections, a demand-dial interface configured on the answering router represents the PPP connection to the calling router. For a one-way initiated connection using static routes on the user account of the calling router, a demand-dial interface on the answering router does not need to be configured.
    • User account. To authenticate the calling router, the credentials of the calling router must be verified by the properties of a corresponding user account. If the answering router is configured for Windows authentication, a user account in the authentication credentials of the calling router must be verifiable using Windows security. If the answering router is configured for RADIUS authentication, then the RADIUS server must have access to the user account for the authentication credentials of the calling router.

      The user account must have the following settings:


      • On the Dial-in tab, remote access permission is set to either Allow access or Control access through Remote Access Policy. When you create user accounts with the Demand-Dial Interface Wizard, the remote access permission is set to Allow access.
      • On the General or Account tab, User must change password at next logon is disabled and Password never expires is enabled. These settings are configured when you create user accounts with the Demand-Dial Interface Wizard.

      For a one-way initiated connection, you can configure static IP routes on the Dial-in tab that are added to the answering router's routing table when the demand-dial connection is made.
    • Routes. To forward traffic across a site-to-site VPN connection, IP routes in the routing tables of the VPN routers is configured to use the correct demand-dial interface.

      For one-way initiated connections, configure the calling router normally. For the answering router, you can configure the user account specified in the authentication credentials of the calling router with static IP routes.
    • Remote access policy. On the answering router or the Internet Authentication Service (IAS) server that is acting as a RADIUS server to the answering router, to specify connection parameters that are specific to demand-dial connections, create a separate remote access policy that uses the Windows-Groups attribute set to the group that has all of the user accounts for calling routers as members. A separate remote access policy for demand-dial connections is not required.

    A calling router does the following:

    • Initiates VPN connections based on an administrator action or when a packet being forwarded matches a route using a VPN-based demand-dial interface.
    • Waits for authentication and authorization before forwarding packets.
    • Acts as a router forwarding packets between nodes in its site and the answering router.
    • Acts as an endpoint of the VPN connection.

    The answering router does the following:

    • Listens for VPN connection attempts.
    • Authenticates and authorizes VPN connections before allowing data to flow.
    • Acts as a router forwarding packets between nodes in its site and the calling router.
    • Acts as an endpoint of the VPN connection.

    VPN routers typically have two installed network adapters: one network adapter connected to the Internet and one network adapter connected to the intranet.
    When you configure and enable the Routing and Remote Access service, the Routing and Remote Access Server Setup Wizard prompts you to select the role that the computer will fulfill. For VPN routers, you should select the Remote access (dial-up or VPN) option. With the Remote access (dial-up or VPN) option, the Routing and Remote Access server operates in the role of a VPN server that supports both remote access and site-to-site VPN connections. For remote access VPN connections, users run VPN client software and initiate a remote access connection to the VPN server. For site-to-site VPN connections, a router initiates a VPN connection to the VPN server. Alternately, the VPN server can initiate a VPN connection to another VPN router.
    Note Microsoft recommends the choice of Remote access (dial-up or VPN) over Secure connection between two private networks in the Routing and Remote Access Server Setup Wizard because the Secure connection between two private networks option does not prompt you to select an Internet interface over which to automatically configure packet filters, does not prompt you to configure RADIUS servers, and only creates 5 PPTP and 5 L2TP ports.


    When you select the Remote access (dial-up or VPN) option in the Routing and Remote Access Server Setup Wizard:

    1. You are first prompted to specify whether VPN, dial-up, or both types of access are needed.
    2. Next, you are prompted to select the interface that is connected to the Internet. The interface that you select will be automatically configured with packet filters that allow only PPTP and L2TP-related traffic (unless you clear the Enable security on the selected interface by setting up static packet filters check box). All other traffic is silently discarded. For example, you will no longer be able to ping the Internet interface of the VPN server. If you want to use the VPN server computer as a network address translator (NAT), Web server, or other function, see Appendix B.
    3. Next, if you have multiple network adapters that are connected to the intranet, you are prompted to select an interface over which DHCP, DNS, and WINS configuration is obtained.
    4. Next, you are prompted to determine whether you want to obtain IP addresses to assign to remote access clients by using either DHCP or a specified range of addresses. If you select a specified range of addresses, you are prompted to add one or more address ranges.
    5. Next, you are prompted to specify whether you want to use RADIUS as your authentication provider. If you select RADIUS, you are prompted to configure primary and alternate RADIUS servers and the shared secret.

    When you select the Remote access (dial-up or VPN) option in the Routing and Remote Access Server Setup Wizard, the results are as follows:

    1. The Routing and Remote Access service is enabled as both a remote access server and a LAN and demand-dial router, with Windows as the authentication and accounting provider (unless RADIUS was chosen and configured). If there is only one network adapter connected to the intranet, that network adapter is automatically selected as the IP interface from which to obtain DHCP, DNS, and WINS configuration. Otherwise, the network adapter specified in the wizard is selected to obtain DHCP, DNS, and WINS configuration. If specified, the static IP address ranges are configured.
    2. Exactly 128 PPTP and 128 L2TP ports are created. All of them are enabled for both inbound remote access connections and inbound and outbound demand-dial connections.
    3. The selected Internet interface is configured with input and output IP packet filters that allow only PPTP and L2TP/IPSec traffic.
    4. The DHCP Relay Agent component is added with the Internal interface. If the VPN server is a DHCP client at the time the wizard is run, the DHCP Relay Agent is automatically configured with the IP address of a DHCP server. Otherwise, you must manually configure the properties of the DHCP Relay Agent with an IP address of a DHCP server on your intranet. The DHCP Relay Agent forwards DHCPInform packets between VPN remote access clients and an intranet DHCP server.
    5. The IGMP component is added. The Internal interface is configured for IGMP router mode. All other LAN interfaces are configured for IGMP proxy mode. This allows VPN remote access clients to send and receive IP multicast traffic.

    With Windows Server 2003, Web Edition, and Windows Server 2003, Standard Edition, you can create up to 1,000 Point-to-Point Tunneling Protocol (PPTP) ports, and you can create up to 1,000 Layer Two Tunneling Protocol (L2TP) ports. However, Windows Server 2003, Web Edition, can accept only one virtual private network (VPN) connection at a time. Windows Server 2003, Standard Edition, can accept up to 1,000 concurrent VPN connections. If 1,000 VPN clients are connected, further connection attempts are denied until the number of connections falls below 1,000.
    Installing a Certificate on a VPN Router

    If VPN routers are making L2TP/IPSec connections or using EAP-TLS authentication, certificates must be installed on the VPN router computers. For L2TP/IPSec connections, a computer certificate must be installed on both the calling and answering router computer to provide authentication for establishing an IPSec session. For EAP-TLS authentication, a computer certificate must be installed on the authenticating server (either the answering router or a RADIUS server) and a user certificate must be installed on the calling router.
    For more information about installing certificates on calling routers, answering routers, and authentication server computers, see Certificate infrastructure in this paper.

    Design Points: Configuring the VPN Router

    Consider the following before running the Routing and Remote Access Server Setup Wizard:

    • Which connection of the VPN router is connected to the Internet?

      Typical Internet-connected VPN routers have at least two LAN connections: one connected to the Internet (either directly or connected to a perimeter network) and one connected to the site. To make this distinction easier to see for the Routing and Remote Access Server Setup Wizard, rename the connections with their purpose or role using Network Connections. For example, rename the connection connected to the Internet, default name Local Area Connection 2, to Internet.
    • Can the VPN router be a DHCP client?

      The VPN router must have a manual TCP/IP configuration for its Internet interface. While technically possible, it is not recommended that the VPN router be a DHCP client for its intranet interface(s). Due to the routing requirements of the VPN router, manually configure an IP address, subnet mask, DNS server(s), and WINS server(s), but do not configure a default gateway.

      Note that it is possible for the VPN router to have a manual TCP/IP configuration and still use DHCP to obtain IP addresses for remote access VPN clients and other calling routers.
    • How will IP addresses be allocated to remote access VPN clients and other calling routers?

      The VPN router can be configured to obtain IP addresses from DHCP or from a manually configured set of address ranges. Using DHCP to obtain IP addresses simplifies the configuration, however, you must ensure that the DHCP scope for the subnet to which the site connection of the calling router is attached has enough addresses for all the computers physically connected to the subnet and the maximum number of PPTP and L2TP ports. For example, if the subnet to which the site connection of the VPN router is attached contains 50 DHCP clients, then, for the default configuration of the VPN router, the scope should contain at least 307 addresses (50 computers + 128 PPTP clients + 128 L2TP clients + 1 address for the VPN router). If there are not enough IP addresses in the scope, remote access VPN clients and calling routers that connect after all the addresses in the scope are allocated will be assigned an address in the Automatic Private IP Addressing (APIPA) range of 169.254.0.0/16.

      If you configure a static pool of addresses, ensure that the pool has enough addresses for all your PPTP and L2TP ports, plus an additional address for the VPN router. If there are not enough addresses in your static pool, remote access VPN clients and Windows NT 4.0 RRAS calling routers will not be able to connect. Windows Server 2003 calling routers, however, will still be able to connect. Windows Server 2003 calling and answering routers still request an IP address from each other during the connection establishment process. But if one of the routers does not have an address to assign, both routers continue with the connection establishment process. The logical interface on the point-to-point connection does not have an assigned IP address. This is known as an unnumbered connection. While Windows Server 2003 VPN routers support unnumbered connections, the routing protocols included with Windows Server 2003 do not work over an unnumbered connection.

      If you are configuring a static pool of addresses, there might be additional routing considerations. For more information, see Site network infrastructure in this paper.
    • What is the authentication and accounting provider?

      The VPN router can use Windows or RADIUS as its authentication or accounting provider.

      When Windows is used as the authentication and accounting provider, the VPN router uses Windows security to validate the credentials of a calling router and access the calling router's user account dial-in properties. Locally configured remote access policies authorize the VPN connection and locally written accounting log files log VPN connection accounting information.

      When RADIUS is used as the authentication and accounting provider, the VPN router uses a configured RADIUS server to validate the credentials of a calling router, authorize the connection attempt, and store VPN connection accounting information.
    • Are you making L2TP/IPSec connections?

      If so, you must install a computer certificate on both the calling router and answering router computers.
    • Are you using user-level certificate authentication with EAP-TLS?

      If so, you must install a user certificate on the calling router computer and a computer certificate on the authenticating server (either the answering router computer [if the answering router is configured for the Windows authentication provider] or the RADIUS server [if the answering router is configured for the RADIUS authentication provider]). If the authenticating server is a Windows Server 2003 VPN router or a Windows Server 2003 Internet Authentication Service (IAS) server, EAP-TLS is only available if the authenticating server is a member of an Active Directory service domain.
    • For on-demand connections, do you want to prevent connections from occurring during certain times of the day during the week or for certain types of traffic?

      If so, configure dial-out hours or demand-dial filters on the demand-dial interface of the calling router.
    • Do you want to match your IP packet filters to the demand-dial filters?

      Demand-dial filters are applied before the connection is made. IP packet filters are applied after the connection is made. To prevent the demand-dial connection from being established for traffic that is discarded by the IP packet filters:


      • If you have configured a set of output IP packet filters with the Transmit all packets except those that meet the criteria below option, then configure the same set of filters as demand-dial filters with Initiate connection set to For all traffic except.
      • If you have configured a set of output IP packet filters with the Drop all packets except those that meet the criteria below option, then configure the same set of filters as demand-dial filters with Initiate connection set to Only for the following traffic.

    Consider the following when changing the default configuration of the VPN router for site-to-site VPN connections:

    • Do you want to support remote access VPN connections?

      By default, all the PPTP and L2TP ports are configured to allow both remote access connections (inbound only) and demand-dial routing connections (inbound and outbound). To disable remote access connections and create a dedicated site-to-site VPN connection server, clear the Remote access connections (inbound only) check box from the properties of the WAN miniport (PPTP) and WAN miniport (L2TP) devices from the properties of the Ports object in the Routing and Remote Access snap-in. Alternately, you can clear the Remote access server checkbox on the General tab on the properties of the VPN server.
    • Do you need to install a computer certificate?

      If the VPN router is supporting L2TP/IPSec connections or is authenticating connections using the EAP-TLS authentication protocol and configured to use the Windows authentication provider, you must install a computer certificate. If the VPN router is a calling router using the EAP-TLS authentication protocol, you must install a user certificate. For more information, see "Certificate infrastructure" in this paper.
    • Do you need custom remote access policies for VPN connections?

      If you configure the VPN router for Windows authentication or for RADIUS authentication and the RADIUS server is an IAS server, the default remote access policies reject all types of connection attempts unless the remote access permission of the user accounts dial-in properties is set to Allow access. If you want to manage authorization and connection parameters by group or by type of connection, you must configure additional remote access policies. For more information, see Remote Access Policies in this paper.
    • Do you want separate authentication and accounting providers?

      The Routing and Remote Access Server Setup Wizard configures both authentication and accounting providers to be the same. After the Wizard is complete, however, you can configure the authentication and accounting providers separately (for example, if you want to use Windows authentication and RADIUS accounting). You can configure authentication and accounting providers on the Authentication tab from the properties of the VPN router in the Routing and Remote Access snap-in.

    After the VPN router is configured, you can begin creating demand-dial interfaces and configuring routes using the Routing and Remote Access snap-in. For more information, see "Deploying a PPTP-based Site-to-Site VPN Connection" and "Deploying an L2TP/IPSec-based Site-to-Site VPN Connection" in this paper.

    Internet Network Infrastructure

    To create a site-to-site VPN connection to an answering router across the Internet:

    • The answering router's name must be resolvable.
    • The answering router must be reachable.
    • VPN traffic must be allowed to and from the answering router.


    Answering Router Name Resolvability

    While it is possible to configure demand-dial interfaces with the names of the answering routers to which a connection is made, it is recommended that you use IP addresses rather than names. If you use a name and the name resolves to the public IP address of the answering router, traffic sent to services running on the VPN router are sent in clear text across the Internet.

    Answering Router Reachability

    To be reachable, the answering router must be assigned a public IP address to which packets are forwarded by the routing infrastructure of the Internet. If you have been assigned a static public IP address from an ISP or an Internet registry, this is typically not an issue. In some configurations, the answering router is actually configured with a private IP address and has a published static IP address by which it is known on the Internet. A device between the Internet and the answering router translates the published and actual IP addresses of the answering router in packets to and from the answering router.
    While the routing infrastructure might be in place, the answering router might be unreachable due to the placement of firewalls, packet filtering routers, network address translators, security gateways, or other types of devices that prevent packets from either being sent to or received from the answering router computer.

    VPN Routers and Firewall Configuration

    There are two approaches to using a firewall with a VPN router:

    1. The VPN router is attached directly to the Internet and the firewall is between the VPN router and the site.

      In this configuration, the VPN router must be configured with packet filters that only allow VPN traffic in and out of its Internet interface. The firewall can be configured to allow specific types of inter-site traffic.
    2. The firewall is attached to the Internet and the VPN router is between the firewall and the site.

      In this configuration, both the firewall and the VPN router are attached to a network segment known as the perimeter network (also known as a screened subnet). Both the firewall and the VPN router must be configured with packet filters that allow only VPN traffic to and from the Internet. Figure 2 shows this configuration.

    For the details of configuring packet filters for the VPN router and the firewall for both of these configurations, see Appendix A.

    Design Points: Answering Router Accessibility from the Internet

    Consider the following when configuring your Internet infrastructure for site-to-site VPN connections:

    • Wherever possible, configure your demand-dial interfaces with the IP addresses of answering routers. If you are using names, ensure that the DNS names of your answering routers are resolvable by either placing an appropriate DNS record in your Internet DNS server or the DNS server of your ISP. Test the resolvability by using the Ping tool to ping the name of each of your answering routers. Due to packet filtering, the result of the ping command may be "Request timed out", but check to ensure that the name specified was resolved by the Ping tool to the correct IP address.
    • Ensure that the IP addresses of your answering routers are reachable from the Internet by using the Ping tool to ping the name or address of your answering router with a 5 second timeout (using the -w command line option) when directly connected to the Internet. If you see a "Destination unreachable" error message, the answering router is not reachable.
    • Configure packet filtering for PPTP traffic, L2TP/IPSec traffic, or both types of traffic on the appropriate firewall and answering router interfaces connecting to the Internet and the perimeter network. The correct set of packet filters is automatically configured by the Routing and Remote Access Server Setup Wizard when you select the Remote access (dial-up or VPN) configuration. For more information, see Appendix A.


    Authentication Protocols

    To authenticate the calling router who is attempting to create a PPP connection, Windows Server 2003 supports a wide variety of PPP authentication protocols including:

    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (SPAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
    • MS-CHAP version 2 (MS-CHAP v2)
    • Extensible Authentication Protocol-Message Digest 5 (EAP-MD5)
    • Extensible Authentication Protocol-Transport Level Protocol (EAP-TLS)

    For PPTP connections, you must use MS-CHAP, MS-CHAP v2, or EAP-TLS. Only these three authentication protocols provide a mechanism to generate the same encryption key on both the calling router and the answering router. MPPE uses this encryption key to encrypt all PPTP data sent on the VPN connection. MS-CHAP and MS-CHAP v2 are password-based authentication protocols.
    In the absence of user certificates, MS-CHAP v2 is highly recommended, as it is a stronger authentication protocol than MS-CHAP and provides mutual authentication. With mutual authentication, the answering router authenticates the calling router and the calling router authenticates the answering router.
    Note If you must use a password-based authentication protocol, enforce the use of strong passwords on your network. Strong passwords are long (greater than 8 characters) and contain a random mixture of upper and lower case letters, numbers, and punctuation. An example of a strong password is f3L*02~>xR3w#4o.


    EAP-TLS is used in conjunction with a certificate infrastructure and user certificates. With EAP-TLS, the calling router sends a user certificate for authentication and the authenticating server (the answering router or RADIUS server) sends a computer certificate for authentication. This is the strongest authentication method, as it does not rely on passwords. If the authenticating server is a Windows Server 2003 VPN router or an IAS server, EAP-TLS is only available if the authenticating server is a member of an Active Directory domain.
    Note You can use third-party CAs for EAP-TLS certificates. For more information, see Appendix E in the white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs."


    For L2TP/IPSec connections, any PPP authentication protocol can be used because the user authentication occurs after the calling router and answering router have established a secure channel of communication known as an IPSec security association (SA). However, the use of either MS-CHAP v2 or EAP-TLS is recommended.

    Design Point: Which Authentication Protocol to Use?

    Consider the following when choosing an authentication protocol for VPN connections:

    • If you are using a certificate infrastructure that issues user certificates, use the EAP-TLS authentication protocol for both PPTP and L2TP connections. Windows NT 4.0 RRAS routers do not support EAP-TLS.
    • If you must use a password-based authentication protocol, use MS-CHAP v2 and enforce strong passwords using Group Policy. MS-CHAP v2 is supported by computers running Windows Server 2003, Windows 2000, and Windows NT 4.0 with RRAS and Service Pack 4 and later.


    VPN Protocols

    Windows Server 2003 includes support for two PPP-based site-to-site VPN protocols:

    1. Point-to-Point Tunneling Protocol
    2. Layer Two Tunneling Protocol with IPSec


    Point-to-Point Tunneling Protocol

    Introduced in Windows NT 4.0, PPTP leverages Point-to-Point Protocol (PPP) user authentication and Microsoft Point-to-Point Encryption (MPPE) to encapsulate and encrypt IP traffic. When MS-CHAP v2 is used with strong passwords, PPTP is a secure VPN technology. For non-password-based authentication, EAP-TLS can be used in Windows Server 2003 to support user certificates. PPTP is widely supported, easily deployed, and can be used across most network address translators (NATs).

    Layer Two Tunneling Protocol With IPSec

    L2TP leverages PPP user authentication and IPSec Encapsulating Security Payload (ESP) transport mode to encapsulate and encrypt IP traffic. This combination, known as L2TP/IPSec, uses certificate-based computer identity authentication to create the IPSec security association in addition to PPP-based user authentication. L2TP/IPSec provides data integrity and data authentication for each packet. However, L2TP/IPSec requires a certificate infrastructure to allocate computer certificates and is supported by Windows Server 2003 VPN routers and other third-party VPN routers.

    Design Point: PPTP or L2TP?

    Consider the following when deciding between PPTP and L2TP for site-to-site VPN connections:

    • PPTP can be used with Windows Server 2003, Windows 2000, and Windows NT version 4.0 with RRAS. PPTP does not require a certificate infrastructure to issue computer certificates.
    • PPTP-based VPN connections provide data confidentiality (captured packets cannot be interpreted without the encryption key). PPTP VPN connections, however, do not provide data integrity (proof that the data was not modified in transit) or data authentication (proof that the data was sent by the authorized computer).
    • PPTP-based calling routers can be located behind a NAT because most NATs include a NAT editor that knows how to properly translate PPTP tunneled data. For example, the Internet connection sharing (ICS) feature of Dial-up Connections and the NAT/Basic Firewall routing protocol component of the Windows Server 2003 Routing and Remote Access service include a NAT editor that translates PPTP traffic from PPTP clients located behind the NAT. Answering routers cannot be behind a NAT unless there are multiple public IP addresses and there is a one-to-one mapping of a public IP address to the private IP address of the answering router or, if there is only one public address, if the NAT is configured to translate and forward the PPTP tunneled data to the VPN router. Most NATs using a single public IP address, including ICS and the NAT routing protocol component, can be configured to allow inbound traffic based on IP addresses and TCP and UDP ports. However, PPTP tunneled data does not use TCP or UDP headers. Therefore, an answering router cannot be located behind a computer using ICS or the NAT routing protocol component when using a single IP address.
    • L2TP/IPSec-based VPN routers cannot be behind a NAT unless both the calling and answering routers support IPSec NAT Traversal (NAT-T). IPSec NAT-T for site-to-site VPN connections is only supported by Windows Server 2003. However, Microsoft recommends that answering routers not be placed behind NATs. For more information, see IPSec NAT-T is not recommended for Windows Server 2003 computers that are behind network address translators at IPSec NAT-T is not recommended for Windows Server 2003 computers that are behind network address translators.
    • L2TP/IPSec can only be used with Windows Server 2003, Windows 2000, and third-party VPN routers and supports computer certificates as the default authentication method for IPSec. Computer certificate authentication requires a certificate infrastructure to issue computer certificates to the answering router computer and all calling router computers.
    • By using IPSec, L2TP-based VPN connections provide data confidentiality, data integrity, data authentication, and replay protection.
    • PPTP and L2TP is not an either/or choice. By default, a Windows Server 2003 VPN router supports both PPTP and L2TP connections simultaneously. You can use PPTP for some site-to-site VPN connections (from calling routers that are running Windows Server 2003, Windows 2000, or Windows NT 4.0 with RRAS and do not have an installed computer certificate) and L2TP for other site-to-site VPN connections (from calling routers running Windows Server 2003 or Windows 2000 that have an installed computer certificate).
    • If you are using both PPTP and L2TP, you can create separate remote access policies that define different connection parameters for PPTP and L2TP connections.



    Site Network Infrastructure

    The network infrastructure of the site is an important element of VPN design. Without proper design, calling routers are unable to obtain proper IP addresses, and packets cannot be exchange between computers in the different sites.
    Name Resolution

    If the calling router is configured with the IP addresses of Domain Name System (DNS) or Windows Internet Name Service (WINS) servers, DNS and WINS server IP addresses are not requested from the answering router during the PPP connection negotiation. If the calling router is not configured with the IP addresses of DNS and WINS servers, DNS and WINS servers are requested. The answering router never requests DNS and WINS server IP addresses from the calling router.
    Unlike Windows Server 2003, Windows 2000, and Windows XP remote access clients, the calling router does not send a DHCPInform message to the answering router to discover additional TCP/IP configuration information.
    By default, the calling router does not register itself with the DNS or WINS servers of the answering router. To change this behavior, set the registry value HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es\Rasman \PPP\ControlProtocols\BuiltIn\RegisterRoutersWithN ameServers to 1.

    Routing

    Each VPN router is an IP router and as such must be properly configured with the set of routes that makes all locations reachable. Specifically, each VPN router needs the following:

    • A default route that points to a firewall or router directly connected to the Internet.

      This route makes all of the locations on the Internet reachable.
    • One or more routes that summarize the addresses used within the site of the VPN router that point to a neighboring site router.

      These routes make all of the locations within the site of the VPN router reachable from the VPN router. Without these routes, all hosts in the site not connected to the same subnet as the VPN router are unreachable.

    To add a default route that points to the Internet, configure the Internet interface with a default gateway and then manually configure the site interface without a default gateway.
    To add site routes to the routing table of each VPN router, you can:

    • Add static routes using the Routing and Remote Access snap-in. You do not necessarily have to add a route for each subnet in your site. At a minimum, you just need to add the routes that summarize all the possible addresses in your site. For example, if your site uses portions of the private address space 10.0.0.0/8 to number its subnets and hosts, you do not have to add a route for each subnet. Just add a route for 10.0.0.0 with the subnet mask 255.0.0.0 that points to a neighboring router on the site subnet to which your VPN router is attached.
    • If you are using the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) routing protocols in your site, you can add and configure the RIP or OSPF routing protocol components of the Routing and Remote Access service so that the VPN router participates in the propagation of routing information as a dynamic router.

    If your site has only a single subnet, no further configuration is required.
    When a site-to-site VPN connection is made, each router sends traffic using a logical interface that corresponds to the PPTP or L2TP port of the connection. During the PPP negotiation, IP addresses might be assigned to these logical interfaces. Ensuring the reachability of the logical interfaces of VPN routers depends on how you configure each VPN router to obtain IP addresses for remote access clients and calling routers. The IP addresses assigned to VPN routers as they connect can be from:

    • An on-subnet address range, which is an address range of the site subnet to which the VPN router is attached.

      An on-subnet address range is used whenever the VPN router is configured to use DHCP to obtain IP addresses and when the manually configured pool(s) of IP addresses are within the range of addresses of the attached subnet.
    • An off-subnet address range, which is an address range that represents a different subnet that is logically attached to the VPN router.

      An off-subnet address range is used whenever the VPN router is manually configured with a pool of IP addresses for a separate subnet.


    On-subnetAddressRange

    If you are using an on-subnet address range, no additional routing configuration is required as the VPN router acts as a proxy for all packets destined to the logical interfaces of the other connected VPN routers. Routers and hosts on the VPN router subnet forward packets destined to the logical interfaces of connected VPN routers to the VPN router and the VPN router relays them the appropriate connected VPN routers.

    Off-subnetAddressRange

    If you are using an off-subnet address range, you must add the route(s) that summarize the off-subnet address range to the site routing infrastructure so that traffic destined to the logical interfaces of connected VPN routers are forwarded to the VPN router and then sent by the VPN router to the appropriate connected VPN router. To provide the best summarization of address ranges for routes, choose address ranges that can be expressed using a single prefix and subnet mask. For more information, see the topic titled "Expressing an IP address range with a mask" in Windows Server 2003 Help and Support.
    You can add the routes that summarize the off-subnet address range to the routing infrastructure of the site through the following:

    • Add static routes to the neighboring router for the off-subnet address range that point to the VPN routers site interface. Configure the neighboring router to propagate this static route to other routers in the site using the dynamic routing protocol used in your site.
    • If the VPN router is using OSPF and participating as a dynamic router, the VPN router must be configured as an autonomous system boundary router (ASBR) so that the static routes of the off-subnet address range are propagated to the other OSPF routers in the site.

    If your site consists of a single subnet, then you must either configure each site host for persistent route(s) of the off-subnet address range that point to the VPN routers site interface or configure each site host with the VPN router as its default gateway. Because routing for off-subnet address ranges requires additional host configuration, it is recommended that you use an on-subnet address pool for a small office/home office (SOHO) network consisting of a single subnet.

    Design Points: Routing Infrastructure

    Consider the following when configuring the routing infrastructure for site-to-site VPN connections:

    • Configure the Internet interface of the VPN router with a default gateway. Do not configure the site interface of the VPN router with a default gateway.
    • Add static IP routes to the VPN router that summarize the addresses used in the site in which the VPN router is located. Alternately, if you use either RIP or OSPF as your dynamic routing protocol, configure and enable RIP or OSPF on the VPN router. If you use a routing protocol other than RIP or OSPF, such as Interior Gateway Routing Protocol (IGRP), configure the neighboring router for RIP or OSPF on the interface connected to the subnet containing the VPN router, and then configure IGRP on all other interfaces.
    • Configure the VPN router with an on-subnet address range by obtaining IP addresses through DHCP or by manually configuring on-subnet address pools.



    AAA Infrastructure

    The authentication, authorization, and accounting (AAA) infrastructure exists to:

    • Authenticate the credentials of calling routers.
    • Authorize the VPN connection.
    • Record the VPN connection creation and termination for accounting purposes.

    The AAA infrastructure consists of:

    • The answering router computer
    • RADIUS server computers
    • Domain controllers

    As previously discussed, a Windows Server 2003 answering router can be configured with either Windows or RADIUS as its authentication or accounting provider. RADIUS provides a centralized AAA service when you have multiple answering routers and remote access VPN servers or a mix of heterogeneous dial-up and VPN equipment.
    When you configure Windows as the authentication provider, the answering router performs the authentication of the VPN connection by communicating with a domain controller using a secure remote procedure call (RPC) channel and authorization of the connection attempt through the dial-in properties of the user account and locally configured remote access policies.
    When you configure RADIUS as the authentication provider, the answering router relies on a RADIUS server to perform both the authentication and authorization. When a VPN connection is attempted, the answering router sends the calling router credentials and other connection parameters to the configured RADIUS server in a RADIUS Access-Request message. If the connection attempt is both authenticated and authorized, the RADIUS server sends back a RADIUS Access-Accept message. If the connection attempt is either not authenticated or not authorized, the RADIUS server sends back a RADIUS Access-Reject message.
    When you configure Windows as the accounting provider, the answering router logs VPN connection information in a local log file (SystemRoot\System32\Logfiles\Logfile.log by default) based on settings on the Settings tab of the properties of the Local File object in the Remote Access Logging folder in the Routing and Remote Access snap-in. By default, all types of logging are disabled. Windows Server 2003 also supports the sending of connection accounting information to a Structured Query Language (SQL) server.
    When you configure RADIUS as the authentication provider, the answering router sends RADIUS accounting messages for VPN connections on a RADIUS server, which records the accounting information.
    If you are using RADIUS and a Windows domain as the user account database for which to verify user credentials and obtain dial-in properties, Microsoft recommends using the Internet Authentication Service (IAS), included as an optional networking component in Windows Server 2003 and Windows 2000 Server. IAS is a full-featured RADIUS server that is tightly integrated with Active Directory and the Routing and Remote Access service.
    When IAS is used as the RADIUS server:

    • IAS performs the authentication of the VPN connection by communicating with a domain controller using a secure RPC channel. IAS performs authorization of the connection attempt through the dial-in properties of the user account and remote access policies configured on the IAS server.
    • IAS logs all RADIUS accounting information in a local log file (SystemRoot\System32\Logfiles\Logfile.log by default) based on settings configured on the properties of the Local File object in the Remote Access Logging folder in the Internet Authentication Service snap-in. IAS in Windows Server 2003 also supports the sending of connection accounting information to a SQL server.

    IAS for Windows Server 2003 can also be used as a RADIUS proxy. For more information, see Windows Server 2003 Help and Support.
    Remote Access Policies

    Remote access policies are an ordered set of rules that define how connections are either accepted or rejected. For connections that are accepted, remote access policies can also define connection restrictions. For each rule, there are one or more conditions, a set of profile settings, and a remote access permission setting. Connection attempts are evaluated against the remote access policies in order, trying to determine whether the connection attempt matches all of the conditions of each policy. If the connection attempt does not match all of the conditions of any policy, the connection attempt is rejected.
    If a connection matches all the conditions of a remote access policy and is granted remote access permission, the remote access policy profile specifies a set of connection restrictions. The dial-in properties of the user account also provide a set of restrictions. Where applicable, user account connection restrictions override the remote access policy profile connection restrictions.
    Remote access policies consist of the following elements:

    • Conditions
    • Permission
    • Profile settings


    Conditions

    Remote access policy conditions are one or more attributes that are compared to the settings of the connection attempt. If there are multiple conditions, then all of the conditions must match the settings of the connection attempt in order for it to match the policy. For VPN connections, you commonly use the following conditions:

    • NAS-Port-Type. By setting the NAS-Port-Type condition to Virtual (VPN), you can specify all VPN connections.
    • Tunnel-Type. By setting the Tunnel-Type to Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP), you can specify different policies for PPTP and L2TP connections.
    • Windows-Groups. By setting the Windows-Groups to the appropriate groups, you can specify connection parameters based on group membership.


    Permission

    You can use the permission setting to either grant to deny remote access for the connection attempt if the remote access permission of the user account is set to Control access through Remote Access Policy. Otherwise, the remote access permission setting on the user account determines the remote access permission.

    Profile Settings

    A remote access policy profile is a set of properties that are applied to a connection when it is authorized. For VPN connections, you can use the following profile settings:

    • Dial-in constraints can be used to define how long the connection can exist or be idle before being terminated by the answering router, among others.
    • Authentication settings can define which authentication protocols the calling router can use when sending its credentials and the configuration of EAP types, such as EAP-TLS.
    • Encryption settings can define whether encryption is required and the encryption strength. For encryption strengths, Windows Server 2003 supports Basic (40-bit MPPE for PPTP and 56-bit Data Encryption Standard [DES] for L2TP), Strong (56-bit MPPE for PPTP and 56-bit DES for L2TP), or Strongest (128-bit MPPE for PPTP and 3DES for L2TP).

    For example, you can create a Windows group called VPNRouters whose members are the user accounts of all calling routers. Then, you create a policy using the New Remote Access Policy Wizard that specifies VPN connection using the VPNRouters group. Using the Wizard, you can also select a specific authentication method and encryption strength.
    Note IP packet filters on the IP tab of the profile settings of a remote access policy only apply to remote access VPN connections. They have no effect on demand-dial connections.



    Windows Domain User Accounts and Groups

    Windows NT version 4.0 domains, mixed-mode Active Directory domains, and native-mode domains contain the user accounts and groups used by the Routing and Remote Access service and IAS to authenticate and authorize VPN connection attempts.
    User accounts contain the user name and a form of the users password that can be used for validation of the calling routers user credentials. Additional account properties determine whether the user account is enabled or disabled, locked out, or permitted to logon only during specific hours. If a user account is disabled, locked out, or not permitted to logon during the time of the VPN connection, the site-to-site VPN connection attempt is rejected. Additionally, if the user account of the calling router is configured to change the password at the next login, the site-to-site VPN connection attempt will fail because changing the password while attempting to make the connection is an interactive process. Demand-dial routers need to be able to make connections as needed without requiring human intervention. Therefore, all user accounts for calling routers must be configured with the User must change password at next logon checkbox cleared and the Password never expires checkbox selected for the account options on the Account tab on the properties of the user account. When you create dial-in accounts with the Demand-Dial Interface Wizard, these account settings are automatically configured.
    You should use a separate user account for each site that contains a calling router. Each user account should have a name that matches a demand-dial interface configured on the answering router. When you create dial-in accounts with the Demand-Dial Interface Wizard, this one-to-one relationship between user accounts used by calling routers in separate sites and demand-dial interfaces is automatically created.
    User accounts also contain dial-in settings. The dial-in setting most relevant for VPN connections is the remote access permission setting, which has the following values:

    • Allow access
    • Deny access
    • Control access through Remote Access Policy

    The Allow access and Deny access settings explicitly allow or deny remote access and are equivalent to the remote access permission setting of Windows NT 4.0 domain accounts. When you use the Control access through Remote Access Policy setting, the remote access permission is determined by the remote access permission setting of the matching remote access policy. If the user account is in a mixed-mode domain, the Control access through Remote Access Policy setting is not available and you must manage remote access permission on a per-user basis. If the user account is in a native-mode domain, the Control access through Remote Access Policy setting is available and you can manage remote access permission on a per-user basis or using groups. When a dial-in account is created with the Demand-Dial Interface Wizard, the remote access permission is set to Allow access.
    When using groups to manage access, you can use your existing groups and create remote access policies that either allow or reject access or restrict access based on the group name. For example, the Employees group has no VPN remote access restrictions, however, the Contractors group can only create VPN connections during business hours. Alternately, you can create groups based on the type of connection being made. For example, you can create a VPNRouters group and add as members all the user accounts allowed to create VPN connections.

    One-way Initiated Connections and Static Routes on the User Account

    With one-way initiated connections, one router is always the answering router and one router is always the calling router. The answering router accepts the connection and the calling router initiates the connection. One-way initiated connections are well suited to a spoke-and-hub topology where the branch office router is the only router that initiates the connection.
    To simplify configuration for one-way initiated connections, user accounts on stand-alone Windows Server 2003 or in a native-mode Active Directory domain support the configuration of static routes. The static routes are automatically added to the routing table of the VPN router when a VPN connection using the user account is made. If the VPN router is participating in dynamic routing for the site, the routes are propagated to the other routers in the site using routing protocols such as RIP and OSPF. Static routes on user accounts are configured by selecting the Apply static routes check box on the Dial-in tab on the properties of a user account, and then adding static routes.
    To use static routes on the user account, configure the calling router normally. On the answering router, all you have to do is create a user account that is used by the calling router and configure static routes that correspond to the calling router's site. Because there is no demand-dial interface on the answering router with the same name as the user account of the calling router, the incoming VPN connection is determined to be a remote access connection. The static routes of the calling router's user account are added to the VPN router's routing table and all traffic to the locations implied by the static routes is sent across the logical remote access connection to the calling router.
    Note Static routes on the user account are only applied to the answering router when the incoming connection is a remote access VPN connection (the user name in the credentials of the calling router does not match the name of a demand-dial interface on the answering router). Static routes on the user account are not applied when the incoming connection is a demand-dial connection.



    Design Points: AAA Infrastructure

    Consider the following when configuring the AAA infrastructure for site-to-site VPN connections:

    • If you have multiple VPN routers and you want to centralize AAA service or a heterogeneous mixture of dial-up and VPN equipment, use RADIUS servers and configure the VPN router for the RADIUS authentication and accounting providers.
    • If your user account database is a Windows domain, use IAS as your RADIUS server. If you use IAS, install IAS on a domain controller for best performance. Install at least two IAS servers for fail-over and fault tolerance of AAA services.
    • Whether configured locally or on an IAS server, use remote access policies to authorize VPN connections and specify connection constraints. For example, use remote access policies to grant access based on group membership, to enforce the use of encryption and a specific encryption strength, or specify the use of EAP-TLS.
    • For one-way initiated connections, you can configure the calling router normally and configure the answering router with a user account that contains the static routes of the calling router's site.
    • Sensitive fields of RADIUS messages, such as the user password and encryption keys, are encrypted with the RADIUS shared secret configured on the VPN router and the RADIUS server. Make the shared secret a long (22 characters or longer), random sequence of letters, numbers, and punctuation and change it often to protect your RADIUS traffic. An example of a strong shared secret is 8d#>9fq4bV)H7%a3@dW9.>. To further protect RADIUS traffic, use IPSec policies to provide data confidentiality for all traffic using the RADIUS UDP ports (1812 and 1645 for RADIUS authentication traffic and 1813 and 1646 for RADIUS accounting traffic).



    Certificate Infrastructure

    To perform certificate-based authentication for L2TP connections and user certificate-based authentication for site-to-site VPN connections using EAP-TLS, a certificate infrastructure must be in place to issue the proper certificates to submit during the authentication process and to validate the certificate being submitted.
    Computer Certificates for L2TP/IPSec

    If you manually configure the certificate authentication method for a rule of an IPSec policy in Windows Server 2003, you can specify the list of root certification authorities (CAs) from which a certificate is accepted for authentication. For L2TP connections, the IPSec rule for L2TP traffic is automatically configured and the list of root CAs is not configurable. Instead, each computer in the L2TP connection sends a list of root CAs to its IPSec peer from which it accepts a certificate for authentication. The root CAs in this list correspond to the root CAs that issued certificates that are stored in the computer certificate store. For example, if Computer A was issued computer certificates by root CAs CertAuth1 and CertAuth2, it notifies its IPSec peer during main mode negotiation that it will accept certificates for authentication from only CertAuth1 and CertAuth2. If the IPSec peer, Computer B, does not have a valid certificate in its computer certificate store issued from either CertAuth1 or CertAuth2, IPSec security negotiation fails.
    Ensure one of the following before attempting an L2TP connection:

    1. Both the calling router and answering router were issued computer certificates from the same CA.
    2. Both the calling router and answering router were issued computer certificates from CAs that follow a valid certificate chain up to the same root CA.

    In general, the calling router must have a valid computer certificate installed that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the answering router trusts. Additionally, the answering router must have a valid computer certificate installed that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the calling router trusts.
    A single CA commonly issues computer certificates to all computers in an organization. Because of this, all computers within the organization both have computer certificates from a single CA and request certificates for authentication from the same single CA.
    For information about installing computer certificates on VPN routers for L2TP connections, see "Deploying an L2TP/IPSec-based Site-to-Site VPN Connection."
    Note The Windows Server 2003 Routing and Remote Access service supports the configuration of a preshared key for IPSec authentication of L2TP/IPSec connections. To configure the answering router, select Allow custom IPSec policy for L2TP connection from the Security tab in the properties of a VPN router in the Routing and Remote Access snap-in, and then type the preshared key. To configure the calling router, click IPSec Settings on the Security tab in the properties of a demand-dial interface, and then type the preshared key. However, preshared key authentication for L2TP/IPSec connections is not secure and is not recommended, except as an interim measure while deploying a certificate infrastructure or to connect to third-party VPN routers that do not support certificate authentication.



    User and Computer Certificates for EAP-TLS Authentication

    To perform EAP-TLS authentication for a site-to-site VPN connection in Windows Server 2003:

    • The calling router must be configured with a user certificate to submit during the EAP-TLS authentication process.
    • The authenticating server must be configured with a computer certificate to submit during the EAP-TLS authentication process. The authenticating server is either the answering router (if the answering router is configured to use the Windows authentication provider) or a RADIUS server (if the answering router is configured to use the RADIUS authentication provider).

    EAP-TLS authentication is successful when the following conditions are met:

    • The calling router submits a valid user certificate that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the answering router trusts.
    • The authenticating server submits a valid computer certificate that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the calling router trusts.
    • The user certificate of the calling router contains the Client Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.2").
    • The computer certificate of the answering router contains the Server Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.1").

    For a Windows Server 2003 CA, a Router (Offline request) certificate, a special type of user certificate for demand-dial connections, is created and mapped to an Active Directory user account. When the calling router attempts a VPN connection, the Router (Offline request) certificate is sent during the connection negotiation process. If the Router (Offline request) certificate is valid, it is used to determine the appropriate user account from which dial-in properties are obtained.
    For information about configuring user and computer certificates for EAP-TLS authentication, see "Deploying a PPTP-based Site-to-Site VPN Connection" and "Deploying an L2TP-based Site-to-Site VPN Connection."

    Design Points: Certificate Infrastructure

    Consider the following when configuring the certificate infrastructure for site-to-site VPN connections:

    • In order to create L2TP/IPSec site-to-site VPN connections using computer certificate authentication for IPSec, you must install a certificate in the computer certificate store of the calling router and the answering router.
    • In order to authenticate VPN connections using EAP-TLS, the calling router must have a user certificate installed and the authenticating server (either the answering router or the RADIUS server) must have a computer certificate installed.
    • To install a computer or user certificate on a computer across the Internet, make a PPTP connection using a password-based authentication protocol such as MS-CHAP v2. After connecting, use the Certificate Manager snap-in or Internet Explorer to request the appropriate certificates. Once the certificates are installed, disconnect and then reconnect with the appropriate VPN protocol and authentication method. An example of this situation is a computer at a remote branch office without the certificates needed to make L2TP/IPSec or EAP-TLS-authenticated connections.





  3. #3
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Deploying a PPTP-based Site-to-Site VPN Connection
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    The deployment of PPTP-based site-to-site VPN connections using Windows Server 2003 consists of the following:

    • Deploy certificate infrastructure
    • Deploy Internet infrastructure
    • Deploy the answering router
    • Deploy the calling router
    • Deploy AAA infrastructure
    • Deploy site network infrastructure
    • Deploy intersite network infrastructure

    Deploying Certificate Infrastructure

    For PPTP-based VPN connections, a certificate infrastructure is needed only when you are using EAP-TLS authentication. If you are only using a password-based authentication protocol such as MS-CHAP v2, a certificate infrastructure is not required and is not used for the authentication of the VPN connection.
    To use EAP-TLS authentication for site-to-site VPN connections, you must:

    • Install a user certificate on each calling router computer.
    • Configure EAP-TLS on the calling router.
    • Install a computer certificate on the authenticating server (the answering router or the RADIUS server).
    • Configure EAP-TLS on the answering router and for the remote access policy for site-to-site connections.

    Installing a User Certificate on a Calling Router

    If you are using a Windows Server 2003 CA, a Router (Offline request) certificate is created and mapped to an Active Directory user account. To deploy a Router (Offline request) certificates for a calling router, the network administrator must:

    1. Configure the Windows Server 2003 CA to issue Router (Offline request) certificates.
    2. Request a Router (Offline request) certificate.
    3. Export the Router (Offline request) certificate.
    4. Map the certificate to the appropriate user account.
    5. Send the Router (Offline request) certificate to the network administrator of the calling router.
    6. Import the Router (Offline request) certificate on the calling router.

    For more information about deploying Router (Offline request) certificates for demand-dial routing, see the topic titled Branch office demand-dial connection in Windows Server 2003 Help and Support.
    For a third-party CA, see the documentation for the CA software for instructions about how to create a user certificate with the Client Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.2") and export it so that it can be mapped to an Active Directory user account and sent to the network administrator of the calling router. You must also export the root CA certificate, the certificate of the issuing CA, and the certificates of any intermediate CAs and import them to the proper folder of the computer certificate store of the answering router using the Certificate Manager snap-in. For more information, see Appendix E of the Microsoft white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs".

    Configuring EAP-TLS on a Calling Router

    To configure EAP-TLS for user certificates on the calling router:

    • The demand-dial interface must be configured to use EAP with the Smart Card or other certificate EAP type by configuring advanced settings on the Security tab on the properties of a demand-dial interface. For the properties of the Smart Card or other certificate EAP type, select Use a certificate on this computer. If you want to validate the computer certificate of the VPN or IAS server, select Validate server certificate. If you want to configure the names of the authenticating servers, select Connect to these servers and type the server names. To require the servers computer certificate to have been issued a certificate from a specific trusted root CA, select the CA in the list of Trusted Root Certification Authorities.
    • Right-click the demand-dial interface and click Set credentials. In the Connect dialog box, select the correct user or Router (Offline request) certificate in User name on certificate, and then click OK.


    Installing a Computer Certificate on the Authenticating Server

    To install a computer certificate, a certification authority must be present to issue certificates. If the CA is a Windows Server 2003 CA and the authenticating server is either the answering router or a Windows Server 2003 Internet Authentication Service (IAS) RADIUS server, you can install a certificate in the computer certificate store of the authenticating server in the following different ways:

    1. By configuring the automatic allocation of computer certificates to computers in an Active Directory domain.

      This method allows a single point of configuration for the entire domain. All members of the domain automatically receive a computer certificate through Group Policy.
    2. By using the Certificate Manager snap-in to request a certificate to store in the Certificates (Local Computer)\Personal folder.

      In this method, each computer must separately request a computer certificate from the CA. You must have administrator permissions to install a certificate using the Certificate Manager snap-in.
    3. By using Internet Explorer and web enrollment to request a certificate and store it in local machine store.

      In this method, each computer must separately request a computer certificate from the CA. You must have administrator permissions to install a certificate using Web enrollment.

    Based on the certificate policies in your organization, you only need to perform one of these methods.
    For more information about using the Windows Server 2003 CA to obtain computer certificates, see the topics titled "Computer certificates for L2TP/IPSec VPN connections" and "Submit an advanced certificate request via the Web" in Windows Server 2003 Help and Support.
    For a third-party CA, see the documentation for the CA software for instructions about how to create a certificate with the Server Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.1") and export it so that it can be imported using the Certificate Manager snap-in by an administrator on the answering router. Additionally, the root CA certificate, the certificate of the issuing CA, and the certificates of any intermediate CAs must be exported and imported on the calling router. For additional information, see Appendix E of the Microsoft white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs".

    Configuring EAP-TLS on the Answering Router and Remote Access Policy

    To configure EAP-TLS authentication on the answering router:

    • EAP must be enabled as an authentication type on the Authentication Methods dialog box available from the Security tab in the properties of the answering router in the Routing and Remote Access snap-in.

    To configure EAP-TLS authentication on the remote access policy for either the answering router or IAS server:

    • On the remote access policy that is being used for site-to-site VPN connections, the Smart Card or other certificate EAP type must be added to the selected EAP methods from the Authentication tab on the policy's profile settings. If the computer on which the remote access policy is being configured has multiple computer certificates installed, configure the properties of the Smart Card or other certificate EAP type and select the correct computer certificate to submit during the EAP-TLS authentication process.

    If you are using a third-party RADIUS server, see the RADIUS server documentation for information about how to enable EAP-TLS and configure EAP-TLS to use the correct computer certificate.


    Deploying Internet Infrastructure

    Deploying the Internet infrastructure for site-to-site VPN connections consists of the following:

    • Place VPN routers in the perimeter network or on the Internet.
    • Install Windows Server 2003 on VPN router computers and configure Internet interfaces.

    Placing VPN Routers on the Perimeter Network or on the Internet

    Decide where to place the VPN routers in relation to your Internet firewall. In the most common configuration, the VPN routers are placed behind the firewall on the perimeter network between your site and the Internet. If so, configure packet filters on the firewall to allow PPTP traffic to and from the IP address of the VPN routers' perimeter network interfaces. For more information, see Appendix A.

    Installing Windows Server 2003 on VPN Routers and Configuring Internet Interfaces

    Install Windows Server 2003 on VPN router computers and connect it to either the Internet or to perimeter network with one network adapter and connect it to the site with another network adapter. Without running the Routing and Remote Access Server Setup Wizard, the VPN router computer will not forward IP packets between the Internet and the site. For the connection connected to the Internet or the perimeter network, configure the TCP/IP protocol with a public IP address, a subnet mask, and the default gateway of either the firewall (if the router is connected to a perimeter network) or an ISP router (if the router is directly connected to the Internet). Do not configure the connection with DNS server or WINS server IP addresses.


    Deploying the Answering Router

    Deploying the answering router for a site-to-site VPN connection consists of the following:

    • Configure the answering router's connection to the site.
    • Run the Routing and Remote Access Server Setup Wizard.
    • Configure a demand-dial interface.

    Configuring the Answering Router's Connection to the Site

    Configure the connection connected to the site with a manual TCP/IP configuration consisting of IP address, subnet mask, site DNS servers, and site WINS servers. Note that you must not configure the default gateway on the site connection to prevent default route conflicts with the default route pointing to the Internet.

    Running the Routing and Remote Access Server Setup Wizard

    Run the Routing and Remote Access Server Setup Wizard to configure the Windows Server 2003 answering router using the following steps:

    1. Click Start, point to Programs, point to Administrative Tools, and then click Routing and Remote Access.
    2. Right-click the answering name, and then click Configure and Enable Routing and Remote Access. Click Next.
    3. In Configuration, click Remote access (dial-up or VPN) and then click Next. If you additionally want to use the answering router as a network address translator (NAT), Web server, or other function, see Appendix B.
    4. In Remote Access, select VPN. If you also want the answering router to support dial-up site-to-site connections, click Dial-up. Click Next.
    5. In VPN Connection, click the connection that corresponds to the interface connected to the Internet or your perimeter network, and then click Next.
    6. In IP Address Assignment, click Automatically if the answering router should use DHCP to obtain IP addresses for remote access VPN clients and calling routers. Or, click From a specified range of addresses to use one or more static ranges of addresses. If any of the static address ranges is an off-subnet address range, routes must be added to the routing infrastructure in order for the virtual interfaces of calling routers to be reachable. When IP address assignment is complete, click Next.
    7. In Managing Multiple Remote Access Servers, if you are using RADIUS for authentication and authorization, click Yes, set up this server to work with a RADIUS server, and then click Next.
      • In RADIUS Server Selection, configure the primary (mandatory) and alternate (optional) RADIUS servers and the shared secret, and then click Next.
    8. Click Finish.

    By default, only 128 PPTP ports are configured on the WAN Miniport (PPTP) device. If you need more PPTP ports, configure the WAN Miniport (PPTP) device from the properties of the Ports object in the Routing and Remote Access snap-in. By default, 128 L2TP ports are also configured.
    By default, the MS-CHAP, MS-CHAP v2, and EAP authentication methods are enabled.

    Configuring a Demand-dial Interface

    From the Routing and Remote Access snap-in on the answering router, perform the following steps:

    1. In the console tree, right-click Network Interfaces, and then click New Demand-dial Interface.
    2. On the Welcome to the Demand-Dial Interface Wizard page, click Next.
    3. On the Interface Name page, type the name of the demand-dial interface, and then click Next.
    4. On the Connection Type page, click Connect using virtual private networking (VPN), and then click Next.
    5. On the VPN Type page, click Point to Point Tunneling Protocol (PPTP), and then click Next.
    6. On the Destination Address page, type the IP address of the calling router.

      For a two-way-initiated router to-router VPN connection, configure the IP address of the calling router. For a one-way initiated site-to-site VPN connection, you can skip this step because the answering router never uses this interface to initiate a connection to the calling router.
    7. On the Protocols and Security page, select the Route IP packets on this interface and Add a user account so that a remote router can dial in check boxes, and then click Next.
    8. On the Static Routes for Remote Networks page, click Add to add static routes assigned to the demand-dial interface (as needed).
    9. On the Dial In Credentials page, type the password of the user account used by the calling router in Password and Confirm password, and then click Next. This step automatically creates a user account with the same name as the demand-dial interface that is being created. This is done so that when the calling router initiates a connection to the answering router, it is using a user account name that matches the name of a demand-dial interface. Therefore, the answering router can determine that the incoming connection from the calling router is a demand-dial connection rather than a remote access connection.
    10. On the Dial Out Credentials page, type the user name in User name, the user account domain name in Domain, and the user account password in both Password and Confirm password.

      For a two-way-initiated router to-router VPN connection, configure the name, domain, and password when this router is acting as the calling router. For a one-way initiated site-to-site VPN connection, you can type any name in User name and skip the rest of the fields because this router never uses this interface to initiate a connection to the calling router.
    11. On the Completing the Demand-Dial Interface Wizard page, click Finish.

    The result of this configuration is a PPTP-based demand-dial interface over which IP routing is enabled. A user account with the same name as the demand-dial interface is automatically added with correct account and dial-in settings.


    Deploying the Calling Router

    Deploying the calling router for a site-to-site VPN connection consists of the following:

    • Configure the calling router's connection to the site.
    • Run the Routing and Remote Access Server Setup Wizard.
    • Configure a demand-dial interface.

    Configuring the Calling Router's Connection to the Site

    Configure the connection connected to the site with a manual TCP/IP configuration consisting of IP address, subnet mask, site DNS servers, and site WINS servers. Note that you must not configure the default gateway on the site connection to prevent default route conflicts with the default route pointing to the Internet.

    Running the Routing and Remote Access Server Setup Wizard

    Run the Routing and Remote Access Server Setup Wizard to configure the Windows Server 2003 calling router using the following steps:

    1. Click Start, point to Programs, point to Administrative Tools, and then click Routing and Remote Access.
    2. Right-click your server name, and then click Configure and Enable Routing and Remote Access. Click Next.
    3. In Configuration, click Remote access (dial-up or VPN) and then click Next. If you additionally want to use the calling router as a network address translator (NAT), Web server, or other function, see Appendix B.
    4. In Remote Access, select VPN. If you also want the VPN router to support dial-up site-to-site connections, click Dial-up. Click Next.
    5. In VPN Connection, click the connection that corresponds to the interface connected to the Internet or your perimeter network, and then click Next.
    6. In IP Address Assignment, click Automatic if the calling router should use DHCP to obtain IP addresses for other calling routers when it is acting as an answering router. Or, click From a specified range of addresses to use one or more static ranges of addresses. If any of the static address ranges is an off-subnet address range, routes must be added to the routing infrastructure in order for the virtual interfaces of routers calling this router to be reachable. When IP address assignment is complete, click Next.
    7. In Managing Multiple Remote Access Servers, if you are using RADIUS for authentication and authorization, click Yes, set up this server to work with a RADIUS server, and then click Next.
      • In RADIUS Server Selection, configure the primary (mandatory) and alternate (optional) RADIUS servers and the shared secret, and then click Next.
    8. Click Finish.


    Configuring a Demand-dial Interface

    From the Routing and Remote Access snap-in on the calling router, perform the following steps:

    1. In the console tree, right-click Network Interfaces, and then click New Demand-dial Interface.
    2. On the Welcome to the Demand-Dial Interface Wizard page, click Next.
    3. On the Interface Name page, type the name of the demand-dial interface. For a two-way initiated connection, this is the same name as the user name in the user credentials used by the answering router when it is acting as a calling router. Click Next.
    4. On the Connection Type page, click Connect using virtual private networking (VPN), and then click Next.
    5. On the VPN Type page, click Point to Point Tunneling Protocol (PPTP), and then click Next.
    6. On the Destination Address page, type the IP address of the answering router.
    7. On the Protocols and Security page, select the Route IP packets on this interface check box. For a two-way initiated connection, select the Add a user account so that a remote router can dial in check box. Click Next.
    8. On the Static Routes for Remote Networks page, click Add to add static routes assigned to the demand-dial interface (as needed).
    9. For a two-way initiated connection, in the Dial In Credentials page, type the password of the user account used by the answering router acting as a calling router in Password and Confirm password, and then click Next. This step automatically creates a user account with the same name as the demand-dial interface that is being created. This is done so that when the answering router acting as a calling router initiates a connection to this router, it is using a user account name that matches the name of a demand-dial interface. Therefore, this router can determine that the incoming connection from the answering router acting as a calling router is a demand-dial connection rather than a remote access connection.
    10. On the Dial Out Credentials page, type the user name in User name, the user account domain name in Domain, and the user account password in both Password and Confirm password.
    11. On the Completing the demand-dial interface wizard page, click Finish.

    The result of this configuration is a PPTP-based demand-dial interface over which IP routing is enabled. A user account with the same name as the demand-dial interface is automatically added with correct account and dial-in settings (if needed).


    Deploying AAA Infrastructure

    Deploying the AAA infrastructure for site-to-site VPN connections consists of the following:

    • Configure Active Directory for user accounts and groups.
    • Configure the primary IAS server on a domain controller.
    • Configure the secondary IAS server on a different domain controller.

    This configuration must be done at each site containing an answering router. For branch offices with few computers and a single answering router, it is easier to configure the Routing and Remote Access service for Windows authentication and use locally configured remote access policies than configuring a separate IAS server computer.
    Configuring Active Directory for User Accounts and Groups

    To configure Active Directory for user accounts and groups, do the following:

    1. Ensure that all calling routers have a corresponding user account with the correct account and dial-in settings. This includes calling routers for branch offices and business partners. User accounts with the correct account and dial-in settings are automatically created when you select the Add a user account so that a remote router can dial in check box on the Protocols and Security page of the Demand-Dial Interface Wizard.
    2. Organize user accounts used by calling routers into the appropriate universal and nested groups to take advantage of group-based remote access policies. For more information, see the topic titled "Nesting groups" in Windows Server 2003 Help and Support.


    Configuring the Primary IAS Server on a Domain Controller

    To configure the primary IAS server on a domain controller, do the following:

    1. On the domain controller, install IAS as an optional networking component. For more information, see the topic titled "Install IAS" in Windows Server 2003 Help and Support.
    2. Configure the IAS server computer (the domain controller) to read the properties of user accounts in the domain. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support.

      If the IAS server authenticates connection attempts for user accounts in other domains, verify that these domains have a two-way trust with the domain in which the IAS server computer is a member. Next, configure the IAS server computer to read the properties of user accounts in other domains. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support. For more information about trust relationships, see the topic titled "Understanding Domains and Forests" in Windows Server 2003 Help and Support.
    3. If the IAS server authenticates connection attempts for user accounts in other domains, and those domains do not have a two-way trust with the domain in which the IAS server computer is a member, you must configure a RADIUS proxy between the two untrusted domains.
    4. Enable file logging for accounting and authentication events. For more information, see the topic titled "Configure log file properties" in Windows Server 2003 Help and Support.
    5. Add the VPN router(s) as RADIUS clients of the IAS server. For more information, see the topic titled "Add RADIUS clients" in Windows Server 2003 Help and Support. For the IP address of each VPN router, use the site IP address assigned to the VPN router. If you are using names, use the internal name of the VPN router. Use strong shared secrets.
    6. Create remote access policies that reflect your remote access usage scenarios.

      For example, to configure a remote access policy that requires PPTP-based site-to-site VPN connections for members of the VPNRouters group to use MS-CHAP v2 authentication and 128-bit encryption, use the New Remote Access Policy Wizard to create a typical remote access policy with the following settings:

      Policy name: Site-to-Site VPN connections (example)

      Access method: VPN

      Group access: VPNRouters group (example)

      Authentication methods: Enable only Microsoft Encrypted Authentication version 2 (MS-CHAP v2)

      Policy encryption level: Select only Strongest encryption

    If IAS is not installed on a domain controller, you must configure the primary IAS server computer to read the properties of user accounts in the domain. For more information, see the "Enable the IAS server to read user accounts in Active Directory" in Windows Server 2003 Help and Support.

    Configuring the Secondary IAS Server on a Different Domain Controller

    To configure the secondary IAS server on a different domain controller, do the following:

    1. On the other domain controller, install IAS as an optional networking component. For more information, see the topic titled "Install IAS" in Windows Server 2003 Help and Support.
    2. Configure the secondary IAS server computer (the other domain controller) to read the properties of user accounts in the domain. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support.
    3. If the secondary IAS server authenticates connection attempts for user accounts in other domains, verify that the other domains have a two-way trust with the domain in which the secondary IAS server computer is a member. Next, configure the secondary IAS server computer to read the properties of user accounts in other domains. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support. For more information about trust relationships, see the topic titled "Understanding Domains and Forests" in Windows Server 2003 Help and Support.

      If the secondary IAS server authenticates connection attempts for user accounts in other domains, and those domains do not have a two-way trust with the domain in which the secondary IAS server computer is a member, you must configure a RADIUS proxy between the two untrusted domains.
    4. To copy the configuration of the primary IAS server to the secondary IAS server, type netsh aaaa show config >path\file.txt at a command prompt on the primary IAS server. This stores the configuration settings, including registry settings, in a text file. The path can be relative, absolute, or a network path.
    5. Copy the file created in step 4 to the secondary IAS server. At a command prompt on the secondary IAS server, type netsh execpath\file.txt. This imports all the settings configured on the primary IAS server to the secondary IAS server.

    If IAS is not installed on a domain controller, you must configure the secondary IAS server computer to read the properties of user accounts in the domain. For more information, see the "Enable the IAS server to read user accounts in Active Directory" in Windows Server 2003 Help and Support.


    Deploying Site Network Infrastructure

    Deploying the network infrastructure of a site for site-to-site VPN connections consists of the following:

    • Configure routing on the VPN routers.
    • Verify reachability from each VPN router.
    • Configure routing for off-subnet address pools.

    Configuring Routing on the VPN Routers

    In order for your VPN routers to properly forward traffic to locations within the site in which they are located, you must configure them with either static routes that summarize all the possible addresses used on in the site or with routing protocols so that the VPN router can participate as a dynamic router and automatically add routes for site subnets to its routing table.
    To add static routes, see the topic titled "Add a static route" in Windows Server 2003 Help and Support. To configure the VPN router as a RIP router, see the topic titled "Configure RIP for IP". To configure the VPN router as an OSPF router, see the topics titled "OSPF design considerations" and "Configure OSPF" in Windows Server 2003 Help and Support.

    Verifying Reachability from each VPN Router

    From each VPN router, verify that the VPN router computer can resolve names and successfully communicate with resources in the VPN router's site by using the Ping command, Internet Explorer, and making drive and printer connections to known servers within the site.

    Configuring Routing for Off-subnet Address Pools

    If you configured any of the VPN routers with a static address pool and any of the ranges within the pool are an off-subnet range, you must ensure that the route(s) representing the off-subnet address range(s) are present in your site routing infrastructure to reach the virtual interfaces of calling routers. You can ensure this by adding static route(s) representing the off-subnet address range(s) as static routes to the neighboring router(s) of the VPN router(s) and then using the routing protocol of your site to propagate the route to other routers. When you add the static route(s), you must specify that the gateway or next hop address is the site interface of the VPN router.
    Alternately, if you are using RIP or OSPF, you can configure the VPN routers using off-subnet address pools as RIP or OSPF routers. For OSPF, you must configure the VPN router as an autonomous system boundary router (ASBR). For more information, see the topic titled "OSPF design considerations" in Windows Server 2003 Help and Support.


    Deploying Intersite Network Infrastructure

    Deploying the intersite network infrastructure consists of configuring each VPN router with the set of routes for subnets that are available in the other sites (across each site-to-site VPN connection). This can be done in the following ways:

    • Manually configure static routes on each VPN router.
    • Perform auto-static updates on each VPN router.
    • Configure routing protocols to operate over the site-to-site VPN connection.

    Manually Configuring Static Routes on Each VPN Router

    From the Routing and Remote Access snap-in, perform the following steps:

    1. In the console tree, click IP Routing, and then click Static Routes.
    2. Right-click Static Routes, and then click New Static Route.
    3. In the Static Route dialog box, select the appropriate demand-dial interface name, and type the destination, network mask, and metric.
    4. Click OK to add the route.
    5. For an additional route, go back to step 2.

    Note Because the demand-dial connection is a point-to-point connection, the Gateway IP address field is not configurable. The adding of static routes can also be done during the creation of the demand-dial interface with the New Demand-Dial Interface Wizard.



    Performing Auto-static Updates on Each VPN Router

    If RIP for IP is enabled on the demand-dial interfaces of both VPN routers, you can use auto-static updates to automatically configure static routes when the VPN connection is in a connected state. A demand-dial interface that is configured for auto-static updates sends a request across an active connection to request all of the routes of the router on the other side of the connection. In response to the request, all of the routes of the requested router are automatically entered as static routes in the routing table of the requesting router.
    From the Routing and Remote Access snap-in on a VPN router (assuming the site-to-site VPN connection is active), perform the following steps:

    1. In the console tree, click IP Routing, and then click General.
    2. In the details pane, right-click the appropriate demand-dial interface, and then click Update Routes.

    You can also use the netsh interface set interface command to perform an auto-static update. For more information, see the topic titled "Scheduling auto-static updates" in Windows Server 2003 Help and Support.

    Configuring Routing Protocols

    If the site-to-site VPN connection is persistent (always active), you can also configure IP routing protocols such as Routing Information Protocol (RIP) or Open Shortest Path First (OSPF) to operate over the VPN connection. For more information, see the topics titled "Setting up a RIP-for-IP routed internetwork" and "Setting up an OSPF routed internetwork" in Windows Server 2003 Help and Support.











  4. #4
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Deploying an L2TP/IPSec-based Site-to-Site VPN Connection
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    The deployment of L2TP/IPSec-based site-to-site VPN connections using Windows Server 2003 consists of the following:

    • Deploy certificate infrastructure
    • Deploy Internet infrastructure
    • Deploy the answering router
    • Deploy the calling router
    • Deploy AAA infrastructure
    • Deploy site network infrastructure
    • Deploy intersite network infrastructure

    Deploying Certificate Infrastructure

    For L2TP-based VPN connections, a certificate infrastructure is required to issue certificates needed to perform IPSec authentication. Additionally, a certificate infrastructure is also needed when you are using EAP-TLS authentication.
    Certificates for L2TP Connections

    To install a computer certificate, a CA must be present to issue certificates. If the CA is a Windows Server 2003 CA, you can install a certificate in the computer certificate store of the VPN router in the following different ways:

    1. By configuring the automatic allocation of computer certificates to computers in an Active Directory domain.

      This method allows a single point of configuration for the entire domain. All members of the domain automatically receive a computer certificate through Group Policy.
    2. By using the Certificate Manager snap-in to request a certificate to store in the Certificates (Local Computer)\Personal folder.

      In this method, each computer must separately request a computer certificate from the CA. You must have administrator permissions to install a certificate using the Certificate Manager snap-in.
    3. By using Internet Explorer and web enrollment to request a certificate and store it in local machine store.

      In this method, each computer must separately request a computer certificate from the CA. You must have administrator permissions to install a certificate using Web enrollment.

    Based on the certificate policies in your organization, you only need to perform one of these methods.
    For more information about using the Windows Server 2003 CA to obtain computer certificates, see the topics titled "Computer certificates for L2TP/IPSec VPN connections" and "Submit an advanced certificate request via the Web" in Windows Server 2003 Help and Support.
    For a third-party CA, see the documentation for the CA software for instructions about how to create a certificate and export it so that it can be imported into the computer certificate store using the Certificate Manager snap-in by an administrator on the calling and answering routers. Additionally, the root CA certificate, the certificate of the issuing CA, and the certificates of any intermediate CAs must be exported and imported on the calling and answering routers. For additional information, see Appendix E of the Microsoft white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs".

    Certificates for EAP-TLS Authentication

    To use EAP-TLS authentication of site-to-site VPN connections, you must:

    • Install a user certificate on each calling router computer.
    • Configure EAP-TLS on the calling router.
    • Install a computer certificate on the authenticating server (the answering router or the RADIUS server)
    • Configure EAP-TLS on the answering router and remote access policy.


    Installing a User Certificate on a Calling Router

    If you are using a Windows Server 2003 CA, a Router (Offline request) certificate (a special type of user certificate for demand-dial connections), is created and mapped to an Active Directory user account. To deploy a Router (Offline request) certificates for a calling router, the network administrator must:

    1. Configure the Windows Server 2003 CA to issue Router (Offline request) certificates.
    2. Request a Router (Offline request) certificate.
    3. Export the Router (Offline request) certificate.
    4. Map the certificate to the appropriate user account.
    5. Send the Router (Offline request) certificate to the network administrator of the calling router.
    6. Import the Router (Offline request) certificate on the calling router.

    For more information about deploying Router (Offline request) certificates for demand-dial routing, see the topic titled Branch office demand-dial connection in Windows Server 2003 Help and Support.
    For a third-party CA, see the documentation for the CA software for instructions about how to create a user certificate with the Client Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.2") and export it so that it can be mapped to an Active Directory user account and sent to the network administrator of the calling router. You must also export the root CA certificate, the certificate of the issuing CA, and the certificates of any intermediate CAs and import them to the proper folder of the computer certificate store of the answering router using the Certificate Manager snap-in. For additional information, see Appendix E of the Microsoft white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs".

    Configuring EAP-TLS on the Calling Router

    To configure EAP-TLS for user certificates on the calling router:

    • The demand-dial interface must be configured to use EAP with the Smart Card or other certificate EAP type by configuring advanced settings on the Security tab on the properties of a demand-dial interface. In the properties of the Smart Card or other certificate EAP type, select Use a certificate on this computer. If you want to validate the computer certificate of the VPN or IAS server, select Validate server certificate. If you want to configure the names of the authenticating servers, select Connect to these servers and type the server names. To require the server's computer certificate to have been issued a certificate from a specific trusted root CA, select the CA in the list of Trusted Root Certification Authorities.
    • Right-click the demand-dial interface and click Set credentials. In the Connect dialog box, select the correct user or Router (Offline request) certificate in User name on certificate, and then click OK.


    Installing a Computer Certificate on the Authenticating Server

    If the authenticating server is the answering router, you can use the same computer certificate that is installed to authenticate L2TP connections for EAP-TLS authentication provided it contains the Server Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.1"). If not, you must install an additional computer certificate that contains the Server Authentication enhanced key usage. If the authenticating server is an IAS server, you must install a computer certificate that contains the Server Authentication enhanced key usage.
    If the CA is a Windows Server 2003 CA and the authenticating server is either the answering router or a Windows Server 2003 Internet Authentication Service (IAS) RADIUS server, you can install a certificate in the computer certificate store of the authenticating server using the methods described in the "Certificates for L2TP connections" section of this paper.
    For a third-party CA, see the documentation for the CA software for instructions about how to create a certificate with the Server Authentication enhanced key usage (object identifier "1.3.6.1.5.5.7.3.1") and export it so that an administrator on the answering router can import it using the Certificate Manager snap-in. Additionally, the root CA certificate, the certificate of the issuing CA, and the certificates of any intermediate CAs must be exported and imported on the calling router. For additional information, see Appendix E of the Microsoft white paper titled "Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs".

    Configuring EAP-TLS on the Answering Router and Remote Access Policy

    To configure EAP-TLS authentication on the answering router:

    • EAP must be enabled as an authentication type on the Authentication Methods dialog box available from the Security tab in the properties of the answering router in the Routing and Remote Access snap-in.

    To configure EAP-TLS authentication on the remote access policy of the answering router or IAS server:

    • On the remote access policy that is being used for site-to-site VPN connections, EAP must be enabled with the Smart Card or other certificate EAP type must be added to the selected EAP methods from the Authentication tab on the policy's profile settings. If the computer on which the remote access policy is being configured has multiple computer certificates installed, configure the properties of the Smart Card or other certificate EAP type and select the appropriate computer certificate to submit during the EAP-TLS authentication process.

    If you are using a third-party RADIUS server, see the RADIUS server documentation for information about how to enable EAP-TLS and configure EAP-TLS to use the correct computer certificate.


    Deploying Internet Infrastructure

    Deploying the Internet infrastructure for site-to-site VPN connections consists of the following:

    • Place VPN routers in the perimeter network or on the Internet.
    • Install Windows Server 2003 on VPN router computers and configure Internet interfaces.

    Placing VPN Routers on the Perimeter Network or on the INTERNET

    Decide where to place the VPN routers in relation to your Internet firewall. In the most common configuration, the VPN routers are placed behind the firewall on the perimeter network between your site and the Internet. If so, configure packet filters on the firewall to allow L2TP/IPSec traffic to and from the IP address of the VPN routers' perimeter network interfaces. For more information, see Appendix A.

    Installing Windows Server 2003 on VPN Routers and Configuring Internet Interfaces

    Install Windows Server 2003 on VPN router computers and connect them to either the Internet or to the perimeter network with one network adapter and connect it to the site with another network adapter. Without running the Routing and Remote Access Server Setup Wizard, the VPN router computer will not forward IP packets between the Internet and the site. For the connection connected to the Internet or the perimeter network, configure the TCP/IP protocol with a public IP address, a subnet mask, and the default gateway of either the firewall (if the router is connected to a perimeter network) or an ISP router (if the router is directly connected to the Internet). Do not configure the connection with DNS server or WINS server IP addresses.


    Deploying the Answering Router

    Deploying the answering router for a site-to-site VPN connection consists of the following:

    • Configure the answering router's connection to the site.
    • Run the Routing and Remote Access Server Setup Wizard.
    • Configure a demand-dial interface.

    Configuring the Answering Router's Connection to the Site

    Configure the connection connected to the site with a manual TCP/IP configuration consisting of IP address, subnet mask, site DNS servers, and site WINS servers. Note that you must not configure the default gateway on the site connection to prevent default route conflicts with the default route pointing to the Internet.

    Running the Routing and Remote Access Server Setup Wizard

    Run the Routing and Remote Access Server Setup Wizard to configure the Windows Server 2003 answering router using the following steps:

    1. Click Start, point to Programs, point to Administrative Tools, and then click Routing and Remote Access.
    2. Right-click the answering name, and then click Configure and Enable Routing and Remote Access. Click Next.
    3. In Configuration, click Remote access (dial-up or VPN) and then click Next. If you additionally want to use the answering router as a network address translator (NAT), Web server, or other function, see Appendix B.
    4. In Remote Access, select VPN. If you also want the answering router to support dial-up site-to-site connections, click Dial-up. Click Next.
    5. In VPN Connection, click the connection that corresponds to the interface connected to the Internet or your perimeter network, and then click Next.
    6. In IP Address Assignment, click Automatically if the answering router should use DHCP to obtain IP addresses for remote access VPN clients and calling routers. Or, click From a specified range of addresses to use one or more static ranges of addresses. If any of the static address ranges is an off-subnet address range, routes must be added to the routing infrastructure in order for the virtual interfaces of calling routers to be reachable. When IP address assignment is complete, click Next.
    7. In Managing Multiple Remote Access Servers, if you are using RADIUS for authentication and authorization, click Yes, set up this server to work with a RADIUS server, and then click Next.
      • In RADIUS Server Selection, configure the primary (mandatory) and alternate (optional) RADIUS servers and the shared secret, and then click Next.
    8. Click Finish.

    By default, only 128 L2TP ports are configured on the WAN Miniport (L2TP) device. If you need more L2TP ports, configure the WAN Miniport (L2TP) device from the properties of the Ports object in the Routing and Remote Access snap-in. By default, 128 PPTP ports are also configured.
    By default, the MS-CHAP, MS-CHAP v2, and EAP authentication methods are enabled.

    Configuring a Demand-dial Interface

    From the Routing and Remote Access snap-in on the answering router, perform the following steps:

    1. In the console tree, right-click Network Interfaces, and then click New Demand-dial Interface.
    2. On the Welcome to the Demand-Dial Interface Wizard page, click Next.
    3. On the Interface Name page, type the name of the demand-dial interface, and then click Next.
    4. On the Connection Type page, click Connect using virtual private networking (VPN), and then click Next.
    5. On the VPN Type page, click Layer 2 Tunneling Protocol (L2TP), and then click Next.
    6. On the Destination Address page, type the IP address of the calling router.

      For a two-way-initiated router to-router VPN connection, configure the IP address of the calling router. For a one-way initiated site-to-site VPN connection, you can skip this step because the answering router never uses this interface to initiate a connection to the calling router.
    7. On the Protocols and Security page, select the Route IP packets on this interface and Add a user account so that a remote router can dial in check boxes, and then click Next.
    8. On the Static Routes for Remote Networks page, click Add to add static routes assigned to the demand-dial interface (as needed).
    9. On the Dial In Credentials page, type the password of the user account used by the calling router in Password and Confirm password, and then click Next. This step automatically creates a user account with the same name as the demand-dial interface that is being created. This is done so that when the calling router initiates a connection to the answering router, it is using a user account name that matches the name of a demand-dial interface. Therefore, the answering router can determine that the incoming connection from the calling router is a demand-dial connection rather than a remote access connection.
    10. On the Dial Out Credentials page, type the user name in User name, the user account domain name in Domain, and the user account password in both Password and Confirm password.

      For a two-way-initiated router to-router VPN connection, configure the name, domain, and password when this router is acting as the calling router. For a one-way initiated site-to-site VPN connection, you can type any name in User name and skip the rest of the fields because this router never uses this interface to initiate a connection to the calling router.
    11. On the Completing the Demand-Dial Interface Wizard page, click Finish.

    The result of this configuration is an L2TP-based demand-dial interface over which IP routing is enabled. A user account with the same name as the demand-dial interface is automatically added with correct account and dial-in settings.


    Deploying the Calling Router

    Deploying the calling router for a site-to-site VPN connection consists of the following:

    • Configure the calling router's connection to the site.
    • Run the Routing and Remote Access Server Setup Wizard.
    • Configure a demand-dial interface.

    Configuring the Calling Router's Connection to the Site

    Configure the connection connected to the site with a manual TCP/IP configuration consisting of IP address, subnet mask, site DNS servers, and site WINS servers. Note that you must not configure the default gateway on the site connection to prevent default route conflicts with the default route pointing to the Internet.

    Running the Routing and Remote Access Server Setup Wizard

    Run the Routing and Remote Access Server Setup Wizard to configure the Windows Server 2003 calling router using the following steps:

    1. Click Start, point to Programs, point to Administrative Tools, and then click Routing and Remote Access.
    2. Right-click your server name, and then click Configure and Enable Routing and Remote Access. Click Next.
    3. In Configuration, click Remote access (dial-up or VPN) and then click Next. If you additionally want to use the calling router as a network address translator (NAT), Web server, or other function, see Appendix B.
    4. In Remote Access, select VPN. If you also want the VPN router to support dial-up site-to-site connections, click Dial-up. Click Next.
    5. In VPN Connection, click the connection that corresponds to the interface connected to the Internet or your perimeter network, and then click Next.
    6. In IP Address Assignment, click Automatic if the calling router should use DHCP to obtain IP addresses for other calling routers when it is acting as an answering router. Or, click From a specified range of addresses to use one or more static ranges of addresses. If any of the static address ranges is an off-subnet address range, routes must be added to the routing infrastructure in order for the virtual interfaces of routers calling this router to be reachable. When IP address assignment is complete, click Next.
    7. In Managing Multiple Remote Access Servers, if you are using RADIUS for authentication and authorization, click Yes, set up this server to work with a RADIUS server, and then click Next.
      • In RADIUS Server Selection, configure the primary (mandatory) and alternate (optional) RADIUS servers and the shared secret, and then click Next.
    8. Click Finish.


    Configuring a Demand-dial Interface

    From the Routing and Remote Access snap-in on the calling router, perform the following steps:

    1. In the console tree, right-click Network Interfaces, and then click New Demand-dial Interface.
    2. On the Welcome to the Demand-Dial Interface Wizard page, click Next.
    3. On the Interface Name page, type the name of the demand-dial interface. For a two-way initiated connection, this is the same name as the user name in the user credentials used by the answering router when it is acting as a calling router. Click Next.
    4. On the Connection Type page, click Connect using virtual private networking (VPN), and then click Next.
    5. On the VPN Type page, click Layer 2 Tunneling Protocol (L2TP), and then click Next.
    6. On the Destination Address page, type the IP address of the answering router.
    7. On the Protocols and Security page, select the Route IP packets on this interface check box. For a two-way initiated connection, select the Add a user account so that a remote router can dial in check box. Click Next.
    8. On the Static Routes for Remote Networks page, click Add to add static routes assigned to the demand-dial interface (as needed).
    9. For a two-way initiated connection, in the Dial In Credentials page, type the password of the user account used by the answering router acting as a calling router in Password and Confirm password, and then click Next. This step automatically creates a user account with the same name as the demand-dial interface that is being created. This is done so that when the answering router acting as a calling router initiates a connection to this router, it is using a user account name that matches the name of a demand-dial interface. Therefore, this router can determine that the incoming connection from the answering router acting as a calling router is a demand-dial connection rather than a remote access connection.
    10. On the Dial Out Credentials page, type the user name in User name, the user account domain name in Domain, and the user account password in both Password and Confirm password.
    11. On the Completing the demand-dial interface wizard page, click Finish.

    The result of this configuration is an L2TP-based demand-dial interface over which IP routing is enabled. A user account with the same name as the demand-dial interface is automatically added with correct account and dial-in settings.


    Deploying AAA Infrastructure

    Deploying the AAA infrastructure for site-to-site VPN connections consists of the following:

    • Configure Active Directory for user accounts and groups.
    • Configure the primary IAS server on a domain controller.
    • Configure the secondary IAS server on a different domain controller.

    This configuration must be done at each site containing an answering router. For branch offices with few computers and a single answering router, it is easier to configure the Routing and Remote Access service for Windows authentication and use locally configured remote access policies than configuring a separate IAS server computer.
    Configuring Active Directory for User Accounts and Groups

    To configure Active Directory for user accounts and groups, do the following:

    1. Ensure that all calling routers have a corresponding user account with the correct account and dial-in settings. This includes calling routers for branch offices and business partners. User accounts with the correct account and dial-in settings are automatically created when you select the Add a user account so that a remote router can dial in check box on the Protocols and Security dialog box in the Demand-Dial Interface Wizard.
    2. Organize user accounts used by calling routers into the appropriate universal and nested groups to take advantage of group-based remote access policies. For more information, see the topic titled "Nesting groups" in Windows Server 2003 Help and Support.


    Configuring the Primary IAS Server on a Domain Controller

    To configure the primary IAS server on a domain controller, do the following:

    1. On the domain controller, install IAS as an optional networking component. For more information, see the topic titled "Install IAS" in Windows Server 2003 Help and Support.
    2. Configure the IAS server computer (the domain controller) to read the properties of user accounts in the domain. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support.
    3. If the IAS server authenticates connection attempts for user accounts in other domains, verify that these domains have a two-way trust with the domain in which the IAS server computer is a member. Next, configure the IAS server computer to read the properties of user accounts in other domains. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support. For more information about trust relationships, see the topic titled "Understanding Domains and Forests" in Windows Server 2003 Help and Support.

      If the IAS server authenticates connection attempts for user accounts in other domains, and those domains do not have a two-way trust with the domain in which the IAS server computer is a member, you must configure a RADIUS proxy between the two untrusted domains.
    4. Enable file logging for accounting and authentication events. For more information, see the topic titled "Configure log file properties" in Windows Server 2003 Help and Support.
    5. Add the VPN router(s) as RADIUS clients of the IAS server. For more information, see the topic titled "Add RADIUS clients" in Windows Server 2003 Help and Support. For the IP address of each VPN router, use the site IP address assigned to the VPN router. If you are using names, use the internal name of the VPN router. Use strong shared secrets.
    6. Create remote access policies that reflect your remote access usage scenarios.

      For example, to configure a remote access policy that requires L2TP-based site-to-site VPN connections for members of the VPNRouters group to use MS-CHAP v2 authentication and 128-bit encryption, use the New Remote Access Policy Wizard to create a typical remote access policy with the following settings:

      Policy name: Site-to-Site VPN connections (example)

      Access method: VPN

      Group access: VPNRouters group (example)

      Authentication methods: Enable only Microsoft Encrypted Authentication version 2 (MS-CHAP v2)

      Policy encryption level: Select only Strongest encryption

    If IAS is not installed on a domain controller, you must configure the primary IAS server computer to read the properties of user accounts in the domain. For more information, see the "Enable the IAS server to read user accounts in Active Directory" in Windows Server 2003 Help and Support.

    Configuring the Secondary IAS Server on a Different Domain Controller

    To configure the secondary IAS server on a different domain controller, do the following:

    1. On the other domain controller, install IAS as an optional networking component. For more information, see the topic titled "Install IAS" in Windows Server 2003 Help and Support.
    2. Configure the secondary IAS server computer (the other domain controller) to read the properties of user accounts in the domain. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support.
    3. If the secondary IAS server authenticates connection attempts for user accounts in other domains, verify that the other domains have a two-way trust with the domain in which the secondary IAS server computer is a member. Next, configure the secondary IAS server computer to read the properties of user accounts in other domains. For more information, see the topic titled "Enable the IAS server to read user objects in Active Directory" in Windows Server 2003 Help and Support. For more information about trust relationships, see the topic titled "Understanding Domains and Forests" in Windows Server 2003 Help and Support.

      If the secondary IAS server authenticates connection attempts for user accounts in other domains, and those domains do not have a two-way trust with the domain in which the secondary IAS server computer is a member, you must configure a RADIUS proxy between the two untrusted domains.
    4. To copy the configuration of the primary IAS server to the secondary IAS server, type netsh aaaa show config >path\file.txt at a command prompt on the primary IAS server. This stores the configuration settings, including registry settings, in a text file. The path can be relative, absolute, or a network path.
    5. Copy the file created in step 4 to the secondary IAS server. At a command prompt on the secondary IAS server, type netsh execpath\file.txt. This imports all the settings configured on the primary IAS server to the secondary IAS server.

    If IAS is not installed on a domain controller, you must configure the secondary IAS server computer to read the properties of user accounts in the domain. For more information, see the "Enable the IAS server to read user accounts in Active Directory" in Windows Server 2003 Help and Support.


    Deploying Site Network Infrastructure

    Deploying the network infrastructure of a site for site-to-site VPN connections consists of the following:

    • Configure routing on the VPN routers.
    • Verify reachability from each VPN router.
    • Configure routing for off-subnet address pools.

    Configuring Routing on the VPN Routers

    In order for your VPN routers to properly forward traffic to locations within the site in which they are located, you must configure them with either static routes that summarize all the possible addresses used on in the site or with routing protocols so that the VPN router can participate as a dynamic router and automatically add routes for site subnets to its routing table.
    To add static routes, see the topic titled "Add a static route" in Windows Server 2003 Help and Support. To configure the VPN router as a RIP router, see the topic titled "Configure RIP for IP". To configure the VPN router as an OSPF router, see the topics titled "OSPF design considerations" and "Configure OSPF" in Windows Server 2003 Help and Support.

    Verifying Reachability from Each VPN Router

    From each VPN router, verify that the VPN router computer can resolve names and successfully communicate with resources in the VPN router's site by using the Ping command, Internet Explorer, and making drive and printer connections to known servers within the site.

    Configuring Routing for Off-Subnet Address Pools

    If you configured any of the VPN routers with a static address pool and any of the ranges within the pool are an off-subnet range, you must ensure that the route(s) representing the off-subnet address range(s) are present in your site routing infrastructure to reach the virtual interfaces of calling routers. You can ensure this by adding static route(s) representing the off-subnet address range(s) as static routes to the neighboring router(s) of the VPN router(s) and then using the routing protocol of your site to propagate the route to other routers. When you add the static route(s), you must specify that the gateway or next hop address is the site interface of the VPN router.
    Alternately, if you are using RIP or OSPF, you can configure the VPN routers using off-subnet address pools as RIP or OSPF routers. For OSPF, you must configure the VPN router as an autonomous system boundary router (ASBR). For more information, see the topic titled "OSPF design considerations" in Windows Server 2003 Help and Support.
    Deploying Intersite Network Infrastructure
    Deploying the intersite network infrastructure consists of configuring each VPN router with the set of routes for subnets that are available in the other sites (across each site-to-site VPN connection). This can be done in the following ways:

    • Manually configure static routes on each VPN router.
    • Perform auto-static updates on each VPN router.
    • Configure routing protocols to operate over the site-to-site VPN connection.


    Manually Configuring Static Routes on Each VPN Router

    From the Routing and Remote Access snap-in, perform the following steps:

    1. In the console tree, click IP Routing, and then click Static Routes.
    2. Right-click Static Routes, and then click New Static Route.
    3. In the Static Route dialog box, select the appropriate demand-dial interface name, and type the destination, network mask, and metric.
    4. Click OK to add the route.
    5. For an additional route, go back to step 2.

    Note Because the demand-dial connection is a point-to-point connection, the Gateway IP address field is not configurable. The adding of static routes can also be done during the creation of the demand-dial interface with the New Demand-Dial Interface Wizard.



    Performing Auto-static Updates on Each VPN Router

    If RIP for IP is enabled on the demand-dial interfaces of both VPN routers, you can use auto-static updates to automatically configure static routes when the VPN connection is in a connected state. A demand-dial interface that is configured for auto-static updates sends a request across an active connection to request all of the routes of the router on the other side of the connection. In response to the request, all of the routes of the requested router are automatically entered as static routes in the routing table of the requesting router.
    From the Routing and Remote Access snap-in on a VPN router (assuming the site-to-site VPN connection is active), perform the following steps:

    1. In the console tree, click IP Routing, and then click General.
    2. In the details pane, right-click the appropriate demand-dial interface, and then click Update Routes.

    You can also use the netsh commands to perform an auto-static update. For more information, see the topic "Scheduling auto-static updates" in Windows Server 2003 Help and Support.

    Configuring Routing Protocols

    If the site-to-site VPN connection is persistent (always active), you can also configure IP routing protocols such as Routing Information Protocol (RIP) or Open Shortest Path First (OSPF) to operate over the VPN connection. For more information, see the topics titled "Setting up a RIP-for-IP routed internetwork" and "Setting up an OSPF routed internetwork" in Windows Server 2003 Help and Support.











  5. #5
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Appendix A: Configuring Firewalls for a VPN Router Running Windows Server 2003
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    The following are common configurations of firewalls with a VPN router:

    • The VPN router is attached to the Internet and the firewall is between the VPN router and the site.
    • The firewall is attached to the Internet and the VPN router is between the firewall and the site.
    • Two firewalls are usedone between the VPN router and the site and one between the VPN router and the Internet.

    VPN router in Front of the Firewall

    To secure the VPN router from sending or receiving any traffic on its Internet interface except VPN traffic, you need to configure PPTP or L2TP/IPSec input and output filters on the interface that corresponds to the connection to the Internet. Because IP routing is enabled on the Internet interface, if PPTP or L2TP/IPSec filters are not configured on the Internet interface, then any traffic received on the Internet interface is routed, which may forward unwanted Internet traffic to your site.
    When the VPN router is in front of the firewall attached to the Internet, you need to add packet filters to the Internet interface that allow only VPN traffic to and from the IP address of the VPN router's Internet interface.
    For inbound traffic, when the tunneled data is decrypted by the VPN router, it is forwarded to the firewall. The firewall in this configuration is acting as a filter for site traffic and can prevent specific resources from being accessed, scan data for viruses, perform intrusion detection, and other functions.
    Because the only Internet traffic allowed on the site must pass through the VPN router, this approach also prevents the sharing of File Transfer Protocol (FTP) or Web site resources with non-VPN Internet users.
    Figure 3 shows the VPN router in front of the firewall.
    Figure 3: The VPN router in front of the firewall
    The firewall is configured for the appropriate rules for site traffic to and from hosts in other sites according to your network security policies.
    For the Internet interface on the VPN router, configure the following input and output filters using the Routing and Remote Access snap-in. These filters are automatically configured when you run the Routing and Remote Access Server Setup Wizard and choose the Remote access (dial-up or VPN) option, select the correct interface, and select the Enable security on the selected interface by setting up packet filters option on the VPN Connection page (enabled by default).
    Packet Filters for PPTP

    Configure the following input filters with the filter action set to Drop all packets except those that meet the criteria below:

    • Destination IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and TCP destination port of 1723.

      This filter allows PPTP tunnel maintenance traffic to the VPN router.
    • Destination IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and IP Protocol ID of 47.

      This filter allows PPTP tunneled data to the VPN router.
    • Destination IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and TCP [established] source port of 1723.

      This filter is required only when the VPN router is acting as a calling router. With the TCP [established] filter, traffic is accepted only when the VPN router initiated the TCP connection.

    Configure the following output filters with the filter action set to Drop all packets except those that meet the criteria below:

    • Source IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and TCP source port of 1723.

      This filter allows PPTP tunnel maintenance traffic from the VPN router.
    • Source IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and IP Protocol ID of 47.

      This filter allows PPTP tunneled data from the VPN router.
    • Source IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and TCP destination port of 1723.

      This filter is required only when the VPN router is acting as a calling router.


    Packet Filters for L2TP/IPSec

    Configure the following input filters with the filter action set to Drop all packets except those that meet the criteria below:

    • Destination IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and UDP destination port of 500.

      This filter allows Internet Key Exchange (IKE) traffic to the VPN router.
    • Destination IP address of the VPN server's Internet interface, subnet mask of 255.255.255.255, and UDP destination port of 4500.

      This filter allows IPSec NAT-T traffic to the VPN router.
    • Destination IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and UDP destination port of 1701.

      This filter allows L2TP traffic to the VPN router.

    Configure the following output filters with the filter action set to Drop all packets except those that meet the criteria below:

    • Source IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and UDP source port of 500.

      This filter allows IKE traffic from the VPN router.
    • Source IP address of the VPN server's Internet interface, subnet mask of 255.255.255.255, and UDP source port of 5500.

      This filter allows IPSec NAT-T traffic from the VPN router.
    • Source IP address of the VPN router's Internet interface, subnet mask of 255.255.255.255, and UDP source port of 1701.

      This filter allows L2TP traffic from the VPN router.

    There are no filters required for IPSec Encapsulating Security Protocol (ESP) traffic for the IP protocol of 50. The Routing and Remote Access service filters are applied after the IPSec components remove the ESP header.


    VPN Router Behind the Firewall

    In a more common configuration, the firewall is connected to the Internet and the VPN router is a site resource that is connected to the perimeter network, also known as a screened subnet. The perimeter network is an IP network segment that contains resources that are available to Internet users, such as Web and FTP servers. The VPN router has an interface on both the perimeter network and the site. In this approach, the firewall must be configured with input and output filters on its Internet interface that allow the passing of tunnel maintenance traffic and tunneled data to the VPN router. Additional filters can allow the passing of traffic to Web, FTP, and other types of servers on the perimeter network. For an added layer of security, the VPN router can also be configured with PPTP or L2TP/IPSec packet filters on its perimeter network interface.
    The firewall in this configuration is acting as a filter for Internet traffic and can confine the incoming and outgoing traffic to the specific resources on the perimeter network, perform intrusion attempt detection, prevent denial of service attacks, and other functions.
    Because the firewall does not have the encryption keys for each VPN connection, it can only filter on the plaintext headers of the tunneled data. In other words, all tunneled data passes through the firewall. This is not a security concern, however, because the VPN connection requires an authentication process that prevents unauthorized access beyond the VPN router.
    Figure 4 shows the VPN router behind the firewall on the perimeter network.
    Figure 4: The VPN router behind the firewall on the perimeter network
    For both the Internet and network perimeter interfaces on the firewall, configure the following input and output filters using the firewall's configuration software.
    Packet Filters for PPTP

    Separate input and output packet filters can be configured on the Internet interface and the perimeter network interface.

    Filters on the Internet Interface

    Configure the following input packet filters on the Internet interface of the firewall to allow the following types of traffic:

    • Destination IP address of the VPN router's perimeter network interface and TCP destination port of 1723 (0x6BB).

      This filter allows PPTP tunnel maintenance traffic to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and IP Protocol ID of 47 (0x2F).

      This filter allows PPTP tunneled data to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and TCP source port of 1723 (0x6BB).

      This filter is required only when the VPN router is acting as a calling router. This filter should only be used in conjunction with PPTP packet filters described in "VPN router in front of the firewall" and configured on the VPN router's network perimeter interface. By allowing all traffic to the VPN router from TCP port 1723, there exists the possibility of network attacks from sources on the Internet that use this port.

    Configure the following output filters on the Internet interface of the firewall to allow the following types of traffic:

    • Source IP address of the VPN router's perimeter network interface and TCP source port of 1723 (0x6BB).

      This filter allows PPTP tunnel maintenance traffic from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and IP Protocol ID of 47 (0x2F).

      This filter allows PPTP tunneled data from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and TCP destination port of 1723 (0x6BB).

      This filter is required only when the VPN router is acting as a calling router. This filter should only be used in conjunction with PPTP packet filters described in "VPN router in front of the firewall" and configured on the VPN router's network perimeter interface. By allowing all traffic from the VPN router to TCP port 1723, there exists the possibility of network attacks from sources on the Internet using this port.



    Filters on the Perimeter Network Interface

    Configure the following input filters on the perimeter network interface of the firewall to allow the following types of traffic:

    • Source IP address of the VPN router's perimeter network interface and TCP source port of 1723 (0x6BB).

      This filter allows PPTP tunnel maintenance traffic from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and IP Protocol ID of 47 (0x2F).

      This filter allows PPTP tunneled data from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and TCP destination port of 1723 (0x6BB).

      This filter is required only when the VPN router is acting as a calling router. This filter should only be used in conjunction with PPTP packet filters described in "VPN router in front of the firewall" and configured on the VPN router's network perimeter interface. By allowing all traffic from the VPN router to TCP port 1723, there exists the possibility of network attacks from sources on the Internet using this port.

    Configure the following output packet filters on the perimeter network interface of the firewall to allow the following types of traffic:

    • Destination IP address of the VPN router's perimeter network interface and TCP destination port of 1723 (0x6BB).

      This filter allows PPTP tunnel maintenance traffic to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and IP Protocol ID of 47 (0x2F).

      This filter allows PPTP tunneled data to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and TCP source port of 1723 (0x6BB).

      This filter is required only when the VPN router is acting as a calling router. This filter should only be used in conjunction with PPTP packet filters described in "VPN router in front of the firewall" and configured on the VPN router's network perimeter interface. By allowing all traffic to the VPN router from TCP port 1723, there exists the possibility of network attacks from sources on the Internet using this port.

    Packet Filters for L2TP/IPSec

    Separate input and output packet filters can be configured on the Internet interface and the perimeter network interface.

    Filters on the Internet Interface

    Configure the following input packet filters on the Internet interface of the firewall to allow the following types of traffic:

    • Destination IP address of the VPN router's perimeter network interface and UDP destination port of 500 (0x1F4).

      This filter allows IKE traffic to the VPN router.
    • Destination IP address of the VPN server's perimeter network interface and UDP destination port of 4500 (0x1194).

      This filter allows IPSec NAT-T traffic to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and IP Protocol ID of 50 (0x32).

      This filter allows IPSec ESP traffic to the VPN router.

    Configure the following output packet filters on the Internet interface of the firewall to allow the following types of traffic:

    • Source IP address of the VPN router's perimeter network interface and UDP source port of 500 (0x1F4).

      This filter allows IKE traffic from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and UDP source port of 4500 (0x1194).

      This filter allows IPSec NAT-T from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and IP Protocol ID of 50 (0x32).

      This filter allows IPSec ESP traffic from the VPN router.

    There are no filters required for L2TP traffic at the UDP port of 1701. All L2TP traffic at the firewall, including tunnel maintenance and tunneled data, is encrypted as an IPSec ESP payload.

    Filters on the Perimeter Network Interface

    Configure the following input packet filters on the perimeter network interface of the firewall to allow the following types of traffic:

    • Source IP address of the VPN router's perimeter network interface and UDP source port of 500 (0x1F4).

      This filter allows IKE traffic from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and UDP source port of 4500 (0x1194).

      This filter allows IPSec NAT-T traffic from the VPN router.
    • Source IP address of the VPN router's perimeter network interface and IP Protocol ID of 50 (0x32).

      This filter allows IPSec ESP traffic from the VPN router.

    Configure the following output packet filters on the perimeter network interface of the firewall to allow the following types of traffic:

    • Destination IP address of the VPN router's perimeter network interface and UDP destination port of 500 (0x1F4).

      This filter allows IKE traffic to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and UDP destination port of 4500 (0x1194).

      This filter allows IPSec NAT-T traffic to the VPN router.
    • Destination IP address of the VPN router's perimeter network interface and IP Protocol ID of 50 (0x32).

      This filter allows IPSec ESP traffic to the VPN router.

    There are no filters required for L2TP traffic at the UDP port of 1701. All L2TP traffic at the firewall, including tunnel maintenance and tunneled data, is encrypted as an IPSec ESP payload.


    VPN Router Between Two Firewalls

    Another configuration is when the VPN router computer in placed on the perimeter network between two firewalls. The Internet firewall, the firewall between the Internet and the VPN router, filters all Internet traffic from all Internet clients. The site firewall, the firewall between the VPN router and the site, filters site traffic from hosts in other sites.
    Figure 5 shows the VPN router between two firewalls on the perimeter network.
    Figure 5: The VPN router between two firewalls on the perimeter network
    In this configuration:

    • Configure your Internet firewall and VPN router with the packet filters as described in the "VPN router behind the firewall" section.
    • Configure your site firewall for the appropriate rules for site traffic to and from calling routers according to your network security policies.





  6. #6
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Appendix B: Alternate Configurations -- Virtual Private Networking
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    This section provides information about common alternate configurations for a Windows Server 2003 VPN router. The most common configuration is described in the "Deploying an L2TP-based Site-to-Site VPN Connection " and "Deploying an L2TP-based Site-to-Site VPN Connection " sections of this paper and whose principal characteristics are the following:

    • The VPN router has multiple network adaptersat least one connected to the site and at least one connected to the Internet.
    • The VPN router has static public IP addresses assigned to its Internet interfaces.
    • The VPN router is only acting as a security gateway providing a routed connection to the site. The VPN router is not hosting any other Internet services such as NAT or Web services.

    The two other most common configurations are the following:

    1. The VPN router computer is performing other functions such as network address translation or Web hosting.
    2. The VPN router computer has a single network adapter and its public IP address is published by a firewall.

    The following sections detail the changes to make in the deployment of a VPN router to accommodate these additional common configurations.
    Multiple Internet Function VPN Router

    In this configuration, the VPN router's principal characteristics are the following:

    • The VPN router has multiple network adaptersat least one connected to the site and at least one connected to the Internet.
    • The VPN router has static public IP addresses assigned to its Internet interfaces.
    • The VPN router is acting as a security gateway providing remote access to the site and is hosting any other Internet services such as NAT or Web hosting.

    In this configuration, you can follow the procedures as described in the "Deploying a PPTP-based Site-to-Site VPN Connection" and "Deploying a PPTP-based Site-to-Site VPN Connection" sections of this paper except that when you run the Routing and Remote Access Server Setup Wizard, clear the Enable security on the selected interface by setting up static packet filters check box on the VPN Connection page of the Wizard.
    When you clear the Enable security on the selected interface by setting up static packet filters check box, PPTP and L2TP/IPSec packet filters are not configured on the Internet interface of the VPN router computer. Whether you have to manually configure these filters depends on whether the VPN router computer is also hosting NAT.

    • If NAT is needed on the VPN router computer, do not configure PPTP and L2TP/IPSec packet filters or packet filters for other types of traffic. If you configure PPTP and L2TP/IPSec packet filters on the Internet interface, NAT cannot function. Even though you do not configure any packet filters on the Internet interface of the VPN router computer, the function of the NAT discards any traffic from the Internet that does not correspond to traffic requested by site clients.
    • If NAT is not needed on the VPN router computer, you can configure PPTP and L2TP/IPSec packet filters and other types of filters for additional services hosted by the VPN router computer. For example, if the VPN router computer is also hosting a Web site, then filters should be added to allow traffic to and from the public IP address of the VPN router computer and TCP port 80.


    Single-Adapter VPN Router

    In this configuration, the VPN router computer has only a single network adapter and nodes on the site of the calling router are accessing services hosted on the VPN router computer. If the VPN router computer has only a single network adapter and is configured with a public IP address, all traffic to and from the services running on the VPN router computer are sent as clear text outside the VPN tunnel. For more information about why this happens, see "Routing and multi-use VPN routers" in this paper.
    The only way a single adapter VPN router can work properly is if it is behind a firewall that is providing a publishing and translation service for the VPN router. The firewall publishes or makes known on the Internet a static public IP address for the VPN router. When VPN packets are sent to this published IP address, the firewall translates the address of the packet to a private or other public address by which the VPN router is known on the site.
    Figure 6 shows an example of the published and actual addresses of a VPN router in this configuration.
    Figure 6: The single-adapter VPN router configuration
    The VPN router is configured according to "Deploying a PPTP-based Site-to-Site VPN Connection" in this paper with its site interface acting as an Internet interface. The firewall is configured to:

    • Publish the name and public IP address of the VPN router on the Internet.
    • Translate PPTP traffic sent to the public IP address of the VPN router to the site interface of the VPN router computer.
    • Discard all traffic except PPTP traffic going to and from the VPN router computer.





  7. #7
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    Appendix C: Troubleshooting
    Updated: October 7, 2005
    Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
    Troubleshooting Tools

    Windows Server 2003 provides the following tools to troubleshoot VPN connections:

    • TCP/IP Troubleshooting Tools
    • Authentication and Accounting Logging
    • Unreachability Reason
    • Event Logging
    • IAS Event Logging
    • PPP Logging
    • Tracing
    • Oakley Logging
    • Network Monitor


    TCP/IP Troubleshooting Tools

    The Ping, Tracert, and Pathping tools use ICMP Echo and Echo Reply messages to verify connectivity, display the path to a destination, and test path integrity. The route print command can be used to display the IP routing table. Alternately, you can use the netsh routing ip show rtmroutes command or the Routing and Remote Access snap-in.
    In addition to the normal TCP/IP tools, use the Netdiag tool to test and display your network configuration.

    Authentication and Accounting Logging

    A VPN router running Windows Server 2003 supports the logging of authentication and accounting information for VPN connections in local logging files when Windows authentication or Windows accounting is enabled. This logging is separate from the events recorded in the system event log. You can use the information that is logged to track site-to-site connection usage and authentication attempts. Authentication and accounting logging is especially useful for troubleshooting remote access policy issues. For each authentication attempt, the name of the remote access policy that either accepted or rejected the connection attempt is recorded.
    Enable authentication and accounting logging from the Settings tab on the properties of the Local File object in the Remote Access Logging folder in the Routing and Remote Access snap-in (if the Routing and Remote Access service is configured for Windows authentication and accounting) or the Internet Authentication Service snap-in (if the Routing and Remote Access service is configured for RADIUS authentication and accounting and the RADIUS server is an IAS server)
    The authentication and accounting information is stored in a configurable log file or files stored in the SystemRoot\System32\LogFiles folder. The log files are saved in Internet Authentication Service (IAS) or database-compatible format, meaning that any database program can read the log file directly for analysis.
    If the VPN router is configured for RADIUS authentication and accounting and the RADIUS server is a computer running Windows Server 2003 and IAS, the authentication and accounting logs are stored in the SystemRoot\System32\LogFiles folder on the IAS server computer.
    The Routing and Remote Access service and IAS for Windows Server 2003 can also send authentication and accounting information to a Structured Query Language (SQL) server database.

    Unreachability Reason

    When a demand-dial interface fails to make a connection, the interface is left in an unreachable state and the Routing and Remote Access service records the reason why the connection attempt failed. To view the unreachable reason in the Routing and Remote Access snap-in, click Network Interfaces. In the details pane, right-click the demand-dial interface, and then click Unreachability Reason.

    Event Logging

    On the Logging tab in the properties of a VPN router in the Routing and Remote Access snap-in, there are four levels of logging. Select Log all events, and then try the connection again. After the connection fails, check the system event log for events logged during the connection process. After you are done viewing remote access events, select the Log errors and warnings option on the logging tab to conserve system resources.

    IAS Event Logging

    If your VPN routers are configured for RADIUS authentication and your RADIUS servers are computers running Windows Server 2003 and IAS, check the system event log for IAS events for rejected or accepted connection attempts. IAS system event log entries contain a lot of information about the connection attempt including the name of the remote access policy that accepted or rejected the connection attempt. IAS event logging for rejected or accepted connection attempts is enabled by default and configured from the Service tab from the properties of an IAS server in the Internet Authentication Service snap-in.

    PPP logging

    PPP logging records the series of programming functions and PPP control messages during a PPP connection and is a valuable source of information when you are troubleshooting the failure of a PPP connection. To enable PPP logging, select the Log additional Routing and Remote Access information option on the Logging tab on the properties of a remote access server.
    The PPP log in Windows NT 4.0 has been replaced by the tracing function. To duplicate the PPP log, you need to enable file tracing for the PPP key. By default, the PPP log is stored as the Ppp.log file in the SystemRoot\Tracing folder.

    Tracing

    The Windows Server 2003 Routing and Remote Access service has an extensive tracing capability that you can use to troubleshoot complex network problems. You can enable the components in Windows Server 2003 to log tracing information to files using the Netsh command or through the registry.

    Enabling Tracing with Netsh

    You can use the Netsh command to enable and disable tracing for specific components or for all components. To enable and disable tracing for a specific component, use the following syntax:
    netsh ras set tracing Component enabled|disabled
    where Component is a component in the list of Routing and Remote Access service components found in the registry under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing. For example, to enable tracing for the RASAUTH component, the command is:
    netsh ras set tracing rasauth enabled
    To enable tracing for all components, use the following command:
    netsh ras set tracing * enabled

    Enabling Tracing through the Registry

    You can also configure the tracing function by changing settings in the registry under:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing
    You can enable tracing for each Routing and Remote Access service component by setting the registry values described later. You can enable and disable tracing for components while the Routing and Remote Access service is running. Each component is capable of tracing and appears as a subkey under the preceding registry key.
    To enable tracing for each component, you can configure the following registry entries for each protocol key:
    EnableFileTracing REG_DWORD Flag
    You can enable logging tracing information to a file by setting EnableFileTracing to 1. The default value is 0.
    FileDirectory REG_EXPAND_SZ Path
    You can change the default location of the tracing files by setting FileDirectory to the path you want. The file name for the log file is the name of the component for which tracing is enabled. By default, log files are placed in the SystemRoot\Tracing folder.
    FileTracingMask REG_DWORD LevelOfTracingInformationLogged
    FileTracingMask determines how much tracing information is logged to the file. The default value is 0xFFFF0000.
    MaxFileSize REG_DWORD SizeOfLogFile
    You can change the size of the log file by setting different values for MaxFileSize. The default value is 0x10000 (64K).
    Note Tracing consumes system resources and should be used sparingly to help identify network problems. After the trace is captured or the problem is identified, you should immediately disable tracing. Do not leave tracing enabled on multiprocessor computers. Tracing information can be complex and very detailed. Most of the time this information is useful only to Microsoft support professionals or to network administrators who are very experienced with the Routing and Remote Access service. Tracing information can be saved as files and sent to Microsoft support for analysis.



    Oakley Logging

    You can use the Oakley log to view details about the IPSec security association (SA) negotiation process. The Oakley log is enabled in the registry. It is not enabled by default. To enable the Oakley log, set the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es\PolicyAgent\Oakley\EnableLogging registry setting to 1. The Oakley key does not exist by default and must be created.
    After it is enabled, the Oakley log, which is stored in the SystemRoot\Debug folder, records all IPSec SA negotiations. A new Oakley.log file is created each time the IPSec Policy Agent is started and the previous version of the Oakley.log file is saved as Oakley.log.sav.
    To activate the new EnableLogging registry setting after modifying its value, stop and start the IPSec Policy Agent and related IPSec services by running the following sequence of commands:

    1. Stop the Routing and Remote Access service using the net stop remoteaccess command.
    2. Stop the IPSec services using the net stop policyagent command.
    3. Start the IPSec services using the net start policyagent command.
    4. Start the Routing and Remote Access service using the net start remoteaccess command.


    Network Monitor

    Use Network Monitor, a packet capture and analysis tool supplied with Windows Server 2003, to capture and view the traffic sent between VPN routers during the VPN connection process and during data transfer. You cannot interpret the encrypted portions of VPN traffic with Network Monitor. Network Monitor is installed as an optional management and monitoring tool when you select Add/Remove Windows Components from Control Panel-Add or Remove Programs.
    The proper interpretation of the VPN traffic with Network Monitor requires an in-depth understanding of PPP, PPTP, IPSec, and other protocols. Network Monitor captures can be saved as files and sent to Microsoft support for analysis.

    Troubleshooting Site-to-Site VPN Connections

    Site-to-site VPN problems typically fall into the following categories:

    • Connection attempt is rejected when it should be accepted.
    • L2TP/IPSec authentication issues.
    • EAP-TLS authentication issues.
    • Connection attempt is accepted when it should be rejected.
    • Unable to reach locations beyond the VPN router.
    • Unable to reach the virtual interfaces of VPN routers.
    • On-demand connection is not made automatically.
    • Unable to establish tunnel.

    Use the following troubleshooting tips to isolate the configuration or infrastructure problem causing the stated VPN problem.

    Connection Attempt is Rejected When it Should be Accepted


    • Verify that the credentials of the calling router, consisting of user name, password, and domain name, are correct and can be validated by the answering router.
    • Verify that the user account of the calling router is not locked out, expired, disabled, or that the time the connection is being made does not correspond to the configured logon hours.
    • Verify that the user account of the calling router is not configured to change its password at the next logon or if the password has expired. A calling router cannot change an expired password during the connection process and the connection attempt is rejected.
    • Verify that the user account has not been locked out due to remote access account lockout. For more information, see the topic titled "Account lockout" in Windows Server 2003 Help and Support.
    • Verify that the Routing and Remote Access service is running on the answering router.
    • Verify that the answering router is enabled for LAN and demand-dial routing from the General tab on the properties of a VPN router in the Routing and Remote Access snap-in.
    • Verify that the WAN Miniport (PPTP) and WAN Miniport (L2TP) devices are enabled for demand-dial routing connections (inbound and outbound) from the properties of the Ports object in the Routing and Remote Access snap-in.
    • Verify that the calling router, the answering router, and the remote access policy corresponding to site-to-site VPN connections are configured to use at least one common authentication method.
    • Verify that the calling router and the remote access policy corresponding to site-to-site VPN connections are configured to use at least one common encryption strength. If the calling router is not capable of 128-bit encryption and the Strongest encryption level is required in the remote access policy, the connection attempt is rejected.
    • Verify that the parameters of the connection are authorized through remote access policies.

      In order for the connection to be established, the parameters of the connection attempt must:


      • Match all of the conditions of at least one remote access policy.
      • Be granted remote access permission through the user account (set to Allow access), or if the user account has the Control access through Remote Access Policy option selected, the remote access permission of the matching remote access policy must have the Grant remote access permission option selected.
      • Match all the settings of the profile.
      • Match all the settings of the dial-in properties of the user account.

      To obtain the name of the remote access policy that rejected the connection attempt, scan the accounting log for the entry corresponding to the connection attempt for the policy name.
    • If you are logged on using an account with domain administrator permissions when you run the Routing and Remote Access Server Setup Wizard, it automatically adds the computer account of the RAS and IAS Servers domain-local security group. This group membership allows the answering router computer to access user account information. If the answering router is unable to access user account information, verify that:


      • The computer account of the answering router computer is a member of the RAS and IAS Servers security group for all the domains that contain user accounts for which the answering router is authenticating remote access. You can use the netsh ras show registeredserver command at the command prompt to view the current registration. You can use the netsh ras add registeredserver command to register the server in a domain in which the answering router is a member or other domains. Alternately, you or your domain administrator can add the computer account of the answering router computer to the RAS and IAS Servers security group of all the domains that contain user accounts for which the answering router is authenticating site-to-site VPN connections.
      • If you add or remove the answering router computer to the RAS and IAS Servers security group, the change does not take effect immediately (due to the way that Windows Server 2003 caches Active Directory information). For the change to take effect immediately, you need to restart the answering router computer.
    • For demand-dial connections using EAP-TLS and Router (Offline request) certificates, verify that the calling router and answering router are correctly configured.

      On the calling router, verify that EAP is configured as the authentication protocol in the advanced security properties of the demand-dial interface. Verify the settings of the properties of the Smart Card or other Certificate (encryption enabled) EAP type. Verify that the correct Router (Offline request) certificate is selected when configuring the credentials of the demand-dial interface.

      On the answering router, verify that EAP is enabled as an authentication method on the answering router and EAP-TLS is enabled on the matching remote access policy. Verify that the correct computer certificate of the authenticating server (the answering router or IAS server) is selected from the configuration settings of the Smart Card or other Certificate EAP type in the remote access policy for site-to-site VPN connections.

      Verify that the user certificate of the calling router was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the answering router trusts. Additionally, verify that the computer certificate of the answering router was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the calling router trusts.

      By default, an answering router checks the certificate revocation list (CRL) when authenticating the calling router. If the CRL is locally available, it can be checked. In some configurations, the CRL cannot be checked until after the connection is made. The CRL is stored at the root CA and, optionally, in Active Directory. For a branch office router that is acting as an answering router in a site that does not contain the root CA, there are two solutions to this problem:


      1. Publish the CRL in Active Directory. For more information, see the topics titled "Schedule the publication of the certificate revocation list" or "To manually publish the certificate revocation list" in Windows Server 2003 Help and Support. Once the CRL is published in Active Directory, the local domain controller in the site will have the latest CRL after Active Directory synchronization.
      2. On the branch office router, set the following registry value to 1:

        HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es\RasMan\PPP\EAP\13\IgnoreRevocationOffline
    • For an answering router that is a member server in a mixed-mode or native-mode domain that is configured for Windows authentication, verify that:


      • The RAS and IAS Servers security group exists. If not, then create the group and set the group type to Security and the group scope to Domain local.
      • The RAS and IAS Servers security group has Read permission to the RAS and IAS Servers Access Check object.
    • Verify that IP is enabled for routing on both the calling router and answering router.
    • Verify that all of the PPTP or L2TP ports on the calling router and answering router are not already being used. If necessary, change the number of PPTP to L2TP ports from the properties of the Ports object in the Routing and Remote Access snap-in to allow more concurrent connections.
    • Verify that the answering router supports the tunneling protocol of the calling router.

      By default, a Windows Server 2003 demand-dial interface with the VPN type set to Automatic will try to establish a PPTP-based VPN connection first, then try an L2TP/IPSec-based VPN connection. If either the Point to Point Tunneling Protocol (PPTP) or Layer-2 Tunneling Protocol (L2TP) server type option is selected, verify that the selected tunneling protocol is supported by the answering router.

      Depending on your selections when running the Routing and Remote Access Server Setup Wizard, a Windows Server 2003based computer running the Routing and Remote Access service is a PPTP and L2TP server with five or 128 L2TP ports and five or 128 PPTP ports. To create a PPTP-only server, set the number of L2TP ports to zero. To create an L2TP-only server, set the number of PPTP ports to 1 and disable remote access inbound connections and demand-dial connections for the WAN Miniport (PPTP) device from the properties of the Ports object in the Routing and Remote Access snap-in.
    • Verify the configuration of the authentication provider. The answering router can be configured to use either Windows or RADIUS to authenticate the credentials of the calling router.


      • For RADIUS authentication, verify that the answering router computer can communicate with the RADIUS server.
      • For an answering router that is a member of a native-mode domain, verify that the answering router has joined the domain.
      • For a computer Windows NT version 4.0 Service Pack 4 and later with RRAS server that is a member of a mixed mode domain or a Windows Server 2003 answering router that is a member of a Windows NT 4.0 domain that is accessing user account properties for a user account in a trusted domain, verify that the Everyone group is added to the Pre-Windows 2000 Compatible Access group with the net localgroup "Pre-Windows 2000 Compatible Access" command. If not, issue the net localgroup "Pre-Windows 2000 Compatible Access" everyone /add command on a domain controller computer and then restart the domain controller.
      • For a Windows NT version 4.0 Service Pack 3 and earlier RRAS server that is a member of a mixed-mode domain, verify that the Everyone group has been granted list contents, read all properties, and read permissions to the root node of your domain and all sub-objects of the root domain.
    • For PPTP connections using MS-CHAP and attempting to negotiate 40-bit MPPE encryption, verify that the password of the calling router is not larger than 14 characters.


    L2TP/IPSec Authentication Issues

    The most common problems that cause site-to-site L2TP/IPSec connections to fail are the following:

    • No certificate

      By default, site-to-site L2TP/IPSec connections require that the calling and answering router exchange computer certificates for IPSec peer authentication. Check the Local Computer certificate stores of both the calling and answering router using the Certificates snap-in to ensure that a suitable certificate exists.
    • Incorrect certificate

      If certificates exist, they must be verifiable. Unlike manually configuring IPSec rules, the list of certification authorities (CAs) for L2TP/IPSec connections is not configurable. Instead, each router in the L2TP/IPSec connection sends a list of root CAs to its IPSec peer from which it accepts a certificate for authentication. The root CAs in this list correspond to the root CAs that issued computer certificates to the computer. For example, if Router A was issued computer certificates by root CAs CertAuth1 and CertAuth2, it notifies its IPSec peer during main mode negotiation that it will accept certificates for authentication from only CertAuth1 and CertAuth2. If the IPSec peer, Router B, does not have a valid computer certificate issued from either CertAuth1 or CertAuth2, IPSec security negotiation fails.

      The calling router must have a valid computer certificate installed that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the answering router trusts. Additionally, the answering router must have a valid computer certificate installed that was issued by a CA that follows a valid certificate chain from the issuing CA up to a root CA that the calling router trusts.

      By default, L2TP/IPSec connections require that the calling and answering routers exchange computer certificates for IPSec peer authentication. Check the Local Computer certificate stores of both the calling and answering routers using the Certificates snap-in to ensure that a suitable certificate exists.
    • A NAT between the calling and answering routers

      If either the calling or answering router is behind a NAT, then both the calling and answering routers must support IPSec NAT-T. However, Microsoft recommends that answering routers, such as VPN routers running Windows Server 2003, not be placed behind NATs.
    • A firewall between the calling and answering routers

      If there is a firewall between the calling and answering router and you cannot establish an L2TP/IPSec connection, verify that the firewall allows L2TP/IPSec traffic to be forwarded. For more information, see Appendix A.

    One of the best tools for troubleshooting IPSec authentication issues is the Oakley log. For more information, see "Oakley Logging" in this article.

    EAP-TLS Authentication Issues

    When EAP-TLS is used for authentication, the calling router submits a Router (Offline request) user certificate and the authenticating server (the answering router or the RADIUS server) submits a computer certificate.
    In order for the authenticating server to validate the certificate of the calling router, the following must be true for each certificate in the certificate chain sent by the calling router:

    • The current date must be within the validity dates of the certificate.

      When certificates are issued, they are issued with a range of valid dates, before which they cannot be used and after which they are considered expired.
    • The certificate has not have been revoked.

      Issued certificates can be revoked at any time. Each issuing CA maintains a list of certificates that should no longer be considered valid by publishing an up-to-date certificate revocation list (CRL). By default, the authenticating server checks all the certificates in the calling routers certificate chain (the series of certificates from the calling router certificate to the root CA) for revocation. If any of the certificates in the chain have been revoked, certificate validation fails. This behavior can be modified with registry settings described later in this topic.

      To view the CRL distribution points for a certificate in the Certificates snap-in, obtain the certificate properties, click the Details tab, and then click the CRL Distribution Points field.

      The certificate revocation validation only works as well as the CRL publishing and distribution system. If the CRL in a certificate is not updated often, a certificate that has been revoked can still be used and considered valid because the published CRL that the authenticating server is checking is out of date.
    • The certificate has a valid digital signature.

      CAs digitally sign certificates they issue. The authenticating server verifies the digital signature of each certificate in the chain, with the exception of the root CA certificate, by obtaining the public key from the certificates issuing CA and mathematically validating the digital signature.

    The calling router certificate must also have the Client Authentication certificate purpose (also known as Enhanced Key Usage [EKU]) (object identifier 1.3.6.1.5.5.7.3.2) and must either contain a UPN of a valid user account or FQDN of valid computer account for the Subject Alternative Name property of the certificate.
    To view the EKU for a certificate in the Certificates snap-in, double-click the certificate in the contents pane, click the Details tab, and then click the Enhanced Key Usage field. To view the subject alternative name property for a certificate in the Certificates snap-in, double-click the certificate in the contents pane, click the Details tab, and then click the Subject Alternative Name field.
    Finally, to trust the certificate chain offered by the calling router, the authenticating server must have the root CA certificate of the issuing CA of the calling router certificate installed in its Trusted Root Certification Authorities store.
    Additionally, the authenticating server verifies that the identity sent in the EAP-Response/Identity message is the same as the name in the Subject Alternative Name property of the certificate. This prevents a malicious user from masquerading as a different user from that specified in the EAP-Response/Identity message.
    If the authenticating server is a Windows Server 2003 answering router or an IAS server, the following registry settings in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RasMan\PPP\EAP\13 can modify the behavior of the EAP-TLS when performing certificate revocation:

    • IgnoreNoRevocationCheck

      When set to 1, the authenticating server allows EAP-TLS clients to connect even when it does not perform or cannot complete a revocation check of the calling router's certificate chain (excluding the root certificate). Typically, revocation checks fail because the certificate doesn't include CRL information.

      IgnoreNoRevocationCheck is set to 0 (disabled) by default. An EAP-TLS client cannot connect unless the server completes a revocation check of the client's certificate chain (including the root certificate) and verifies that none of the certificates have been revoked.

      You can use this entry to authenticate clients when the certificate does not include CRL distribution points, such as those from third parties.
    • IgnoreRevocationOffline

      When set to 1, the authenticating server allows EAP-TLS clients to connect even when a server that stores a CRL is not available on the network. IgnoreRevocationOffline is set to 0 by default. The authenticating server does not allow clients to connect unless it can complete a revocation check of their certificate chain and verify that none of the certificates has been revoked. When it cannot connect to a server that stores a revocation list, EAP-TLS considers the certificate to have failed the revocation check.

      Setting IgnoreRevocationOffline to 1 prevents certificate validation failure because poor network conditions prevented their revocation check from completing successfully.
    • NoRevocationCheck

      When set to 1, the authenticating server prevents EAP-TLS from performing a revocation check of the calling router's certificate. The revocation check verifies that the calling routers certificate and the certificates in its certificate chain have not been revoked. NoRevocationCheck is set to 0 by default.
    • NoRootRevocationCheck

      When set to 1, the authenticating server prevents EAP-TLS from performing a revocation check of the calling router's root CA certificate. NoRootRevocationCheck is set to 0 by default. This entry only eliminates the revocation check of the client's root CA certificate. A revocation check is still performed on the remainder of the calling router's certificate chain.

      You can use this entry to authenticate clients when the certificate does not include CRL distribution points, such as those from third parties. Also, this entry can prevent certification-related delays that occur when a certificate revocation list is offline or is expired.

    All of these registry settings must be added as a DWORD type and have the valid values of 0 or 1. The calling router does not use these settings.
    In order for the calling router to validate the certificate of the authenticating server for either EAP-TLS authentication, the following must be true for each certificate in the certificate chain sent by the authenticating server:

    • The current date must be within the validity dates of the certificate.

      When certificates are issued, they are issued with a range of valid dates, before which they cannot be used and after which they are considered expired.
    • The certificate has a valid digital signature.

      CAs digitally sign certificates they issue. The calling router verifies the digital signature of each certificate in the chain, with the exception of the root CA certificate, by obtaining the public key from the certificates issuing CA and mathematically validating the digital signature.

    Additionally, the authenticating server computer certificate must have the Server Authentication EKU (object identifier 1.3.6.1.5.5.7.3.1). To view the EKU for a certificate in the Certificates snap-in, double-click the certificate in the contents pane, click the Details tab, and then click the Enhanced Key Usage field.
    Finally, to trust the certificate chain offered by the authenticating server, the calling router must have the root CA certificate of the issuing CA of the authenticating server certificate installed in its Trusted Root Certification Authorities store.
    Notice that the calling router does not perform certificate revocation checking for the certificates in the certificate chain of the authenticating server's computer certificate. The assumption is that the calling router does not yet have a connection to the network, and therefore might not have access to a Web page or other resource in order to check for certificate revocation.

    Connection Attempt is Accepted When it Should be Rejected


    • Verify that the remote access permission on the user account is set to either Deny access or Control access through Remote Access Policy. If set to the latter, verify that the first matching remote access policy's remote access permission is set to Deny remote access permission. To obtain the name of the remote access policy that accepted the connection attempt, scan the accounting log for the entry corresponding to the connection attempt for the policy name.
    • If you have created a remote access policy to explicitly reject all connections, verify the policy conditions, remote access permission, and profile settings.
    • For certificate-based authentication when the certificate has been revoked, changes to the CRL of the CA might not yet be published. The authenticating server is using the old CRL that does not have the recently revoked certificate. To minimize the amount of time between the revoking of a certificate and when the authenticating server has knowledge of the revoked certificate, lower the CRL publication time. On a Windows Server 2003 CA, the publication time can be set as low as one hour. For more information, see the topic titled "Revoking certificates and publishing CRLs" in Windows Server 2003 Help and Support.


    Unable to Reach Locations Beyond the VPN Router


    • Verify that IP routing is enabled (on the IP tab on the properties of the VPN router).
    • Verify that the appropriate demand-dial interface has been added to the protocol being routed.
    • Verify that there are routes in the site routers on the calling router and answering router's site so that all locations on both networks are reachable. You can add routes to the routers of each site through static routes or by enabling a routing protocol on the site interface of the calling and answering routers.

      Unlike a remote access connection, a demand-dial connection does not automatically create a default route. You need to create routes on both sides of the demand-dial connection so that traffic can be routed to and from the other side of the demand-dial connection.

      You can manually add static routes to the routing table, or you can add static routes through routing protocols. For persistent demand-dial connections, you can enable Open Shortest Path First (OSPF) or Routing Information Protocol (RIP) across the demand-dial connection. For on-demand demand-dial connections, you can automatically update routes through an auto-static RIP update.
    • For two-way initiated site-to-site VPN connections, verify that the answering router is not interpreting the site-to-site VPN connection as a remote access connection.

      For two-way initiated connections, either router can be the calling router or the answering router. The user names and demand-dial interface names must be properly matched. For example, two-way initiated connections would work under the following configuration:

      Router 1 has a demand-dial interface called NEW-YORK that is configured to use SEATTLE as the user name when sending authentication credentials.

      Router 2 has a demand-dial interface called SEATTLE that is configured to use NEW-YORK as the user name when sending authentication credentials.

      This example assumes that Router 2 can validate the SEATTLE user name and Router 1 can validate the NEW-YORK user name.

      If the incoming caller is a router, the port on which the call was received shows a status of Active and the corresponding demand-dial interface is in a Connected state. If the user account name in the credentials of the calling router appears under Remote Access Clients in the Routing and Remote Access snap-in, then the answering router has interpreted the calling router as a remote access client.
    • For a one-way initiated demand-dial connection, verify that the appropriate static routes are enabled on the user account of the calling router and that the answering router is configured with a routing protocol so that when a connection is made, the static routes of the user account of the calling router are advertised to neighboring routers.
    • Verify that there are no IP packet filters on the demand-dial interfaces of the calling router and answering router that prevent the sending or receiving of TCP/IP.

      You can configure each demand-dial interface with IP input and output filters to control the exact nature of TCP/IP traffic that is allowed into and out of the demand-dial interface.


    Unable to Reach the Virtual Interfaces of VPN Routers


    • Verify the IP address pools of the calling router and answering router.

      If the VPN router is configured to use a static IP address pool, verify that the routes to the range of addresses defined by the static IP address pools are reachable by the hosts and routers of the site. If not, then IP route consisting of the VPN router static IP address pools, as defined by the IP address and mask of the range, must be added to the routers of the site or enable the routing protocol of your routed infrastructure on the VPN router. If the routes to the address pool subnets are not present, calling router logical interfaces cannot receive traffic from locations on the site. Routes for the subnets are implemented either through static routing entries or through a routing protocol, such as Open Shortest Path First (OSPF) or Routing Information Protocol (RIP).

      If the VPN router is configured to use DHCP for IP address allocation and no DHCP server is available, the VPN router assigns addresses from the Automatic Private IP Addressing (APIPA) address range from 169.254.0.1 through 169.254.255.254. Assigning APIPA addresses to VPN routers works only if the network to which the VPN router is attached is also using APIPA addresses.

      If the VPN router is using APIPA addresses when a DHCP server is available, verify that the proper adapter is selected from which to obtain DHCP-allocated IP addresses. By default, the VPN router chooses the adapter to use to obtain IP addresses through DHCP based on your selections in the Routing and Remote Access Server Setup Wizard. You can manually choose a LAN adapter from the Adapter list on the IP tab on the properties of the VPN router in the Routing and Remote Access snap-in.

      If the static IP address pools are a range of IP addresses that are a subset of the range of IP addresses for the network to which the VPN router is attached, verify that the range of IP addresses in the static IP address pool are not assigned to other TCP/IP nodes, either through static configuration or through DHCP.


    On-demand Connection is Not Made Automatically


    • Verify that IP routing is enabled on the IP tab on the properties of the calling router.
    • Verify that the correct static routes exist and are configured with the appropriate demand-dial interface.
    • For the static routes that use a demand-dial interface, verify that the Use this route to initiate demand-dial connections check box on the properties of the demand-dial interface is selected.
    • Verify that the demand-dial interface is not in a disabled state.

      To enable a demand-dial interface that is in a disabled state, right-click the demand-dial interface under Network Interfaces in the Routing and Remote Access snap-in, and then click Enable.
    • Verify that the dial-out hours for the demand-dial interface on the calling router are not preventing the connection attempt.

      To configure dial-out hours, right-click the demand-dial interface under Network Interfaces in the Routing and Remote Access snap-in, and then click Dial-out Hours.
    • Verify that the demand-dial filters for the demand-dial interface on the calling router are not preventing the connection attempt.

      To configure demand-dial filters, right-click the demand-dial interface under Network Interfaces in the Routing and Remote Access snap-in, and then click Set IP Demand-dial Filters.


    Unable to Establish Tunnel


    • Verify that packet filtering on a router interface between the calling router and the answering router is not preventing the forwarding of tunneling protocol traffic. See Appendix A for information about the types of traffic that must be allowed for PPTP and L2TP/IPSec traffic.

      On a Windows Server 2003based VPN router, IP packet filtering can be separately configured from the advanced TCP/IP properties and from the Routing and Remote Access snap-in. Check both places for filters that might be excluding VPN connection traffic.
    • Verify that the Winsock Proxy client is not currently running on the VPN router.

      When the Winsock Proxy client is active, Winsock API calls such as those used to create tunnels and send tunneled data are intercepted and forwarded to a configured proxy server.

      A proxy server-based computer allows an organization to access specific types of Internet resources (typically Web and FTP) without directly connecting that organization to the Internet. The organization can instead use private IP network IDs (such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16).

      Proxy servers are typically used so that private users in an organization can have access to public Internet resources as if they were directly attached to the Internet. VPN connections are typically used so that authorized public Internet users can gain access to private organization resources as if they were directly attached to the private network. A single computer can act as a proxy server (for private users) and a VPN server (for authorized Internet users) to facilitate both exchanges of information.





کلمات کلیدی در جستجوها:

site to site vpn

2

virtual private server

windows server 2003 re

this security database on the server does not have a computer for this workstation trust relationship

5 site virtual private network

nasted task flag چیست؟

how can creat pppoe connection in computers domain remotly

vpn windows 2003 server using single physical adapter

PPPOE windows server 2003 Route Internal LAN and Demand-Dial

آموزشsecure connection between two private networks

تفائت chap pap shiva

multiple public ip چيست

12

wan miniport ( network monitor ) #2 معنی و مشکل این پیغام جیه

برچسب برای این موضوع

مجوز های ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •