http://technet.microsoft.com/en-us/library/cc757206(WS.10).aspx
Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab
This guide provides detailed information about how you can use five computers to create a test lab with which to configure and test virtual private network (VPN) remote access with the Microsoft® Windows® XP Professional operating system with Service Pack 2 (SP2) and the 32-bit versions of the Microsoft Windows Server™ 2003 operating system with Service Pack 1 (SP1). These instructions are designed to take you step-by-step through the configuration required for a Point-to-Point Tunneling Protocol (PPTP) connection, a Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (L2TP/IPsec) connection, and a VPN connection that uses certificate-based Extensible Authentication Protocol-Transport Level Security (EAP-TLS) authentication.
Note The following instructions are for configuring a test lab using a minimum number of computers. Individual computers are needed to separate the services provided on the network and to show the desired functionality clearly. This configuration is designed to reflect neither best practices nor a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network.
Setting Up the Test Lab for PPTP, L2TP/IPsec, and EAP-TLS Remote Access VPN Connections
The infrastructure for the VPN test lab network consists of five computers performing the following services:
- A computer running Windows Server 2003 with SP1, Enterprise Edition, named DC1 that is acting as a domain controller, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, and a certification authority (CA).
- A computer running Windows Server 2003 with SP1, Standard Edition, named IAS1 that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.
- A computer running Windows Server 2003 with SP1, Standard Edition, named IIS1 that is acting as a Web and file server.
- A computer running Windows Server 2003 with SP1, Standard Edition, named VPN1 that is acting as a VPN server. VPN1 has two network adapters installed.
- A computer running Windows XP Professional with SP2 named CLIENT1 that is acting as a VPN client.
The following diagram shows the configuration of the VPN test lab.
There is a network segment representing a corporate intranet and a network segment representing the Internet. All computers on the corporate intranet are connected to a common hub or Layer 2 switch. All computers on the Internet are connected to a separate common hub or Layer 2 switch. Private addresses are used throughout the test lab configuration. The private network of 172.16.0.0/24 is used for the intranet. The private network of 10.0.0.0/24 is used for the simulated Internet. Windows Firewall is set up and configured on the RADIUS server (IAS1), the Web and file server (IIS1), and the client computer (CLIENT1). Windows Firewall should not be turned on or configured on either the domain controller (DC1) or the VPN server (VPN1). In addition, the Windows Firewall/Internet Connection Sharing (ICS) service should be disabled on VPN1.
IIS1 obtains its IP address configuration using DHCP. CLIENT1 uses DHCP for its IP address configuration; however, it is also configured with an alternate IP configuration so that it can be placed on either the intranet network segment or the simulated Internet. All other computers have a manual IP address configuration. There are no Windows Internet Name Service (WINS) servers present.
To reconstruct this test lab, configure the computers in the order presented, beginning with the PPTP-based remote access VPN connection. Additional sections of this guide describe L2TP/IPsec-based and EAP-TLS-based remote access VPN connections.
PPTP-based Remote Access VPN Connections
The following sections describe how to set up and configure each of the computers in the test lab for a PPTP-based remote access VPN connection. PPTP is typically used when there is no public key infrastructure (PKI) to issue computer certificates that are required for L2TP/IPsec connections.
DC1
DC1 is a computer running Windows Server 2003 with SP1, Enterprise Edition, that is providing the following services:
- A domain controller for the example.com Active Directory® domain.
- A DNS server for the example.com DNS domain.
- A DHCP server for the intranet network segment
- The enterprise root certification authority (CA) for the example.com domain.
Note Windows Server 2003 with SP1, Enterprise Edition, is used so that autoenrollment of user certificates for EAP-TLS authentication can be configured. This is described in the "EAP-TLS-based Remote Access VPN Connections" section of this guide.
Configure DC1
- Install Windows Server 2003 with SP1, Enterprise Edition, as a stand-alone server.
- Configure the TCP/IP protocol with the IP address of 172.16.0.1 and the subnet mask of 255.255.255.0.
Configure DC1 as a domain controller
- To start the Active Directory Installation Wizard, click Start, click Run, type dcpromo, and then click OK.
- In the Welcome to the Active Directory Installation Wizard dialog box, click Next.
- In the Operating System Compatibility dialog box, click Next.
- Verify that Domain controller for a new domain option is selected, and then click Next.
- Verify that Domain in a new forest is selected, and then click Next.
- Verify that No, just install and configure DNS on this computer is selected, and then click Next.
- On the New Domain Name page, type example.com, and then click Next.
- On the NetBIOS Domain Name page, confirm that the Domain NetBIOS name is EXAMPLE, and then click Next.
- Accept the default Database and Log Folders directories, as shown in the following figure, and then click Next.
- In the Shared System Volume dialog box, shown in the following figure, verify that the default folder location is correct. Click Next.
- On the Permissions page, verify that the Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems check box is selected, as shown in the following figure. Click Next.
- On the Directory Services Restore Mode Administration Password page, leave the passwords blank, and then click Next.
- Review the information that appears on the Summary page, and then click Next.
- On the Completing the Active Directory Installation Wizard page, click Finish.
- When prompted to restart the computer, click Restart Now.
Raise the domain functional level
- Open the Active Directory Domains and Trusts snap-in from the Administrative Tools folder, and then right-click the domain computer dc1.example.com.
- Click Raise Domain Functional Level, select Windows Server 2003 on the Raise Domain Functional Level page, and then click Raise, as shown in the following figure.
Install and configure DHCP
- In Control Panel, double-click Add or Remove Programs, and then install DHCP as a Networking Services component.
- Open the DHCP snap-in from the Administrative Tools folder.
- Click Action, and then click Authorize to authorize the DHCP service.
- In the console tree, right-click dc1.example.com, and then click New Scope.
- On the Welcome page of the New Scope Wizard, click Next.
- On the Scope Name page, type CorpNet in Name. This is shown in the following figure.
- Click Next. On the IP Address Range page, type 172.16.0.10 in Start IP address, 172.16.0.100 in End IP address, and 24 in Length. This is shown in the following figure.
- Click Next. On the Add Exclusions page, click Next.
- On the Lease Duration page, click Next.
- On the Configure DHCP Options page, click Yes, I want to configure DHCP options now. This is shown in the following figure.
- Click Next. On the Router (Default Gateway) page, click Next.
- On the Domain Name and DNS Servers page, type example.com in Parent domain. Type 172.16.0.1 in IP address, and then click Add. This is shown in the following figure.
- Click Next. On the WINS Servers page, click Next.
- On the Activate Scope page, click Yes, I want to activate this scope now. This is shown in the following figure.
- Click Next. On the Completing the New Scope Wizard page, click Finish.
Install Certificate Services
- In Control Panel, double-click Add or Remove Programs, and then install the Certificate Services component as an enterprise root CA with the name Example CA.
- Select Enterprise root CA, as shown in the following figure, and then click Next.
- Type Example CA for the Common name for this CA, as shown in the following figure, and then click Next.
- Click Next to accept the default Certificate Database Settings shown in the following figure.
- Click Finish.
Add computers, users, and groups to the domain
- Open the Active Directory Users and Computers snap-in.
- In the console tree, open example.com.
- Right-click Users, point to New, and then click Computer.
- In the New Object - Computer dialog box, type IAS1 in Computer name. This is shown in the following figure.
- Click Next. In the Managed dialog box, click Next. In the New Object - Computer dialog box, click Finish.
- Use steps 3 through 5 to create additional computer accounts with the following names: IIS1, VPN1, and CLIENT1.
- In the console tree, right-click Users, point to New, and then click User.
- In the New Object - User dialog box, type VPNUser in First name, and type VPNUser in User logon name. This is shown in the following figure.
- Click Next.
- In the New Object - User dialog box, type a password of your choice in Password and Confirm password. Clear the User must change password at next logon check box and select the Password never expires check box. This is shown in the following figure.
- In the New Object - User dialog box, click Finish.
- In the console tree, right-click Users, point to New, and then click Group.
- In the New Object - Group dialog box, type VPNUsers in Group name, and then click OK. This is shown in the following figure.
- In the details pane, double-click VPNUsers.
- Click the Members tab, and then click Add.
- In the Select Users, Contacts, Users, or Groups dialog box, type vpnuser in Enter the object names to select. This is shown in the following figure.
- Click OK. In the Multiple Names Found dialog box, click OK. The VPNUser user account is added to the VPNUsers group. This is shown in the following figure.
- Click OK to save changes to the VPNUsers group.
IAS1
IAS1 is a computer running Windows Server 2003 with SP1, Standard Edition, that is providing RADIUS authentication, authorization, and accounting for VPN1.
Configure IAS1 as a RADIUS server
- Install Windows Server 2003 with SP1, Standard Edition, as a member server named IAS1 in the example.com domain.
- For the intranet local area connection, configure the TCP/IP protocol with the IP address of 172.16.0.2, the subnet mask of 255.255.255.0, and the DNS server IP address of 172.16.0.1.
- In Control Panel, double-click Add or Remove Programs, and then install Internet Authentication Service as a Networking Services component.
- Open the Internet Authentication Service snap-in from the Administrative Tools folder.
- Right-click Internet Authentication Service, and then click Register Server in Active Directory. When the Register Internet Authentication Server in Active Directory dialog box appears, click OK. This is shown in the following figure.
- In the console tree, right-click RADIUS Clients, and then click New RADIUS Client.
- On the Name and Address page of the New RADIUS Client wizard, for Friendly name, type VPN1. In Client address (IP or DNS), type 172.16.0.4. This is shown in the following figure.
- Click Next. On the Additional Information page of the New RADIUS Client wizard, for Shared secret, type a shared secret for VPN1, and then type it again in Confirm shared secret. This is shown in the following figure.
- Click Finish.
- In the console tree, right-click Remote Access Policies, and then click New Remote Access Policy.
- On the Welcome to the New Remote Access Policy Wizard page, click Next.
- On the Policy Configuration Method page, type VPN remote access to intranet in Policy name. This is shown in the following figure.
- Click Next. On the Access Method page, select VPN. This is shown in the following figure.
- Click Next. On the User or Group Access page, click Group. This is shown in the following figure.
- Click Add. In the Select Groups dialog box, click Locations, select example.com as the location, and then click OK.
- Type vpnusers in Enter the object names to select. This is shown in the following figure.
- Click OK. The VPNUsers group in the example.com domain is added to the list of groups on the User or Group Access page. This is shown in the following figure.
- Click Next. On the Authentication Methods page, the Microsoft Encrypted Authentication version 2 (MS-CHAPv2) authentication protocol is selected by default. This is shown in the following figure.
- Click Next. On the Policy Encryption Level page, clear the Basic encryption and Strong encryption check boxes, leaving only Strongest encryption selected. This is shown in the following figure.
- Click Next. On the Completing the New Remote Access Policy page, click Finish.
Configure Windows Firewall on IAS1
- In Control Panel, double-click Windows Firewall.
- In the Windows Firewall dialog box, click the Exceptions tab.
- Click Add Port, and in the Add a Port dialog box add the following port exceptions:
Note You must click Add Port on the Exceptions tab for each port exception.
Name Port Number Protocol Legacy RADIUS
1645
UDP
Legacy RADIUS
1646
UDP
RADIUS Accounting
1812
UDP
RADIUS Authentication
1813
UDP - Verify that the four port exceptions that you added are selected on the Exceptions tab, as shown in the following example.
- Click the Advanced tab, and then click Settings for Security Logging.
- In the Log Setting dialog box, select Log dropped packets and Log successful connections. Note the path and file name in Name.
The log file allows you to see where connection errors occur, as well as which source and destination ports the errors occurred on. This log file should provide you with the information needed in case you need to add more ports to the exception list. - Click OK twice to close Windows Firewall.
IIS1
IIS1 is a computer running Windows Server 2003 with SP1, Standard Edition, and Internet Information Services (IIS). It is providing Web and file server services for intranet clients. To configure IIS1 as a Web and file server and to configure Windows Firewall on IIS1, perform the following steps.
Configure IIS1 as a Web and file server
- Install Windows Server 2003 with SP1, Standard Edition, as a member server named IIS1 in the example.com domain.
- In Control Panel, double-click Add or Remove Programs, and then install Internet Information Services (IIS) as a subcomponent of the Application Server component in the Windows Components Wizard.
- On IIS1, use Windows Explorer to create a new share for the root folder of drive C using the share name ROOT with the default permissions.
- To determine whether the Web server is working correctly, run Internet Explorer on IAS1. If the Internet Connection Wizard prompts you, configure Internet connectivity for a LAN connection. In Internet Explorer, in Address, type http://IIS1.example.com/iisstart.htm. You should see a message saying the Web site is under construction.
- To determine whether file sharing is working correctly, on IAS1, click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the root folder of drive C on IIS1.
Configure Windows Firewall on IIS1
- In Control Panel, double-click Windows Firewall.
- In the Windows Firewall dialog box, click the Exceptions tab.
- Select File and Print Sharing, and then click Add Program.
- In the Add a Program dialog box, select Internet Explorer, and then click OK.
- Click Add a Port.
- In the Add a Port dialog box, type World Wide Web Publishing Service for the Name, type 80 for the Port number, select TCP as the type of traffic processed by the port, and then click OK.
- Verify that File and Print Sharing, Internet Explorer, and World Wide Web Publishing Service are all selected in the Exceptions dialog box, and then click the Advanced tab.
- Click Settings for Security Logging.
- In the Log Setting dialog box, select Log dropped packets and Log successful connections. Note the path and file name in Name.
- Click OK twice to close Windows Firewall.
VPN1
VPN1 is a computer running Windows Server 2003 with SP1, Standard Edition, that is providing VPN server services for Internet-based VPN clients.