B
Bo Berglund
We have used a RRAS server (Windows 2000 server) as a VPN gateway into
our internal LAN for quite some time now. It works good as far as we
could see. In parallel to this is the ordinary firewall used for all
browsing, email and other Internet traffic. This was originally a
Proxy Server 2 server, but it was replaced by a Symantec firewall a
while back when PS2 could not handle all the attacks anymore.
Now the issue has been raised that the VPN server is acting like a
backdoor to our LAN and really should be taken out. A security
consultant tested it and said it leaks while the new FW is tight. But
us remote users *really* need to get in on the internal LAN via a VPN
solution...
So what we are asking now is if it is possible to have a solution
where the VPN traffic coming in to the new firewall can be directed to
the RRAS server, now entirely on the internal LAN (using only one
NIC?). Can such a solution get us authenticated to then use the LAN
resources via the tunnel?
And how can it be set up? We are not experienced in this
(amateurs...).
Maybe the RRAS server should still have two NIC:s, one with an IP on
the internal LAN and one randomly chosen outside that network. Then
the FW would send everything that comes in as VPN packets (on ports
17xx somewhere) to that special address and then it would authenticate
in the RRAS server.
Is this workable?
/Bo
our internal LAN for quite some time now. It works good as far as we
could see. In parallel to this is the ordinary firewall used for all
browsing, email and other Internet traffic. This was originally a
Proxy Server 2 server, but it was replaced by a Symantec firewall a
while back when PS2 could not handle all the attacks anymore.
Now the issue has been raised that the VPN server is acting like a
backdoor to our LAN and really should be taken out. A security
consultant tested it and said it leaks while the new FW is tight. But
us remote users *really* need to get in on the internal LAN via a VPN
solution...
So what we are asking now is if it is possible to have a solution
where the VPN traffic coming in to the new firewall can be directed to
the RRAS server, now entirely on the internal LAN (using only one
NIC?). Can such a solution get us authenticated to then use the LAN
resources via the tunnel?
And how can it be set up? We are not experienced in this
(amateurs...).
Maybe the RRAS server should still have two NIC:s, one with an IP on
the internal LAN and one randomly chosen outside that network. Then
the FW would send everything that comes in as VPN packets (on ports
17xx somewhere) to that special address and then it would authenticate
in the RRAS server.
Is this workable?
/Bo