G
Guest
I'm currently trying to configure a VPN server running on a Windows 2000
server in a test lab . This VPN server is located on a perimeter network
(i.e. DMZ zone). A router separates this perimeter network from the main
internal private network (i.e. Intranet or LAN). The Windows 2000 domain
controller is located within the internal network (192.168.1.0 /24) with an
IP address of 192.168.1.4 . It is also acting as a DHCP server. The VPN
server has a IP address of 192.168.2.2 on the perimeter network (i.e. the
192.168.2.0 /24 inner DMZ network). All traffic can be routed properly
between the internal network and the perimeter network. The domain
controller on the internal network has a domain user account set up in Active
Directory Users and Computers and the account is configured for allow access
permission in its Dial up/Remote Access properties. The VPN server on the
perimeter network is running Windows 2000 advanced server and is currently
functioning as a standalone server. Routing and Remote access is enabled on
this machine and it is configured as a VPN server as mentioned before. The
VPN clients are configured to obtain their IP addresses from a static pool
addresses (e.g. 192.168.1.100 - 192.168.1.120) on the VPN server. This
address pool assignment may have also been configured dynamically if the
router was configured as a DHCP relay agent.
However, the problem here is that I'm not sure how the VPN server is going
to authenticate or communicate with the Domain Controller in order to permit
or grant the incoming VPN client full access to shared resources on the
domain. Do I need to set up a local user account on the VPN server using the
Computer Management administrative tool with the same credentials as the
domain user account mentioned above? or should I configure the VPN server on
the perimeter network as a member server (i.e. make it a member of the
domain)? or should I configure it as a additional domain controller (backup
DC) whereby it can directly authenticate the incoming VPN client?. I would
appreciate your advice or assistance on this matter. Normally, as you know
already, it is recommended to place the VPN server in a perimeter network for
security reasons rather than the internal network so that intruders or
unauthorised users can't directly compromise the local area network.
Obviously, if the Domain Controller was acting as a VPN server in a simple
network with no perimeter network; then it would make things very easy as the
VPN clients from the Internet could authenticate directly with it. However,
this is not the case here. The problem here evolves around how the VPN
server authenticates the VPN clients when the Domain Controller is located on
the internal network. To finalise, what are the prerequisites of the VPN
server in this scenario? This is a authentication issue rather than a
routing issue etc. Furthermore, should the VPN server in this case be
configured with a static address pool taken from the perimeter network (e.g.
192.168.2.100 -192.168.2.120) or with a static address pool taken from the
internal network (e.g. 192.168.1.100 - 192.168.1.120) or does it make any
difference?
My apologies for the long description of this VPN network scenario but I
thought it might prove useful for anyone out there trying to resolve this
problem.
Trusting that you will kindly respond to this query.
Thanking You.
Martin Healy
Email: (e-mail address removed)
server in a test lab . This VPN server is located on a perimeter network
(i.e. DMZ zone). A router separates this perimeter network from the main
internal private network (i.e. Intranet or LAN). The Windows 2000 domain
controller is located within the internal network (192.168.1.0 /24) with an
IP address of 192.168.1.4 . It is also acting as a DHCP server. The VPN
server has a IP address of 192.168.2.2 on the perimeter network (i.e. the
192.168.2.0 /24 inner DMZ network). All traffic can be routed properly
between the internal network and the perimeter network. The domain
controller on the internal network has a domain user account set up in Active
Directory Users and Computers and the account is configured for allow access
permission in its Dial up/Remote Access properties. The VPN server on the
perimeter network is running Windows 2000 advanced server and is currently
functioning as a standalone server. Routing and Remote access is enabled on
this machine and it is configured as a VPN server as mentioned before. The
VPN clients are configured to obtain their IP addresses from a static pool
addresses (e.g. 192.168.1.100 - 192.168.1.120) on the VPN server. This
address pool assignment may have also been configured dynamically if the
router was configured as a DHCP relay agent.
However, the problem here is that I'm not sure how the VPN server is going
to authenticate or communicate with the Domain Controller in order to permit
or grant the incoming VPN client full access to shared resources on the
domain. Do I need to set up a local user account on the VPN server using the
Computer Management administrative tool with the same credentials as the
domain user account mentioned above? or should I configure the VPN server on
the perimeter network as a member server (i.e. make it a member of the
domain)? or should I configure it as a additional domain controller (backup
DC) whereby it can directly authenticate the incoming VPN client?. I would
appreciate your advice or assistance on this matter. Normally, as you know
already, it is recommended to place the VPN server in a perimeter network for
security reasons rather than the internal network so that intruders or
unauthorised users can't directly compromise the local area network.
Obviously, if the Domain Controller was acting as a VPN server in a simple
network with no perimeter network; then it would make things very easy as the
VPN clients from the Internet could authenticate directly with it. However,
this is not the case here. The problem here evolves around how the VPN
server authenticates the VPN clients when the Domain Controller is located on
the internal network. To finalise, what are the prerequisites of the VPN
server in this scenario? This is a authentication issue rather than a
routing issue etc. Furthermore, should the VPN server in this case be
configured with a static address pool taken from the perimeter network (e.g.
192.168.2.100 -192.168.2.120) or with a static address pool taken from the
internal network (e.g. 192.168.1.100 - 192.168.1.120) or does it make any
difference?
My apologies for the long description of this VPN network scenario but I
thought it might prove useful for anyone out there trying to resolve this
problem.
Trusting that you will kindly respond to this query.
Thanking You.
Martin Healy
Email: (e-mail address removed)