If the LAN hosts don't have a route through the RRAS server to the
VPN clients, they can't respond to traffic that comes from the VPN
clients.
You have two options:
1. adjust your network routing path to include a route to the VPN
client subnet through the RRAS server
2. enter manual routes on only hose hosts that should be reachable by
the VPN clients.
Personally, I'd go with #2; it's more management, but it provides a
small measure of security since the VPN client cannot establish
connection with the LAN host that is lacking such a route.
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of dubaisans dubai
Sent: Thursday, January 04, 2007 8:03 AM
To: James D. Stallard
Cc: [email protected]
Subject: Re: Secure Remote access - windows 2003
Looks like a routing problem to me too.
But I feel DHCP or static is NOT the issue. My static address pool is
10.10.10.1 -10.10.10.10.
On connection , Internet user is getting address 10.10.10.1 . When he
tries to ping 192.168.0.201, an internal machine - what will be the
source IP of that packet as seen by 192.168.0.201. If source IP is
10.10.10.1 then maybe I need to add a route for this 10.10.10.10
static pool on the internal host .201.
Any other suggestions?
On 1/4/07, James D. Stallard <[EMAIL PROTECTED]> wrote:
> I'm not a routing expert, but I suspect you have configured your RRAS
> Server to assign addresses from a pool of addresses, rather than
use DHCP.
>
> Under the Properties dialog for your server and in the IP tab you need
> to check the box labelled Enable IP Routing and also the radio botton
> Dynamic Host Configuration Protocol. You want to be using the existing
> internal DHCP server to allocate addresses to your inbound VPN
clients.
>
> The good news is that if you decide to start from scratch it is a
> simple matter to disable and re-enable RRAS and re-do your
> configuration with the default settings.
>
> Not sure why you enabled IP forwarding in the registry, the (very)
> basic solution described does not require you to do so.
> Cheers
>
> James D. Stallard
>
> -----Original Message-----
> From: dubaisans dubai [mailto:[EMAIL PROTECTED]
> Sent: 04 January 2007 14:48
> To: James D. Stallard
> Cc: [email protected]
> Subject: Re: Secure Remote access - windows 2003
>
> Using the instructions I have successfully setup the L2TP/IPSEC tunnel
> up till the gateway. Now if I want to access the internal network what
> else should I do on the RRAS server. From Internet user machine I am
> able to ping both the Internet interface and the internal interface [
> 192.168.0.200] of the RRAS server. But I cannot ping any other
> internal machine [192.168.0.201].connected on the same LAN as
internal network interface.
>
> On the RRAS server I have enabled IP forwarding in the through
Registry.
> Address pool is configured and is getting allocated to Internet user
> when he connects.
>
> On 1/3/07, James D. Stallard <[EMAIL PROTECTED]> wrote:
> > You don't mention the number of users, but the budget suggests small
> > scale
> > :)
> >
> > Windows 2003, SP1 and R2 provide RRAS, which will do L2TP/IPSEC, and
> > with WXP SP2 as your client you have 2048bit Diffie-Hellman
> > encryption
> available.
> >
> > Setting up RRAS to perform this task is done in less than 20 minutes
> > and is easy to get through a firewall inbound (IE your firewall).
> > The problems you have to face are:
> >
> > . If you wish to use pre-shared keys (the "cheapest" way of doing
> > it) you will need to configure the PSK passphrase on each client
> > individually - easy with a small number of clients. Otherwise, you
> > will need to invest in a certificate authority.
> >
> > . This is only suitable for access by known machines, not for
> > internet café type environments.
> >
> > . This solution works great for the remote home user, but is less
> > successful for your travelling salesmen using the client's internet
> > connection as they generally have the relevant ports/protocols
blocked.
> >
> > . The locally configured PSK may not be stored in a highly secure
> > manner on the client machines and could possibly become known in the
> > event a machine configured with it is stolen. You may find yourself
> > having to re-deploy a new PSK.
> >
> > I wrote a quick and dirty step-by-step here:
> > http://www.leafgrove.com/view_article.asp?id=19&cat=16&state=plus
> >
> > In case one of your configured laptops is stolen and an attempt is
> > made on your RRAS solution, pay attention to your account locking on
> > failed password settings. You want permanent locks on a small number
> > of attempts (say 5), thus forcing administrative intervention and
> > investigation in the event of an account becoming locked.
> >
> > Cheers
> >
> > James D. Stallard
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf Of dubaisans dubai
> > Sent: 02 January 2007 04:17
> > To: [email protected]
> > Subject: Secure Remote access - windows 2003
> >
> > I am planning to provide remote access from Internet to a windows
> > 2003 domain
> >
> > controller.User-ids, NTFS permissions are all configured.
> >
> > The objective is file sharing and access.
> >
> > Files will need to be copied. The machine has valid Internet IP
> > address and is
> >
> > sitting behind a Firewall.
> >
> > I would like to keep solution independent of Firewall.This will be
> > accessed by roaming users. I am thinking of something like 0penssh
> > for windows or maybe just GUI based Secure-FTP
> >
> > Challenges I am facing
> > ------------------------------------
> > Authentication should be strong. Something more than a password. [
> > No budget for RSA securiD :-))) ]
> >
> > Encryption for user-crentials/data access
> >
> > Options considered
> > ----------------------------------
> > I read W2K3 L2TP/IPSEC - looks complex. Terminal services - File
> > copy is not simple and also you require Application Mode license.
> >
> > The number of remote users - less than 100
> >
> > Cost effective , easy to implement and easy to manage solution
> > sought
> >
> >
> >
> >
>
>
>
>
All mail to and from this domain is GFI-scanned.