If this is the case:

" I believe the gentleman was referring to a VPN that would cause his
terminal services port to not remain open on the internet"

What we have done to circumvent this problem is this:

Setup RRAS to allow VPN connections and make sure it's working.

Setup RRAS packet filters to block outside connections to all ports except
the VPN (TCP 1723)(or additionally other ports needed to be connected to from
the real world)

Setup RRAS to allow connections to Terminal Server (TCP port 3389) from only
the IP addy's delegated when connecting to VPN.

This creates a situation where the Terminal Server will not show up and can
not be connected to publicly.  The only port which will allow connections
from the real world is 1723 (VPN).  So, to access Terminal Server you must
VPN first, then open a terminal session.

If someone needs more specifics on how to set it up, let me know.

Chisholm Wildermuth
Systems Engineer
dbWebNet, Inc.


-----------------------------------------------------------------------
The opinions expressed here are my own and do not necessarily reflect those
of my employer.







-----Original Message-----
From: Peter Mueller [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, May 09, 2002 12:07 PM
To: 'Melameth, Daniel D.'; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: RE: Low budget VPN?????

>       Windows 2000 Terminal Server supports 128-bit encrypted sessions
> "out-of-the-box"...

and

> Other then pushing a GUI over SSH (which I'm considering), what 
> would be a low or no cost VPN solution for me to log into my home 
> network (Windows based so I can connect to MS Terminal Server).

.  I would suggest an IPSEC
device, perhaps freeswan (http://www.freeswan.org) or kame
(http://www.kame.org).  If these aren't options then perhaps L2TP/PPTP
tunneling or an SSH tunnel will do the trick..

good luck

Peter

Reply via email to