728x90 animated banner

Friday, 3 May 2013

VPN over IPsec


15.9 VPN over IPsec

Written by Nik Clayton.
Creating a VPN between two networks, separated by the Internet, using FreeBSD gateways.

15.9.1 Understanding IPsec

Written by Hiten M. Pandya.This section will guide you through the process of setting up IPsec. In order to set up IPsec, it is necessary that you are familiar with the concepts of building a custom kernel (see Chapter 9).
IPsec is a protocol which sits on top of the Internet Protocol (IP) layer. It allows two or more hosts to communicate in a secure manner (hence the name). The FreeBSD IPsec “network stack” is based on the KAME implementation, which has support for both protocol families, IPv4 and IPv6.
IPsec consists of two sub-protocols:
  • Encapsulated Security Payload ESP), protects the IP packet data from third party interference, by encrypting the contents using symmetric cryptography algorithms (like Blowfish, 3DES).
  • Authentication Header (AH), protects the IP packet header from third party interference and spoofing, by computing a cryptographic checksum and hashing the IP packet header fields with a secure hashing function. This is then followed by an additional header that contains the hash, to allow the information in the packet to be authenticated.
ESP and AH can either be used together or separately, depending on the environment.
IPsec can either be used to directly encrypt the traffic between two hosts (known as Transport Mode); or to build “virtual tunnels” between two subnets, which could be used for secure communication between two corporate networks (known as Tunnel Mode). The latter is more commonly known as a Virtual Private Network (VPN). The ipsec(4) manual page should be consulted for detailed information on the IPsec subsystem in FreeBSD.
To add IPsec support to your kernel, add the following options to your kernel configuration file:
options   IPSEC        #IP security
device    crypto
If IPsec debugging support is desired, the following kernel option should also be added:
options   IPSEC_DEBUG  #debug for IP security

15.9.2 The Problem

There is no standard for what constitutes a VPN. VPNs can be implemented using a number of different technologies, each of which have their own strengths and weaknesses. This section presents a scenario, and the strategies used for implementing a VPN for this scenario.

15.9.3 The Scenario: Two networks, one home based and one corporate based. Both are connected to the Internet, and expected, via this VPN to behave as one.

The premise is as follows:
  • You have at least two sites
  • Both sites are using IP internally
  • Both sites are connected to the Internet, through a gateway that is running FreeBSD.
  • The gateway on each network has at least one public IP address.
  • The internal addresses of the two networks can be public or private IP addresses, it does not matter. They just may not collide; e.g.: may not both use192.168.1.x.

15.9.4 Configuring IPsec on FreeBSD

Written by Tom Rhodes.To begin, the security/ipsec-tools must be installed from the Ports Collection. This third party software package provides a number of applications which will help support the configuration.
The next requirement is to create two gif(4) pseudo-devices which will be used to tunnel packets and allow both networks to communicate properly. As root, run the following commands, replacing the internal and external items with the real internal and external gateways:
# ifconfig gif0 create
# ifconfig gif0 internal1 internal2
# ifconfig gif0 tunnel external1 external2
For example, the corporate LAN's public IP is 172.16.5.4 having a private IP of 10.246.38.1. The home LAN's public IP is 192.168.1.12 with an internal private IPof 10.0.0.5.
This may seem confusing, so review the following example output from the ifconfig(8) command:
Gateway 1:

gif0: flags=8051 mtu 1280
tunnel inet 172.16.5.4 --> 192.168.1.12
inet6 fe80::2e0:81ff:fe02:5881%gif0 prefixlen 64 scopeid 0x6
inet 10.246.38.1 --> 10.0.0.5 netmask 0xffffff00

Gateway 2:

gif0: flags=8051 mtu 1280
tunnel inet 192.168.1.12 --> 172.16.5.4
inet 10.0.0.5 --> 10.246.38.1 netmask 0xffffff00
inet6 fe80::250:bfff:fe3a:c1f%gif0 prefixlen 64 scopeid 0x4
Once complete, both private IPs should be reachable using the ping(8) command like the following output suggests:
priv-net# ping 10.0.0.5
PING 10.0.0.5 (10.0.0.5): 56 data bytes
64 bytes from 10.0.0.5: icmp_seq=0 ttl=64 time=42.786 ms
64 bytes from 10.0.0.5: icmp_seq=1 ttl=64 time=19.255 ms
64 bytes from 10.0.0.5: icmp_seq=2 ttl=64 time=20.440 ms
64 bytes from 10.0.0.5: icmp_seq=3 ttl=64 time=21.036 ms
--- 10.0.0.5 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 19.255/25.879/42.786/9.782 ms

corp-net# ping 10.246.38.1
PING 10.246.38.1 (10.246.38.1): 56 data bytes
64 bytes from 10.246.38.1: icmp_seq=0 ttl=64 time=28.106 ms
64 bytes from 10.246.38.1: icmp_seq=1 ttl=64 time=42.917 ms
64 bytes from 10.246.38.1: icmp_seq=2 ttl=64 time=127.525 ms
64 bytes from 10.246.38.1: icmp_seq=3 ttl=64 time=119.896 ms
64 bytes from 10.246.38.1: icmp_seq=4 ttl=64 time=154.524 ms
--- 10.246.38.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 28.106/94.594/154.524/49.814 ms
As expected, both sides have the ability to send and receive ICMP packets from the privately configured addresses. Next, both gateways must be told how to route packets in order to correctly send traffic from either network. The following command will achieve this goal:
# corp-net# route add 10.0.0.0 10.0.0.5 255.255.255.0
# corp-net# route add net 10.0.0.0: gateway 10.0.0.5
# priv-net# route add 10.246.38.0 10.246.38.1 255.255.255.0
# priv-net# route add host 10.246.38.0: gateway 10.246.38.1
At this point, internal machines should be reachable from each gateway as well as from machines behind the gateways. This is easily determined from the following example:
corp-net# ping 10.0.0.8
PING 10.0.0.8 (10.0.0.8): 56 data bytes
64 bytes from 10.0.0.8: icmp_seq=0 ttl=63 time=92.391 ms
64 bytes from 10.0.0.8: icmp_seq=1 ttl=63 time=21.870 ms
64 bytes from 10.0.0.8: icmp_seq=2 ttl=63 time=198.022 ms
64 bytes from 10.0.0.8: icmp_seq=3 ttl=63 time=22.241 ms
64 bytes from 10.0.0.8: icmp_seq=4 ttl=63 time=174.705 ms
--- 10.0.0.8 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 21.870/101.846/198.022/74.001 ms

priv-net# ping 10.246.38.107
PING 10.246.38.1 (10.246.38.107): 56 data bytes
64 bytes from 10.246.38.107: icmp_seq=0 ttl=64 time=53.491 ms
64 bytes from 10.246.38.107: icmp_seq=1 ttl=64 time=23.395 ms
64 bytes from 10.246.38.107: icmp_seq=2 ttl=64 time=23.865 ms
64 bytes from 10.246.38.107: icmp_seq=3 ttl=64 time=21.145 ms
64 bytes from 10.246.38.107: icmp_seq=4 ttl=64 time=36.708 ms
--- 10.246.38.107 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 21.145/31.721/53.491/12.179 ms
Setting up the tunnels is the easy part. Configuring a secure link is a much more in depth process. The following configuration uses pre-shared (PSKRSA keys. Aside from the IP addresses, both /usr/local/etc/racoon/racoon.conf files will be identical and look similar to
path    pre_shared_key  "/usr/local/etc/racoon/psk.txt"; #location of pre-shared key file
log     debug; #log verbosity setting: set to 'notify' when testing and debugging is complete

padding # options are not to be changed
{
        maximum_length  20;
        randomize       off;
        strict_check    off;
        exclusive_tail  off;
}

timer # timing options. change as needed
{
        counter         5;
        interval        20 sec;
        persend         1;
#       natt_keepalive  15 sec;
        phase1          30 sec;
        phase2          15 sec;
}

listen # address [port] that racoon will listening on
{
        isakmp          172.16.5.4 [500];
        isakmp_natt     172.16.5.4 [4500];
}

remote  192.168.1.12 [500]
{
        exchange_mode   main,aggressive;
        doi             ipsec_doi;
        situation       identity_only;
        my_identifier   address 172.16.5.4;
        peers_identifier        address 192.168.1.12;
        lifetime        time 8 hour;
        passive         off;
        proposal_check  obey;
#       nat_traversal   off;
        generate_policy off;

                        proposal {
                                encryption_algorithm    blowfish;
                                hash_algorithm          md5;
                                authentication_method   pre_shared_key;
                                lifetime time           30 sec;
                                dh_group                1;
                        }
}

sainfo  (address 10.246.38.0/24 any address 10.0.0.0/24 any) # address $network/$netmask $type address $network/$netmask $type ( $type being any or esp)
{        # $network must be the two internal networks you are joining.
        pfs_group       1;
        lifetime        time    36000 sec;
        encryption_algorithm    blowfish,3des,des;
        authentication_algorithm        hmac_md5,hmac_sha1;
        compression_algorithm   deflate;
}
Explaining every available option, along with those listed in these examples is beyond the scope of this document. There is plenty of relevant information in the racoonconfiguration manual page.
The SPD policies need to be configured so FreeBSD and racoon is able to encrypt and decrypt network traffic between hosts.
This task may be undertaken with a simple shell script similar to the following which is on the corporate gateway. This file will be used during system initialization and should be saved as /usr/local/etc/racoon/setkey.conf.
flush;
spdflush;
# To the home network
spdadd 10.246.38.0/24 10.0.0.0/24 any -P out ipsec esp/tunnel/172.16.5.4-192.168.1.12/use;
spdadd 10.0.0.0/24 10.246.38.0/24 any -P in ipsec esp/tunnel/192.168.1.12-172.16.5.4/use;
Once in place, racoon may be started on both gateways using the following command:
# /usr/local/sbin/racoon -F -f /usr/local/etc/racoon/racoon.conf -l /var/log/racoon.log
The output should be similar to the following:
corp-net# /usr/local/sbin/racoon -F -f /usr/local/etc/racoon/racoon.conf
Foreground mode.
2006-01-30 01:35:47: INFO: begin Identity Protection mode.
2006-01-30 01:35:48: INFO: received Vendor ID: KAME/racoon
2006-01-30 01:35:55: INFO: received Vendor ID: KAME/racoon
2006-01-30 01:36:04: INFO: ISAKMP-SA established 172.16.5.4[500]-192.168.1.12[500] spi:623b9b3bd2492452:7deab82d54ff704a
2006-01-30 01:36:05: INFO: initiate new phase 2 negotiation: 172.16.5.4[0]192.168.1.12[0]
2006-01-30 01:36:09: INFO: IPsec-SA established: ESP/Tunnel 192.168.1.12[0]->172.16.5.4[0] spi=28496098(0x1b2d0e2)
2006-01-30 01:36:09: INFO: IPsec-SA established: ESP/Tunnel 172.16.5.4[0]->192.168.1.12[0] spi=47784998(0x2d92426)
2006-01-30 01:36:13: INFO: respond new phase 2 negotiation: 172.16.5.4[0]192.168.1.12[0]
2006-01-30 01:36:18: INFO: IPsec-SA established: ESP/Tunnel 192.168.1.12[0]->172.16.5.4[0] spi=124397467(0x76a279b)
2006-01-30 01:36:18: INFO: IPsec-SA established: ESP/Tunnel 172.16.5.4[0]->192.168.1.12[0] spi=175852902(0xa7b4d66)
To ensure the tunnel is working properly, switch to another console and use tcpdump(1) to view network traffic using the following command. Replace em0 with the network interface card as required.
# tcpdump -i em0 host 172.16.5.4 and dst 192.168.1.12
Data similar to the following should appear on the console. If not, there is an issue, and debugging the returned data will be required.
01:47:32.021683 IP corporatenetwork.com > 192.168.1.12.privatenetwork.com: ESP(spi=0x02acbf9f,seq=0xa)
01:47:33.022442 IP corporatenetwork.com > 192.168.1.12.privatenetwork.com: ESP(spi=0x02acbf9f,seq=0xb)
01:47:34.024218 IP corporatenetwork.com > 192.168.1.12.privatenetwork.com: ESP(spi=0x02acbf9f,seq=0xc)
At this point, both networks should be available and seem to be part of the same network. Most likely both networks are protected by a firewall, as they should be. To allow traffic to flow between them, rules need to be added to pass packets back and forth. For the ipfw(8) firewall, add the following lines to the firewall configuration file:
ipfw add 00201 allow log esp from any to any
ipfw add 00202 allow log ah from any to any
ipfw add 00203 allow log ipencap from any to any
ipfw add 00204 allow log udp from any 500 to any
Note: The rule numbers may need to be altered depending on the current host configuration.
For users of pf(4) or ipf(8), the following rules should do the trick:
pass in quick proto esp from any to any
pass in quick proto ah from any to any
pass in quick proto ipencap from any to any
pass in quick proto udp from any port = 500 to any port = 500
pass in quick on gif0 from any to any
pass out quick proto esp from any to any
pass out quick proto ah from any to any
pass out quick proto ipencap from any to any
pass out quick proto udp from any port = 500 to any port = 500
pass out quick on gif0 from any to any
Finally, to allow the machine to start support for the VPN during system initialization, add the following lines to /etc/rc.conf:
ipsec_enable="YES"
ipsec_program="/usr/local/sbin/setkey"
ipsec_file="/usr/local/etc/racoon/setkey.conf" # allows setting up spd policies on boot
racoon_enable="yes"

VPN User Guides and Software


In order to set up a Virtual Private Network (VPN) connection to the university network from off-campus, VPN client software needs to be installed. The Cisco AnyConnect software is now the recommended setup method.
For Mac OS X Lion 10.7 (and above) users and Linux users, please follow the instructions below to connect to the VPN network.

Cisco AnyConnect VPN Client (recommended)

The Cisco AnyConnect Client is based on SSL connectivity and supports both 32 and 64 bit operating systems. The user guide outlines the steps required to download and install the required software.
This client is supported by the following operating systems:
  • Windows 7 (32-bit and 64-bit)
  • Windows Vista (32-bit and 64-bit) with SP2
  • Windows XP with SP2 or 3
  • Linux (Red Hat Enterprise 5 Desktop, or Ubuntu 9.x)
  • Mac OS X 10.6 (32-bit and 64 bit)
  • Mac OS X 10.5

Installation

Install Cisco AnyConnect client using the installation wizard: https://vpn.unisa.edu.au/

User Guide

For assistance with setup, view the VPN User Guide page.

Mac OS X 10.7 Lion users

A native VPN connection can be configured within Mac OS X (64-bit) to allow for connection to the UniSA VPN server, as per the Mac OS X 10.7 64-bit VPN guide, which describes the steps required for setup. With this setup method, no VPN client needs to be installed in order for a connection to be established.

Linux users

If you are using an implementation of Linux other than Ubuntu you must use the generic Linux Client. You may need to modify the VPN Client to work with you particular flavour of Linux. Instructions can be found in the generic Linux guide.


Cisco IPSec VPN Client

The Cisco IPSec VPN Client is an alternative method of connecting to the university network from off-campus. Please attempt a connection with the Cisco AnyConnect client before trying Cisco IPSec VPN Client.



VPN - Connection Guide For Windows 8



This article explains how to install and use cVPN, the University of Chicago secure VPN, on a computer running Windows 8 Enterprise.

Windows 8 VPN Connection Guide

The first time you use the VPN, you must be logged into an admin account. If you do not have administrative rights on your computer you will not be able to download the software. Also, we recommend that you have the latest version of Java on your computer before installing the VPN. You can find out if you have the latest version and download a new version at www.java.com.

USING THE VPN FOR THE FIRST TIME

  1. From the Windows 8 Start screen, open a web browser by clicking on the program icon, or selecting it from the Desktop.
    27208-001.png

  2. Point your browser to https://download.uchicago.edu/vpn/anyconnect-win-3.1.02040-pre-deploy-k9.msi. We highly recommend using Firefox rather than Explorer as your browser.
    27208-002.png

  3. Save the file and double-click to run the install program.
    27208-003a

  4. Click Next on the welcome screen.
    27208-004.png

  5. Select the I accept radio button regarding the End-User License Agreement, then click Next.
    27208-005.png

  6. Click Install to begin the installation.
    27208-006.png

  7. Choose Yes if a dialog box appears asking permission to allow the program in install.
  8. Select Finish to exit the Setup Wizard.
    27208-007.png

  9. Click the lower left corner of the screen to return to the Start screen.
  10. Select the Cisco AnyConnect icon on the Start screen.
    27208-008.png

  11. Enter cvpn.uchicago.edu in the text field, then Connect.
    27208-009.png

  12. Log in with your CNetID and Password, then press OK.
    27208-010.png

  13. Press Accept.
    27208-011.png

  14. The Cisco AnyConnect VPN Client will be connected. To see details of the VPN connection, click the gear icon.
    27208-012.png

  15. To disconnect from the VPN, right-click the Cisco AnyConnect icon and select VPN Disconnect.
    27208-013.png
Subsequent times that you use the VPN:
  1. From the Windows 8 Start screen, select the Cisco AnyConnect Icon.
    27208-008.png

  2. Press Connect.
    27208-009.png

  3. Log in with your CNetID and Password, then press OK.
    27208-010.png

  4. Press Accept.
    27208-011.png

  5. The Cisco AnyConnect icon will display in the notification area (previously known as the system tray).anyconnecticon.png
For a full list of requirements and caveats, please visit Cisco's AnyConnect Release Notes webpage.

How can I access VPN? What Is VPN?


Table Of Contents

About VPN

In basic a virtual private network (VPN) is a secured connection between two computer systems. Basically it extends the CEU network to your home computer.

For more detailed information about VPN, visit the following sites:

VPN at CEU

CEU IT Department provides a service called VPN (Virtual Private Network) for all students, faculty and staff members of CEU, with active CEU account. With the help of this, you will be able to access the following resources:
Note: These websites are working only from CEU network, or with VPN connection.

Username and password

From now you DON'T have to request a VPN username and password. You can use your existing Novell username and password. If you already have a VPN account you can use it to log in. However you prefer to use your Novell username and password, please call HelpDesk (ext. 2000) to delete your old VPN account.

How can I access VPN?

  1. Open the Internet Explorer or any other browser.
  2. To the Address Bar type https://vpn.ceu.hu, then press the ENTER button.
  3. If you use Mozilla Firefox you will get this message. Click "Accept this certificate temporarily for this session" :
  4. If you get this message click Ok:
  5. If you use Internet Explorer you will get this message. Click on "Continue to this website":
  6. After that you will be at the login site:
  7. Enter your Novell login to the USERNAME field. When you are at the PASSWORD field a virtual keyboard will appear. Enter yourNovell password using the virtual keyboard.
  8. After the successful login you will see four buttons on the left side of the page.
    The buttons are:

    Here you will find the addresses of useful links (gw.ceu.hu, www.ceu.hu)

    Here you will find some useful applications. (It will be uploaded later)

    If you need a java based client which can connect to the vpn directly Click on this button and follow the instructions. After the installation you will find AnyConnect VPN client at the Start menu.
Do you want to be secure--I mean really secure--when you're on the Internet? If so, then you want a virtual private network.
A VPN creates a secure "tunnel" across the Internet between you and your office, a VPN provider, or your home. Why would you want that? Easy-to-use programs such as Firesheep make it easy for snoops to see what you're writing in your e-mail messages, posting to your Facebook page, or buying online. But with a VPN, you can surf the Web through that virtual tunnel, away from prying eyes, and your Internet traffic is encrypted.
Whether you just want to access Wi-Fi networks on the road without potentially exposing your activities to nosy strangers, or whether you need to enable a team of remote employees to handle business securely on the Internet, you can find a VPN to fit your needs. This guide will walk you through VPN essentials for beginners, power users, and IT departments.

VPN for Beginners

The easiest and least costly way to get a VPN service is to obtain one from your company, school, or organization. Not on the road often? Check with your IT department to see if they offer a VPN to all users. If they do, life is good: Just install the corporate VPN software, set it up, and you're ready to go. The next time you turn on your PC, fire up the VPN application before you start surfing the Web.
What if your IT department doesn't have a VPN--or what if you don't have an IT department? You're not out of luck. Lately, numerous VPN providers, including Banana VPNBlack LogicLogMeIn Hamachi, and StrongVPN, have started offering their services for a fee, generally from $15 to $20 a month. To learn more, take a look at a comparison ofthree personal VPN services.
How do you go about picking one? If a service has an online forum, check what their customers have posted. Call or e-mail to see if real people answer. Generally speaking, bigger is better. If they're a tiny company, that may be fine for you as an individual, but they probably can't give you the support a small company needs.
Is the privacy factor alone worth the effort? Yes, but VPNs offer other advantages as well. For example, if you're in Canada, ordinarily you can't watch a U.S. TV show on Hulu. But you can access the show if you use a VPN to obtain a U.S. IP (Internet Protocol) address.
Some VPN providers offer another benefit: anonymous Web browsing, which allows you to roam the Internet without being tracked. If your ISP blocks some applications, such asSkype or other VoIP (Voice over Internet Protocol) applications, you can use a VPN to get around the restrictions.
These VPN services may sound exactly like what you need. Beware, however: Not all services are created equal. If a service doesn't have enough VPN servers--technically, VPN concentrators--to support the number of customers, you may experience poor Internet speeds or be unable to make a connection at all.
So, before subscribing to a VPN service, look into what its customers say about it. Better still, if the company offers a free test period, take advantage of it before paying money for a service that may not meet your needs.

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
This guide provides detailed information about how you can use five computers to create a test lab with which to configure and test virtual private network (VPN) remote access with the Microsoft® Windows® XP Professional operating system with Service Pack 2 (SP2) and the 32-bit versions of the Microsoft Windows Server™ 2003 operating system with Service Pack 1 (SP1). These instructions are designed to take you step-by-step through the configuration required for a Point-to-Point Tunneling Protocol (PPTP) connection, a Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (L2TP/IPsec) connection, and a VPN connection that uses certificate-based Extensible Authentication Protocol-Transport Level Security (EAP-TLS) authentication.
noteNote
The following instructions are for configuring a test lab using a minimum number of computers. Individual computers are needed to separate the services provided on the network and to show the desired functionality clearly. This configuration is designed to reflect neither best practices nor a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network.

Setting Up the Test Lab for PPTP, L2TP/IPsec, and EAP-TLS Remote Access VPN Connections

The infrastructure for the VPN test lab network consists of five computers performing the following services:
  • A computer running Windows Server 2003 with SP1, Enterprise Edition, named DC1 that is acting as a domain controller, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, and a certification authority (CA).
  • A computer running Windows Server 2003 with SP1, Standard Edition, named IAS1 that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.
  • A computer running Windows Server 2003 with SP1, Standard Edition, named IIS1 that is acting as a Web and file server.
  • A computer running Windows Server 2003 with SP1, Standard Edition, named VPN1 that is acting as a VPN server. VPN1 has two network adapters installed.
  • A computer running Windows XP Professional with SP2 named CLIENT1 that is acting as a VPN client.
The following diagram shows the configuration of the VPN test lab.
VPN-based Remote Access Test Lab Configuration
There is a network segment representing a corporate intranet and a network segment representing the Internet. All computers on the corporate intranet are connected to a common hub or Layer 2 switch. All computers on the Internet are connected to a separate common hub or Layer 2 switch. Private addresses are used throughout the test lab configuration. The private network of 172.16.0.0/24 is used for the intranet. The private network of 10.0.0.0/24 is used for the simulated Internet. Windows Firewall is set up and configured on the RADIUS server (IAS1), the Web and file server (IIS1), and the client computer (CLIENT1). Windows Firewall should not be turned on or configured on either the domain controller (DC1) or the VPN server (VPN1). In addition, the Windows Firewall/Internet Connection Sharing (ICS) service should be disabled on VPN1.
IIS1 obtains its IP address configuration using DHCP. CLIENT1 uses DHCP for its IP address configuration; however, it is also configured with an alternate IP configuration so that it can be placed on either the intranet network segment or the simulated Internet. All other computers have a manual IP address configuration. There are no Windows Internet Name Service (WINS) servers present.
To reconstruct this test lab, configure the computers in the order presented, beginning with the PPTP-based remote access VPN connection. Additional sections of this guide describe L2TP/IPsec-based and EAP-TLS-based remote access VPN connections.

PPTP-based Remote Access VPN Connections

The following sections describe how to set up and configure each of the computers in the test lab for a PPTP-based remote access VPN connection. PPTP is typically used when there is no public key infrastructure (PKI) to issue computer certificates that are required for L2TP/IPsec connections.

DC1

DC1 is a computer running Windows Server 2003 with SP1, Enterprise Edition, that is providing the following services:
  • A domain controller for the example.com Active Directory® domain.
  • A DNS server for the example.com DNS domain.
  • A DHCP server for the intranet network segment
  • The enterprise root certification authority (CA) for the example.com domain.
noteNote
Windows Server 2003 with SP1, Enterprise Edition, is used so that autoenrollment of user certificates for EAP-TLS authentication can be configured. This is described in the "EAP-TLS-based Remote Access VPN Connections" section of this guide.
Configure DC1
  1. Install Windows Server 2003 with SP1, Enterprise Edition, as a stand-alone server.
  2. Configure the TCP/IP protocol with the IP address of 172.16.0.1 and the subnet mask of 255.255.255.0.
Configure DC1 as a domain controller
  1. To start the Active Directory Installation Wizard, click Start, click Run, type dcpromo, and then click OK.
  2. In the Welcome to the Active Directory Installation Wizard dialog box, click Next.
  3. In the Operating System Compatibility dialog box, click Next.
  4. Verify that Domain controller for a new domain option is selected, and then click Next.
  5. Verify that Domain in a new forest is selected, and then click Next.
  6. Verify that No, just install and configure DNS on this computer is selected, and then click Next.
  7. On the New Domain Name page, type example.com, and then click Next.
  8. On the NetBIOS Domain Name page, confirm that the Domain NetBIOS name is EXAMPLE, and then click Next.
  9. Accept the default Database and Log Folders directories, as shown in the following figure, and then click Next.
    Active Directory Database and Log Folders
  10. In the Shared System Volume dialog box, shown in the following figure, verify that the default folder location is correct. Click Next.
    Active Directory Shared System Volume
  11. On the Permissions page, verify that the Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems check box is selected, as shown in the following figure. Click Next.
    Active Directory Setup Permissions
  12. On the Directory Services Restore Mode Administration Password page, leave the passwords blank, and then click Next.
  13. Review the information that appears on the Summary page, and then click Next.
    Active Directory Setup Summary
  14. On the Completing the Active Directory Installation Wizard page, click Finish.
  15. When prompted to restart the computer, click Restart Now.
Raise the domain functional level
  1. Open the Active Directory Domains and Trusts snap-in from the Administrative Tools folder, and then right-click the domain computerdc1.example.com.
  2. Click Raise Domain Functional Level, select Windows Server 2003 on the Raise Domain Functional Level page, and then click Raise, as shown in the following figure.
    Raise Domain Functional Level dialog box
Install and configure DHCP
  1. In Control Panel, double-click Add or Remove Programs, and then install DHCP as a Networking Services component.
  2. Open the DHCP snap-in from the Administrative Tools folder.
  3. Click Action, and then click Authorize to authorize the DHCP service.
  4. In the console tree, right-click dc1.example.com, and then click New Scope.
  5. On the Welcome page of the New Scope Wizard, click Next.
  6. On the Scope Name page, type CorpNet in Name. This is shown in the following figure.
    Scope Name
  7. Click Next. On the IP Address Range page, type 172.16.0.10 in Start IP address172.16.0.100 in End IP address, and 24 in Length. This is shown in the following figure.
    IP Address Range
  8. Click Next. On the Add Exclusions page, click Next.
  9. On the Lease Duration page, click Next.
  10. On the Configure DHCP Options page, click Yes, I want to configure DHCP options now. This is shown in the following figure.
    Configure DHCP Options
  11. Click Next. On the Router (Default Gateway) page, click Next.
  12. On the Domain Name and DNS Servers page, type example.com in Parent domain. Type 172.16.0.1 in IP address, and then click Add. This is shown in the following figure.
    Domain Name and DNS Servers
  13. Click Next. On the WINS Servers page, click Next.
  14. On the Activate Scope page, click Yes, I want to activate this scope now. This is shown in the following figure.
    Activate Scope
  15. Click Next. On the Completing the New Scope Wizard page, click Finish.
Install Certificate Services
  1. In Control Panel, double-click Add or Remove Programs, and then install the Certificate Services component as an enterprise root CA with the nameExample CA.
  2. Select Enterprise root CA, as shown in the following figure, and then click Next.
    CA Type
  3. Type Example CA for the Common name for this CA, as shown in the following figure, and then click Next.
    CA Identifying Information
  4. Click Next to accept the default Certificate Database Settings shown in the following figure.
    Certificate Database Settings
  5. Click Finish.
Add computers, users, and groups to the domain
  1. Open the Active Directory Users and Computers snap-in.
  2. In the console tree, open example.com.
  3. Right-click Users, point to New, and then click Computer.
  4. In the New Object - Computer dialog box, type IAS1 in Computer name. This is shown in the following figure.
    New Object - Computer
  5. Click Next. In the Managed dialog box, click Next. In the New Object - Computer dialog box, click Finish.
  6. Use steps 3 through 5 to create additional computer accounts with the following names: IIS1VPN1, and CLIENT1.
  7. In the console tree, right-click Users, point to New, and then click User.
  8. In the New Object - User dialog box, type VPNUser in First name, and type VPNUser in User logon name. This is shown in the following figure.
    New Object - User
  9. Click Next.
  10. In the New Object - User dialog box, type a password of your choice in Password and Confirm password. Clear the User must change password at next logon check box and select the Password never expires check box. This is shown in the following figure.
    New Object - User password
  11. In the New Object - User dialog box, click Finish.
  12. In the console tree, right-click Users, point to New, and then click Group.
  13. In the New Object - Group dialog box, type VPNUsers in Group name, and then click OK. This is shown in the following figure.
    New Object - Group name
  14. In the details pane, double-click VPNUsers.
  15. Click the Members tab, and then click Add.
  16. In the Select Users, Contacts, Users, or Groups dialog box, type vpnuser in Enter the object names to select. This is shown in the following figure.
    Select Users, Contacts, Computers, or Groups
  17. Click OK. In the Multiple Names Found dialog box, click OK. The VPNUser user account is added to the VPNUsers group. This is shown in the following figure.
    VPN Users Properties
  18. Click OK to save changes to the VPNUsers group.

IAS1

IAS1 is a computer running Windows Server 2003 with SP1, Standard Edition, that is providing RADIUS authentication, authorization, and accounting for VPN1.
Configure IAS1 as a RADIUS server
  1. Install Windows Server 2003 with SP1, Standard Edition, as a member server named IAS1 in the example.com domain.
  2. For the intranet local area connection, configure the TCP/IP protocol with the IP address of 172.16.0.2, the subnet mask of 255.255.255.0, and the DNS server IP address of 172.16.0.1.
  3. In Control Panel, double-click Add or Remove Programs, and then install Internet Authentication Service as a Networking Services component.
  4. Open the Internet Authentication Service snap-in from the Administrative Tools folder.
  5. Right-click Internet Authentication Service, and then click Register Server in Active Directory. When the Register Internet Authentication Server in Active Directory dialog box appears, click OK. This is shown in the following figure.
    Register IA Service in Active Directory
  6. In the console tree, right-click RADIUS Clients, and then click New RADIUS Client.
  7. On the Name and Address page of the New RADIUS Client wizard, for Friendly name, type VPN1. In Client address (IP or DNS), type 172.16.0.4. This is shown in the following figure.
    New RADIUS Client
  8. Click Next. On the Additional Information page of the New RADIUS Client wizard, for Shared secret, type a shared secret for VPN1, and then type it again in Confirm shared secret. This is shown in the following figure.
    New RADIUS Client - Additional Information
  9. Click Finish.
  10. In the console tree, right-click Remote Access Policies, and then click New Remote Access Policy.
  11. On the Welcome to the New Remote Access Policy Wizard page, click Next.
  12. On the Policy Configuration Method page, type VPN remote access to intranet in Policy name. This is shown in the following figure.
    Policy Configuration Method
  13. Click Next. On the Access Method page, select VPN. This is shown in the following figure.
    Access Method
  14. Click Next. On the User or Group Access page, click Group. This is shown in the following figure.
    User or Group Access
  15. Click Add. In the Select Groups dialog box, click Locations, select example.com as the location, and then click OK.
  16. Type vpnusers in Enter the object names to select. This is shown in the following figure.
    Select Groups - Object Names
  17. Click OK. The VPNUsers group in the example.com domain is added to the list of groups on the User or Group Access page. This is shown in the following figure.
    User or Group Access - Group
  18. Click Next. On the Authentication Methods page, the Microsoft Encrypted Authentication version 2 (MS-CHAPv2) authentication protocol is selected by default. This is shown in the following figure.
    Authentication Methods
  19. Click Next. On the Policy Encryption Level page, clear the Basic encryption and Strong encryption check boxes, leaving only Strongest encryptionselected. This is shown in the following figure.
    Policy Encryption Level
  20. Click Next. On the Completing the New Remote Access Policy page, click Finish.
Configure Windows Firewall on IAS1
  1. In Control Panel, double-click Windows Firewall.
  2. In the Windows Firewall dialog box, click the Exceptions tab.
  3. Click Add Port, and in the Add a Port dialog box add the following port exceptions:
    noteNote
    You must click Add Port on the Exceptions tab for each port exception.

     

    NamePort NumberProtocol
    Legacy RADIUS
    1645
    UDP
    Legacy RADIUS
    1646
    UDP
    RADIUS Accounting
    1812
    UDP
    RADIUS Authentication
    1813
    UDP
  4. Verify that the four port exceptions that you added are selected on the Exceptions tab, as shown in the following example.
    IAS Firewall exceptions
  5. Click the Advanced tab, and then click Settings for Security Logging.
  6. In the Log Setting dialog box, select Log dropped packets and Log successful connections. Note the path and file name in Name.
    The log file allows you to see where connection errors occur, as well as which source and destination ports the errors occurred on. This log file should provide you with the information needed in case you need to add more ports to the exception list.
  7. Click OK twice to close Windows Firewall.

IIS1

IIS1 is a computer running Windows Server 2003 with SP1, Standard Edition, and Internet Information Services (IIS). It is providing Web and file server services for intranet clients. To configure IIS1 as a Web and file server and to configure Windows Firewall on IIS1, perform the following steps.
Configure IIS1 as a Web and file server
  1. Install Windows Server 2003 with SP1, Standard Edition, as a member server named IIS1 in the example.com domain.
  2. In Control Panel, double-click Add or Remove Programs, and then install Internet Information Services (IIS) as a subcomponent of the Application Server component in the Windows Components Wizard.
  3. On IIS1, use Windows Explorer to create a new share for the root folder of drive C using the share name ROOT with the default permissions.
  4. To determine whether the Web server is working correctly, run Internet Explorer on IAS1. If the Internet Connection Wizard prompts you, configure Internet connectivity for a LAN connection. In Internet Explorer, in Address, type http://IIS1.example.com/iisstart.htm. You should see a message saying the Web site is under construction.
  5. To determine whether file sharing is working correctly, on IAS1, click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the root folder of drive C on IIS1.
Configure Windows Firewall on IIS1
  1. In Control Panel, double-click Windows Firewall.
  2. In the Windows Firewall dialog box, click the Exceptions tab.
  3. Select File and Print Sharing, and then click Add Program.
  4. In the Add a Program dialog box, select Internet Explorer, and then click OK.
  5. Click Add a Port.
  6. In the Add a Port dialog box, type World Wide Web Publishing Service for the Name, type 80 for the Port number, select TCP as the type of traffic processed by the port, and then click OK.
  7. Verify that File and Print SharingInternet Explorer, and World Wide Web Publishing Service are all selected in the Exceptions dialog box, and then click the Advanced tab.
  8. Click Settings for Security Logging.
  9. In the Log Setting dialog box, select Log dropped packets and Log successful connections. Note the path and file name in Name.
  10. Click OK twice to close Windows Firewall.

VPN1

VPN1 is a computer running Windows Server 2003 with SP1, Standard Edition, that is providing VPN server services for Internet-based VPN clients.
Configure the VPN server
  1. Install Windows Server 2003 with SP1, Standard Edition, as a member server named VPN1 in the example.com domain.
  2. Open the Network Connections folder.
  3. For the intranet local area connection, rename the connection to CorpNet. For the Internet local area connection, rename the connection to Internet. This is shown in the following figure.
    Network Connections
  4. Configure the TCP/IP protocol for the CorpNet connection with the IP address of 172.16.0.4, the subnet mask of 255.255.255.0, and the DNS server IP address of 172.16.0.1.
  5. Configure the TCP/IP protocol for the Internet connection with the IP address of 10.0.0.2 and the subnet mask of 255.255.255.0.
Windows Firewall and Routing and Remote Access cannot run simultaneously on VPN1. If Windows Firewall is turned on, you will need to turn it off; if the Windows Firewall/Internet Connection Sharing (ICS) service has started or is set to automatic before you configure Routing and Remote Access, you must disable it.
Disable the Windows Firewall/Internet Connection Sharing (ICS) service
  1. Click Administrative Tools, and then click Services.
  2. In the Services details pane, right-click Windows Firewall/Internet Connection Sharing (ICS) service, and then click Properties.
  3. If the service Startup Type is either Automatic or Manual, change it to Disabled.
  4. Click OK to close the Windows Firewall/Internet Connection Sharing (ICS) dialog box, and then close the Services page.
Configure Routing and Remote Access
  1. Run the Routing and Remote Access snap-in from the Administrative Tools folder.
  2. In the console tree, right-click VPN1, then and click Configure and Enable Routing and Remote Access.
  3. On the Welcome to the Routing and Remote Access Server Setup Wizard page, click Next.
  4. On the Configuration page, Remote access (dial-up or VPN) is selected by default. This is shown in the following figure.
    Configuration
  5. Click Next. On the Remote Access page, select VPN. This is shown in the following figure.
    Art Image
  6. Click Next. On the VPN Connection page, click the Internet interface in Network interfaces. This is shown in the following figure.
    VPN Connection
  7. Click Next. On the IP Address Assignment page, Automatically is selected by default. This is shown in the following figure.
    IP Address Assignment
  8. Click Next. On the Managing Multiple Remote Access Servers page, click Yes, set up this server to work with a RADIUS server. This is shown in the following figure.
    Managing Multiple Remote Access Servers
  9. Click Next. On the RADIUS Server Selection page, type 172.16.0.2 in Primary RADIUS server and the shared secret in Shared secret. This is shown in the following figure.
    RADIUS Server Selection
  10. Click Next. On the Completing the Routing and Remote Access Server Setup Wizard page, click Finish.
  11. You are prompted with a message describing the need to configure the DHCP Relay Agent. This is shown in the following figure.
    Routing and Remote Access dialog box
  12. Click OK.
  13. In the console tree, open VPN1 (local), then IP Routing, and then DHCP Relay Agent. Right-click DHCP Relay Agent, and then click Properties.
  14. In the DHCP Relay Agent Properties dialog box, type 172.16.0.1 in Server address. This is shown in the following figure.
    DHCP Relay Agent Properties
  15. Click Add, and then click OK.

CLIENT1

CLIENT1 is a computer running Windows XP Professional with SP2 that is acting as a VPN client and gaining remote access to intranet resources across the simulated Internet.
Configure Client1 as a VPN client for a PPTP connection
  1. Connect CLIENT1 to the intranet network segment.
  2. On CLIENT1, install Windows XP Professional with SP2 as a member computer named CLIENT1 of the example.com domain.
    noteNote
    Installing Windows XP Professional with SP2 also installs and automatically turns on Windows Firewall. Leave Windows Firewall turned on for this scenario. You will not need to configure any port or program exceptions.
  3. Add the VPNUser account in the example.com domain to the local Administrators group.
  4. Log off and then log on using the VPNUser account in the example.com domain.
  5. In Control Panel, open the Network Connections folder, obtain properties on the Local Area Network connection, and then obtain properties on the Internet protocol (TCP/IP).
  6. Click the Alternate Configuration tab, and then click User configured.
  7. In IP address, type 10.0.0.1. In Subnet mask, type 255.255.255.0. This is shown in the following figure.
    Internet Protocol (TCP/IP) Properties
  8. Click OK to save changes to the TCP/IP properties. Click OK to save changes to the Local Area Network connection.
  9. Shut down the CLIENT1 computer.
  10. Disconnect CLIENT1 from the intranet network segment, and connect it to the simulated Internet network segment.
  11. Restart CLIENT1 and log on using the VPNUser account.
  12. On CLIENT1, in Control Panel, open the Network Connections folder.
  13. In Network Tasks, click Create a new connection.
  14. On the Welcome to the New Connection Wizard page of the New Connection Wizard, click Next.
  15. On the Network Connection Type page, click Connect to the network at my workplace. This is shown in the following figure.
    Network Connection Type
  16. Click Next. On the Network Connection page, click Virtual Private Network connection. This is shown in the following figure.
    Network Connection
  17. Click Next. On the Connection Name page, type PPTPtoCorpnet in Company Name. This is shown in the following figure.
    Connection Name
  18. Click Next. On the VPN Server Selection page, type 10.0.0.2 in Host name or IP address. This is shown in the following figure.
    VPN Server Selection
  19. Click Next. On the Connection Availability page, click Next.
  20. On the Completing the New Connection Wizard page, click Finish. The Connect PPTPtoCorpnet dialog box appears. This is shown in the following figure.
    Connect PPTPtoCorpnet
  21. Click Properties, and then click the Networking tab.
  22. On the Networking tab, in Type of VPN, click PPTP VPN. This is shown in the following figure.
    PPTPtoCorpnet Properties
  23. Click OK to save changes to the PPTPtoCorpnet connection. The Connect PPTPtoCorpnet dialog box appears.
  24. In User name, type example\VPNUser. In Password, type the password you chose for the VPNUser account.
  25. Click Connect.
  26. When the connection is complete, run Internet Explorer.
  27. If prompted by the Internet Connection Wizard, configure it for a LAN connection. In Address, type http://IIS1.example.com/iisstart.htm. You should see a message saying the Web page is under construction.
  28. Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the local drive (drive C) on IIS1.
  29. Right-click the PPTPtoCorpnet connection, and then click Disconnect.

L2TP/IPsec-based Remote Access VPN Connections

L2TP/IPsec-based remote access VPN connections require computer certificates on the VPN client and the VPN server. L2TP/IPsec is typically used when there are stronger requirements for security and a public key infrastructure (PKI) is in place to issue computer certificates to VPN clients and servers.

DC1

Configure DC1 for autoenrollment of computer certificates
  1. Open the Active Directory Users and Computers snap-in.
  2. In the console tree, double-click Active Directory Users and Computers, right-click the example.com domain, and then click Properties.
  3. On the Group Policy tab, click Default Domain Policy, and then click Edit.
  4. In the console tree, open Computer Configuration, open Windows Settings, open Security Settings, open Public Key Policies, and then openAutomatic Certificate Request Settings. This is shown in the following figure.
    Group Policy Object Editor
  5. Right-click Automatic Certificate Request Settings, point to New, and then click Automatic Certificate Request.
  6. On the Welcome to the Automatic Certificate Request Setup Wizard page, click Next.
  7. On the Certificate Template page, click Computer. This is shown in the following figure.
    Certificate Template
  8. Click Next. On the Completing the Automatic Certificate Request Setup Wizard page, click Finish. The Computer certificate type now appears in the details pane of the Group Policy Object Editor snap-in. This is shown in the following figure.
    Group Policy Editor
  9. Type gpupdate at a command prompt to update Group Policy on DC1.

VPN1

Update Group Policy on VPN1
  • To immediately update Group Policy and request a computer certificate, type gpupdate at a command prompt.
After updating VPN1 with the new certificates you need to stop and restart the IPsec Policy Agent and Routing and Remote Access services.
Restart IPsec Policy Agent and Routing and Remote Access
  1. Click Start, point to Administrative Tools, and then click Services.
  2. In the details pane, point to IPSEC Services, point to Action, and then click Restart.
  3. In the details pane, point to Routing and Remote Access, point to Action, and then click Restart.

CLIENT1

To obtain a computer certificate on CLIENT1 and then configure an L2TP/IPsec-based remote access VPN connection, perform the following steps.
Obtain a computer certificate and configure an L2TP/IPsec-based remote access VPN connection
  1. Shut down the CLIENT1 computer.
  2. Disconnect CLIENT1 from the simulated Internet network segment, and connect it to the intranet network segment.
  3. Restart CLIENT1 and log on using the VPNUser account. The computer and user Group Policy is automatically updated.
  4. Shut down CLIENT1.
  5. Disconnect CLIENT1 from the intranet network segment, and connect it to the simulated Internet network segment.
  6. Restart CLIENT1 and log on using the VPNUser account.
  7. On CLIENT1, in Control Panel, open the Network Connections folder.
  8. In Network Tasks, click Create a new connection.
  9. On the Welcome to the New Connection Wizard page of the New Connection Wizard, click Next.
  10. On the Network Connection Type page, click Connect to the network at my workplace. This is shown in the following figure.
    Group Policy Object Editor
  11. Click Next. On the Network Connection page, click Virtual Private Network connection. This is shown in the following figure.
    Network Connection
  12. Click Next. On the Connection Name page, type L2TPtoCorpnet in Company Name. This is shown in the following figure.
    Connection Name
  13. Click Next. On the Public Network page, click Do not dial the initial connection. This is shown in the following figure.
    Public Network
  14. Click Next. On the VPN Server Selection page, type 10.0.0.2 in Host name or IP address. This is shown in the following figure.
    VPN Server Selection
  15. Click Next. On the Connection Availability page, click Next.
  16. On the Completing the New Connection Wizard page, click Finish. The Connect L2TPtoCorpnet dialog box appears. This is shown in the following figure.
    Connect L2TPtoCorpnet
  17. Click Properties, and then click the Networking tab.
  18. On the Networking tab, in Type of VPN, click L2TP IPSec VPN. This is shown in the following figure.
    L2TPtoCorpnet Properties
  19. Click OK to save changes to the L2TPtoCorpnet connection. The Connect L2TPtoCorpnet dialog box appears.
  20. In User name, type example\VPNUser. In Password, type the password you chose for the VPNUser account.
  21. Click Connect.
  22. When the connection is established, run the Web browser.
  23. In Address, type http://IIS1.example.com/iisstart.htm. You should see a message saying the Web site is under construction.
  24. Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the local drive (drive C) on IIS1.
  25. Right-click the L2TPtoCorpnet connection, and then click Disconnect.

EAP-TLS-based Remote Access VPN Connections

EAP-TLS-based remote access VPN connections require a user certificate on the VPN client and a computer certificate on the IAS server. EAP-TLS is for authenticating your VPN connection with the most secure user-level authentication protocol. Locally installed user certificates, enabled in the following steps, make it easier to set up a test lab. In a production environment, it is recommended that you use smart cards, rather than locally installed user certificates, for EAP-TLS authentication.

DC1

Configure DC1 for autoenrollment of user certificates
  1. Click Start, click Run, type mmc, and then click OK.
  2. On the File menu, click Add/Remove Snap-in, and then click Add.
  3. Under Snap-in, double-click Certificate Templates, click Close, and then click OK.
  4. In the console tree, click Certificate Templates. All of the certificate templates will be displayed in the details pane. This is shown in the following figure.
    Console1 Certificate Templates
  5. In the details pane, click the User template.
  6. On the Action menu, click Duplicate Template.
  7. In the Template display name box, type VPNUser.
  8. Verify that the Publish Certificate in Active Directory check box is selected. This is shown in the following figure.
    Properties of New Template - General
  9. Click the Security tab.
  10. In the Group or user names list, click Domain Users.
  11. In the Permissions for Domain Users list, select the ReadEnroll, and Autoenroll check boxes so that these permissions are allowed. This is shown in the following figure.
    Properties of New Template - Security
  12. Click the Subject Name tab.
  13. Clear the Include E-mail name in subject name and E-mail name check boxes. Because you did not configure an e-mail name for the VPNUser user account, you must clear these check boxes to allow a user certificate to be issued. This is shown in the following figure.
    Art Image
  14. Click OK.
  15. Open the Certification Authority snap-in from the Administrative Tools folder.
  16. In the console tree, open Certification Authority, open Example CA, and then open Certificate Templates. This is shown in the following figure.
    Certificate Templates
  17. On the Action menu, point to New, and then click Certificate Template to Issue.
  18. Click VPNUser. This is shown in the following figure.
    Enable Certificate Templates VPNUser
  19. Click OK.
  20. Open the Active Directory Users and Computers snap-in.
  21. In the console tree, double-click Active Directory Users and Computers, right-click the example.com domain, and then click Properties.
  22. On the Group Policy tab, click Default Domain Policy, and then click Edit.
  23. In the console tree, open User Configuration, open Windows Settings, open Security Settings, and then open Public Key Policies. This is shown in the following figure.
    Public Key Policies
  24. In the details pane, double-click Autoenrollment Settings.
  25. Click Enroll certificates automatically. Select the Renew expired certificates, update pending certificates, and remove revoked certificates check box. Select the Update certificates that use certificate templates check box. This is shown in the following figure.
    Autoenrollment Settings Properties
  26. Click OK.

IAS1

Configure IAS1 with a computer certificate for EAP-TLS authentication
  1. Restart IAS1 to ensure that IAS1 has autoenrolled a computer certificate.
  2. Open the Internet Authentication Service snap-in.
  3. In the console tree, click Remote Access Policies.
  4. In the details pane, double-click VPN remote access to intranet. The VPN remote access to intranet Properties dialog box appears. This is shown in the following figure.
    VPN remote access to intranet Properties
  5. Click Edit Profile, and then click the Authentication tab. This is shown in the following figure.
    Edit Dial-in Profile
  6. On the Authentication tab, click EAP Methods. The Select EAP Providers dialog box appears. This is shown in the following figure.
    Select EAP Providers
  7. Click Add. The Add EAP dialog box appears. This is shown in the following figure.
    Add EAP
  8. Click Smart Card or other certificate, and then click OK.
  9. Click Edit. The Smart Card or other Certificate Properties dialog box appears. This is shown in the following figure.
    Smart Card or other Certificate Properties
  10. The properties of the computer certificate issued to the IAS1 computer are displayed. This step verifies that IAS1 has an acceptable computer certificate installed to perform EAP-TLS authentication. Click OK.
  11. Click OK to save changes to EAP providers. Click OK to save changes to the profile settings.
  12. When prompted to view help topics, click No. Click OK to save changes to the remote access policy.
These configuration changes will allow the VPN remote access to intranet remote access policy to authorize VPN connections using the EAP-TLS authentication method.

CLIENT1

Obtain a user certificate on CLIENT1, and then configure an EAP-TLS-based remote access VPN connection
  1. Shut down the CLIENT1 computer.
  2. Disconnect CLIENT1 from the simulated Internet network segment, and connect it to the intranet network segment.
  3. Restart CLIENT1 and log on using the VPNUser account. The computer and user Group Policy is automatically updated.
  4. Shut down CLIENT1.
  5. Disconnect CLIENT1 from the intranet network segment, and connect it to the simulated Internet network segment.
  6. Restart CLIENT1 and log on using the VPNUser account.
  7. On CLIENT1, in Control Panel, open the Network Connections folder.
  8. In Network Tasks, click Create a new connection.
  9. On the Welcome to the New Connection Wizard page of the New Connection Wizard, click Next.
  10. On the Network Connection Type page, click Connect to the network at my workplace.
  11. Click Next. On the Network Connection page, click Virtual Private Network connection.
  12. Click Next. On the Connection Name page, type EAPTLStoCorpnet in Company Name.
  13. Click Next. On the Public Network page, click Do not dial the initial connection.
  14. Click Next. On the VPN Server Selection page, type 10.0.0.2 in Host name or IP address.
  15. Click Next. On the Connection Availability page, click Next.
  16. On the Completing the New Connection Wizard page, click Finish. The Connect EAPTLStoCorpnet dialog box appears. This is shown in the following figure.
    Connect EAPTLStoCorpnet
  17. Click Properties, and then click the Security tab.
  18. On the Security tab, click Advanced, and then click Settings. The Advanced Security Settings dialog box appears.
  19. In the Advanced Security Settings dialog box, click Use Extensible Authentication Protocol (EAP). This is shown in the following figure.
    Advanced Security Settings
  20. Click Properties. In the Smart Card or other Certificate Properties dialog box, click Use a certificate on this computer. This is shown in the following figure.
    Use a certificate on this computer
  21. Click OK to save changes to the Smart Card or Other Certificate dialog box. Click OK to save changes to the Advanced Security Settings. Click OK to save changes to the Security tab. The connection is immediately initiated using the installed user certificate. The first time you try to connect, it may take several attempts to successfully make a connection.
  22. When the connection is successful, run the Web browser.
  23. In Address, type http://IIS1.example.com/iisstart.htm. You should see a message saying the Web site is under construction.
  24. Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the local drive (drive C) on IIS1.
  25. Right-click the EAPTLStoCorpnet connection, and then click Disconnect.

Summary

This guide described in detail the steps required to configure secure VPN remote access using PPTP, L2TP/IPsec, and EAP-TLS in a test lab with five computers simulating an organization intranet and the Internet.