Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference)

The network infrastructure of the intranet is an important element of VPN design. Without proper design, VPN clients are unable to obtain proper IP addresses and resolve intranet names, and packets cannot be forwarded between VPN clients and intranet resources. Without proper access to and testing of these internal resources, connections from the server to the client will be completed but the clients will not be able to access any resources on the intranet.

Name Resolution

If you use DNS to resolve intranet host names or WINS to resolve intranet NetBIOS names, ensure that the VPN server is configured with the IP addresses of the appropriate internal DNS and WINS servers. To ensure proper name resolution for resources outside of the intranet, configure the internal DNS and WINS servers to query external ISP servers. This is an important design point—if you don’t do this, the VPN clients will not function properly. The VPN server should be configured with DNS and WINS servers manually. As part of the PPP negotiation process, the VPN clients receive the IP addresses of DNS and WINS servers. By default, the VPN clients inherit the DNS and WINS server addresses configured on the VPN server.

After the PPP connection negotiation is complete, Windows XP and Windows 2000 VPN clients send a DHCPInform message to the VPN server. The response is relayed back to the VPN client and contains a DNS domain name, additional DNS server addresses for DNS servers that were checked before the DNS server is configured through the PPP negotiation, and WINS server addresses that replace the WINS server addresses configured through the PPP negotiation. This communication is facilitated by the DHCP Relay Agent routing protocol component of the Routing And Remote Access service, which is automatically added by the Routing And Remote Access Server Setup Wizard.

If the VPN server is a DHCP client (that is, the VPN server is using DHCP to configure its intranet interfaces), the VPN server relays the DHCPInform messages to the DHCP server that was in use when the Routing And Remote Access Server Wizard was run. If the VPN server has a manual TCP/IP configuration on its intranet interface (the recommended option), the DHCP Relay Agent routing protocol component must be configured with the IP address of at least one DHCP server on your intranet. You can add DHCP server IP addresses to the DHCP Relay Agent routing protocol component on the General tab from the properties of the DHCP Relay Agent object under IP Routing in the Routing And Remote Access snap-in.

Design Point: Name Resolution by VPN Clients for Intranet Resources

Consider the following when configuring name resolution for remote access VPN clients:

Routing

By its very nature and purpose, the VPN server is an IP router. This is because it connects two or more network subnets—in this case, the Internet and the intranet—and, as such, must be properly configured with the set of routes that makes all locations reachable. Specifically, the VPN server needs the following:

To add a default route that points to the Internet, configure the Internet interface with a default gateway and then manually configure the intranet interface without a default gateway.

To add intranet routes to the routing table of the VPN server, you can:

Ensuring the reachability of VPN clients from the intranet depends on how you configure the VPN server to obtain IP addresses for VPN clients. The IP addresses assigned to VPN clients as they connect can be from:

If you are using an on-subnet address range, no additional routing configuration is required, as the VPN server acts as a proxy for all packets destined for VPN clients. Routers and hosts on the VPN server subnet forward packets destined to VPN clients to the VPN server, and the VPN server relays them to the appropriate VPN client.

If you are using an off-subnet address range, you must add the routes that summarize the off-subnet address range to the intranet routing infrastructure so that traffic destined to VPN clients is forwarded to the VPN server and then sent by the VPN server to the appropriate VPN client. To provide the best summarization of address ranges for routes, choose address ranges that can be expressed using a single prefix and subnet mask. For more information, see the topic “Expressing an IP Address Range with a Mask” in Help And Support Center for Windows Server 2003.

You can add the routes that summarize the off-subnet address range to the routing infrastructure of the intranet using the following methods:

If your intranet consists of a single subnet, you must either configure each intranet host for persistent routes of the off-subnet address range that point to the VPN server’s intranet interface or configure each intranet host with the VPN server as its default gateway. Therefore, we recommend that you use an on-subnet address pool for a SOHO network consisting of a single subnet.

VPN Client Routing and Simultaneous Intranet and Internet Access

By default, when a Windows-based VPN client makes a VPN connection, it automatically adds a new default route for the VPN connection and modifies the existing default route to have a higher metric, thus making the new default route the prevalent and preferred one. Adding the new default route means that all Internet locations (except the IP address of the tunnel server and locations based on other routes) become unreachable for the duration of the VPN connection.

To prevent the default route from being created, go to the Properties sheet for the Internet Protocol (TCP/IP) component of the VPN connection. Click Advanced. In the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use Default Gateway On Remote Network check box. When the Use Default Gateway On Remote Network check box is cleared, a default route is not created; however, a route corresponding to the Internet address class of the assigned IP address is created. For example, if the address assigned during the connection process is 10.0.12.119, the Windows 2000 or Windows XP VPN client creates a route for the class-based network ID 10.0.0.0 with the subnet mask 255.0.0.0.

Based on the Use Default Gateway On Remote Network setting, one of the following occurs when the VPN connection is active:

For most Internet-connected VPN clients, this behavior does not represent a problem because they are typically engaged in either intranet or Internet communication, not both.

For VPN clients who want concurrent access to intranet and Internet resources when the VPN connection is active, you can do one of the following:

From the client computer, you can determine your assigned IP address from the display of the Ipconfig command or by double-clicking the VPN connection in the Network Connections folder when the VPN connection is active. In the resulting Status dialog box, click the Details tab. The VPN client’s assigned IP address is listed as Client IP Address.

Design Point: Routing Infrastructure

Consider the following when configuring the routing infrastructure for remote access VPN connections:

Quarantine Resources

Network Access Quarantine Control, a new feature in the Windows Server 2003 family, delays normal remote access to a private network until the configuration of the remote access computer has been examined and validated by an administrator- provided script. When a remote access computer initiates a connection to a remote access server, the user is authenticated and the remote access computer is assigned an IP address. However, the connection is placed in quarantine mode, in which network access is limited. The administrator-provided script is run on the remote access computer. When the script notifies the remote access server that it has successfully run and the remote access computer complies with current network policies, quarantine mode is removed and the remote access computer is granted normal remote access. If the client computer does not pass quarantine, the server will drop the connection.

Quarantine resources consist of servers that a remote access client in quarantine mode can access to perform name resolution (DNS servers), to obtain the latest version of the script (file servers with anonymous access allowed), or to get instructions and components needed to make the remote access client comply with network policies (Web servers with anonymous access allowed).

For more information about deploying Network Access Quarantine Control, see Chapter 6.

Категории