Windows Server 2003 in a Nutshell
| Routing and Remote Access Tasks |
The RRAS console is used to configure WS2003 as a remote access server, VPN server, or basic NAT/firewall server. Unless otherwise specified, the tasks in this section assume that you have already opened the Routing and Remote Access console by:
Start
|
Configure and Enable Routing and Remote Access
In order to install and use the RRAS on a WS2003 computer so it can accept incoming connections from clients , you must first configure and enable the RRAS:
Right-click on server
This starts the RRAS Setup Wizard, which prompts you to choose a role for your remote access server. You can select from five different roles:
- Remote access (dial-up or VPN)
- Network address translation (NAT)
- Virtual Private Network (VPN) access and NAT
- Secure connection between two private networks
- Custom configuration
Once you've walked through the wizard and configured the RRAS, you can perform further configuration using steps outlined later in this topic. If you decide later that you want to change the role of your RRAS server, you can remove the existing configuration and then run the wizard again. To remove the existing configuration of a remote access server:
Right-click on server
Alternatively, you can reconfigure the settings on your server to assume a new role if you have a deep enough understanding of these settings. It's generally easier to rerun the wizard, however.
Let's look at enabling and configuring the RRAS using the wizard for each of the five roles the RRAS supports.
Remote Access (Dial-up or VPN)
Select this option to configure your server as a basic remote access server that can accept incoming connections from dial-up clients using a modem and/or VPN clients over the Internet. To configure a dial-up remote access server, do this:
Dial-up
To configure a VPN server, first make sure your server has at least two network interfaces and then do this:
VPN
You can also select both options together to create a hybrid VPN/dial-up remote access server.
Network Address Translation (NAT)
Select this option to configure your server as an Internet connection server that connects your private network to the Internet using NAT. You must have a public IP address in order to choose this option. The next steps of the wizard depend on the number of existing network interfaces configured on your machine. If your server has only one interface (for example, the Local Area Connection), then you can use the wizard to create a demand-dial interface to connect to the Internet using either a dial-up modem or dedicated broadband device such as a DSL router. Follow these steps:
Enable security on the selected interface using Internet Connection Firewall (ICF)
The Demand Dial Interface Wizard lets you choose between creating a dial-up VPN or broadband PPPoE (PPP over Ethernet) interface. If you choose VPN, specify the tunneling protocol used (PPTP or L2TP), the IP address of the remote router, and the connection credentials for the remote router. If you choose PPPoE, you specify the connection credentials for your service provider.
If you already have two interfaces on your machine (Local Area Connection and dial-up or broadband Internet connection), then follow these steps:
Select the network connection with a public IP address and connected to the Internet
At this point you can choose between the following two options:
- Basic name and address service
-
The RRAS assigns IP addresses automatically using Automatic Private IP Addressing (APIPA) and forwards DNS queries to your service provider's DNS server.
- Set up name and address service later
-
The RRAS uses Active Directory and DNS/DHCP servers on your network.
The first option is designed mainly for small office/home office (SOHO) use as it assigns IP addresses using APIPA instead of DHCP. Selecting this option does the following:
-
Configures your server's network adapter with the IP address 192.168.0.1 and subnet mask 255.255.255.0 with no default gateway.
-
Enables routing on your dial-up port so that computers on your LAN can connect to the Internet through your server. If your Internet connection is not a dedicated connection, such as a leased line, the wizard enables dial-on-demand for the outbound connection on the server.
-
Adds the NAT routing protocol and binds both the LAN and Internet interfaces on the server to the NAT protocol.
VPN Access and NAT
Select this option to configure your server as a VPN server using NAT. Make sure your server has at least two network interfaces and then do this:
Select interface connected to Internet
The VPN server will accept incoming connections from VPN clients using the WAN miniports (virtual ports) on the server.
Secure Connection Between Two Private Networks
Select this option to configure your server to connect with another network using your server as a router. If your server already has two network interfaces (a LAN and a WAN interface), choose No and, after running the wizard, ensure your WAN interface has suitable IP address settings (and configure routing protocols if required). If demand-dial routing will be used instead (typically for branch office connections) and you need to set up a new demand-dial interface, choose Yes and then follow these steps:
Select method for assigning IP addresses to clients (either DHCP or from a specified range of addresses)
If you choose VPN, specify the tunneling protocol used (PPTP or L2TP), the IP address of the remote router, and the connection credentials for the remote router. If you choose PPPoE, you specify the connection credentials for your service provider.
Custom Configuration
Select this option to create a plain vanilla RRAS server with one or more of the following services:
- VPN access
- Dial-up access
- Demand-dial connections
- NAT and basic firewall
- LAN routing
This starts the RRAS service on the server with all components installed. (See Routing and Remote AccessTools earlier in this chapter to see what the console tree looks like in this case.) You can then manually configure RRAS settings as desired.
Configure RRAS
The following are some of the more common tasks for configuring RRAS servers.
Enable Remote Access
Right-click on server
Selecting this option enables your server to accept connections from both dial-up and VPN clients.
Enable Routing
Right-click on server
You can choose between LAN routing only or LAN and demand-dial routing. LAN routing requires either two network adapters or a network adapter and a dedicated WAN device such as a CSU/DSU. Demand-dial routing requires a network adapter and a dial-up WAN device such as a modem or ISDN terminal adapter.
|
Configure Security on an RRAS Server
Right-click on server
You can configure security on a remote access server in a variety of ways. For example, your authentication provider, which determines how remote access clients are authenticated by your server, can be either:
- Windows Authentication
-
Authentication is performed by Active Directory.
- RADIUS Authentication
-
Authentication is performed by a RADIUS server. You can configure a WS2003 system as a RADIUS server by installing the optional Internet Authentication Service (IAS) component of WS2003.
Similarly, your accounting provider (which keeps track of remote access sessions and connection attempts) can be either:
- Windows Accounting
-
Connections are logged in the Remote Access Logs folder.
- RADIUS Accounting
-
Connections are logged by the RADIUS server.
Once you select your authentication and accounting providers, you can also configure which authentication protocols will be supported by your remote access server. Here's how to do this:
Right-click on server
By default, for added security, only MS-CHAP, MS-CHAPv2, and EAP are enabled on an RRAS server. If your clients can use only weaker authentication protocols, you must enable them here.
Configure IP Routing
Remote access servers can grant remote clients access to resources on either the remote access server alone or on any server in the local network. In the second case, the remote access server functions as a network gateway, allowing remote clients to access other servers on the LAN through the remote access server. To enable your server as a network gateway for an IP-based remote access server:
Right-click on server
Configure an IP Address Pool for Clients
Right-click on server
You should select addresses whose range forms a standard subnet since there is no option here for specifying the subnet mask. If you specify an address in a subnet that is different from the address of the LAN adapter of the server, you must add static routes to the server's routing table to enable the server to forward packets between the LAN and WAN connections (or you could enable an IP routing protocol on the server instead).
|
Configure Logging
To configure which remote access events will be logged in the System log:
Right-click on server
To configure settings for the IAS log file:
Expand server node
Enable Multilink
Right-click on server
If you are going to use Multilink (MP or BAP), you also need to specify the phone numbers for your device:
Expand server container
Enable Remote Access for a Device
Expand server container
The difference between a port and a device is:
- Port
-
A logical communications channel that supports a single point-to-point connection between two computers. A port can be considered a subdivision of a multiport device.
- Device
-
Either hardware (modem, DSL router, and so on) or software (WAN Miniport) that can be used to create a physical or logical point-to-point connection between two computers.
A WAN Miniport is a software driver that acts as a kind of virtual modem bank for VPN connections. When you enable the RRAS, Windows automatically creates 128 WAN Miniport virtual ports with 64 of PPTP type and 64 of L2TP type. These virtual ports are used to accept incoming connections from VPN clients. You can increase the number of virtual ports up to 1,000 to support more simultaneous connections from VPN clients by:
Expand server container
When a remote VPN client connects to your remote access server to establish a VPN connection with the server, it uses the highest-numbered virtual port available. The client first tries to connect to an L2TP port (which requires the client to have a digital certificate installed that the server can recognize) and, if this fails, it uses PPTP instead.
Configure a Remote Access Policy
You can either edit the existing default remote access policy or delete it and create a new one. To create a new remote access policy:
Right-click on Remote Access Policies container
The exact options in the wizard vary with the access method you select. An alternative approach is to set up a custom policy:
Right-click on Remote Access Policies container
When adding conditions to your policy, you can choose from numerous options. Some of the more common conditions you add might be:
- Calling Station ID
-
Specifies the remote client's phone number for callback-verification purposes
- Day and Time Restrictions
-
Indicates which days of the week and times of the day the policy will be applied
- Windows-Groups
-
Specifies which WS2003 domain-based (global or universal) groups the user must belong to in order for the policy to be applied
When deciding whether to grant or deny remote access based on your policy, remember that you can create multiple remote access policies with some granting access and others denying it. Policies are evaluated one at a time in the order in which they are listed until a policy is found that matches (doesn't conflict with) the user account and client connection settings.
The last step, Edit Profile, is optional and allows you to configure settings on six tabs:
- Dial-in Constraints
-
You can restrict the duration of user sessions if you have limited dial-in ports on your remote access server. It's also good to configure the connection to disconnect automatically if it is idle for more than about five minutes.
- IP
-
You should generally leave the IP Address Assignment Policy set to "Server settings define policy." Configuring packet filters is an extra layer of complexity that should be done carefully ; otherwise, connections may be accepted, but users will not be able to access the resources they need on the remote corporate network.
- Multilink
-
Multilink settings can be left at "Default to server settings." If you are short of modems, you can disable Multilink using this profile setting.
- Authentication
-
Try to specify only the most secure authentication protocols that your remote clients can negotiate. Select only Unauthenticated Access for direct computer connections using null-modem cables.
- Encryption
-
The encryption schemes you select here can be negotiated by the server with the client. If your clients are WS2003 computers and use VPN connections, then deselect No Encryption and Basic Encryption, leaving only Advanced selected. This will enable MPPE 56 to be used for data encryption.
- Advanced
-
These settings are typically used when RADIUS is implemented on your network and should not be modified for basic remote access.
Click Finish to create your new remote access policy. To further edit the policy, double-click on it. If you have multiple policies created, right-click on them and select Move Up or Move Down to change the order in which they are matched.
Grant Remote Access Permission to a User
Active Directory Users and Computers
You can choose to control access through a remote access policy only if you have all domain controllers running WS2003that is, if you are running in native mode. The same is true for assigning a static IP address to a remote access client.
Manage Remote Access Clients
Expand server node
You have two options:
-
Select Disconnect to immediately disconnect the remote VPN client. No warning message appears on the client's machine.
-
Select Send Message to send a brief message to the clientfor example, to warn the client that you are about to disconnect it. A dialog box will pop up on the client to display this message. You can also select Send To All to send a message to all connected clientsfor example, when you are going to take the VPN server offline for maintenance.
Monitor Connected Clients
If you select the Remote Access Clients container for your server in the console tree, the details pane displays the names of connected clients in the form domain\username , the time since the user connected, and the number of ports in use by the user (which is 1 unless it is a multilink connection). Note that the information in the details pane doesn't refresh automatically by default, so you should do the following:
Right-click on root node
You can display further information about a connected client by:
Right-click on user
This displays the username connected, bytes in and out and other network-traffic information, and the IP address given to the client. (If you have created a static IP pool on the server, then IP addresses are assigned to clients in round- robin order starting with the lowest available address, and a client that disconnects and then reconnects is assigned the next higher address above its previously assigned one.)
|
Add a Server
You can manage additional RRAS servers by:
Right-click on Server Status
Monitor RRAS
Select the Server Status node in the console tree to view the state of each server and the number of ports in use in the contents pane. Make sure the Details view is selected from the menu.