VPN Server Configurator



Server
  1. SRX & J Series Site-to-Site VPN Configuration Generator. Junos ScreenOS Junos Space All Downloads. Popular Platform Downloads.
  2. Oct 10, 2017 In the Routing and Remote Access Server Setup Wizard window, you need to select Custom Configuration, as highlighted in the screen below. Next, select the VPN access to enable it on the server and click on Next button.

Apr 04, 2018 Select the option to use your Internet connection to connect to the VPN. Enter the domain or IP address of your VPN Server (the public IP address of the DD-WRT router configured above) and give a title to the VPN connection. Enter the credentials for your VPN login which was configured in the DD-WRT router settings. The ID VPN Server Configurator is used to open a configuration file on the client VPN Configurator or to restore settings from a file on the VPN Server. Select the number of computers that will connect to the VPN Server Mac OS X.

This is the third post in my series on setting up a basic Always On VPN deployment. In this post I will be covering the configuration of the VPN server and the NPS server. I will also talk about the network and firewall configuration. Links to each individual post in this series can be found below.

Always On VPN – Basic Deployment Guide
Always On VPN – Certificates and Active Directory
Always On VPN – User Tunnel
Always On VPN – Device Tunnel
Always On VPN – Troubleshooting

The VPN Server

In this deployment, the role of the VPN server will be filled by Windows Server 2019 running the Routing and Remote Access Server role. This post will provide instructions for both domain-joined and non-domain-joined VPN servers. For the best security, the recommendation is to not join the VPN server to the internal AD domain.

Network Placement

The server will be located in a perimeter network. If a perimeter network or DMZ is not available, the server could be placed on a separate VLAN where access to the rest of the corporate network is controlled by ACLs. The server could also be placed directly on the corporate network, but this is the least secure option.

Network Configuration

The server will have 2 network adapters, 1 internet facing adapter and 1 intranet facing adapter.

  • External Adapter
    • Assigned a static IP Address and Gateway IP
    • Only the IPv4 and IPv6 protocols should be enabled
  • Internal Adapter
    • Assigned a static IP Address
  • Additional Notes
    • The IP addresses assigned to the adapters must be from different subnets
    • The gateway IP should only be configured on the external adapter
      • Access to internal resources should be configured using static routes
  • If the VPN server is domain-joined, the DNS servers should be specified on the internal adapter
    • While this guide assumes a dual-interface configuration, it is possible to configure the VPN server with a single network interface. For more information about network interface configuration on the VPN server, refer to this post.

Firewall Configuration

  • Traffic allowed from the internet facing firewall to the external network adapter of the VPN server
    • If using IKEv2
      • UDP 500 (IKE)
      • UDP 4500 (IPSec NAT Traversal)
    • If using SSTP
      • TCP 443 (SSL)
  • Traffic allowed to and from the internal network adapter of the VPN server to the internal network
    • UDP 1812 (RADIUS Authentication)
    • UDP 1813 (RADIUS Accounting)
      • RADIUS traffic can also use UDP 1645 and UDP 1646, however, these are legacy ports and should not be needed when using modern clients and servers

If the VPN server is domain-joined, the server will need to be able to communicate with a domain controller. If there is not a read-only domain controller in the perimeter network, then these ports will need to be opened to domain controller on the internal network. Note that this is a potential security risk.

  • TCP and UDP53 (DNS)
  • TCP and UDP 88 (Kerberos)
  • TCP 135 (RPC Endpoint Mapper)
  • TCP and UDP 389 (LDAP)
  • TCP 445 (SMB)
  • TCP 636 (LDAPS)
  • TCP 3268 (LDAP GC)
  • TCP 3269 (LDAPS GC)

Feature Installation and Configuration

Malata laptops & desktops driver. These steps will walk through the installation and configuration of the Routing and Remote Access Server role. These steps should be preformed on the VPN server.

  • Open an administrative PowerShell window and run this command to install the Routing and Remote Access Server role
  • Open the Server Manager and click Open the Getting Started Wizard
    • A refresh of the server manager may be required for the notification to appear
  • In the Configure Remote Access window that opens, select Deploy VPN only
  • The Routing and Remote Access console should now be open
  • Right click on the VPN server and select Configure and Enable Routing and Remote Access
  • The Routing and Remote Access Server Setup Wizard should open
    • At the Welcome page, click Next
    • Select Custom configuration and click Next
    • Select VPN access and click Next
    • Click Finish to complete the setup wizard
    • When prompted to start the Routing and Remote Access service, click Start service
      • If no prompt to start the service appears, right click on the VPN server, select All Tasks, and click Start
  • Right click on the VPN server and select Properties
    • Security tab
      • Change the Authentication provider to RADIUS Authentication and click Configure
        • In the window that opens, click Add
        • Enter the FQDN of the NPS server
        • Enter a shared secret
          • This should be a long random string of characters. Save this password somewhere safe. It will be needed again during the NPS server configuration
        • Optionally change the time-out or port settings and click OK twice
      • Optionally change the Accounting provider
    • IPv4 tab
      • Choose to use DHCP or a static address pool for allocating IP addresses
        • If using DHCP, ensure an IP Helper and firewall rules have been created to allow clients to find and communicate with the DHCP server.
        • If using a static address pool, ensure the IP addresses have been excluded from being used by the DHCP server
      • Set the adapter to the internal network interface
  • Click OK to close the Properties window
  • In the Routing and Remote Access console, right click on Ports and select Properties
  • Select WAN Miniport (IKEv2) and click Configure
    • Ensure Remote access connections (inbound only) is checked
    • Ensure Demand-dial routing connections (inbound and outbound) is checked
    • Optionally modify the maximum ports setting and click OK
  • Configure the other unused RAS/Routing ports (L2TP, PPTP, SSTP)
    • Uncheck both checkboxes

This concludes the main setup of the Routing and Remote Access role. However, there are additional steps that can be done to improve security as well as add support for device tunnels.

Improve IKEv2 Security

The default security settings for an IKEv2 connection in the Routing and Remote Access configuration are not as good as they could be. The settings used for the IKEv2 connections can be set to a more secure level on the server. If these settings are set on the server, the same settings will need to be configured on the client side before the tunnel will connect.

  • Connect to the VPN server and open an administrative PowerShell window
  • Run this command to update the IPsec security parameters for IKEv2
  • Restart the Remote Access Management service to allow the changes to take effect

This PowerShell command is sourced from this post.

Enable IKEv2 Fragmentation

It’s possible that the IKEv2 traffic can be split apart if the IP packets are too large. Windows 10 will support IKEv2 fragmentation by default, however this support needs to be manually enabled in Windows Server. Note that this feature only works in Windows Server 1803 and newer. To enable support for IKEv2 fragmentation, run this PowerShell command:

To read more about IKEv2 fragmentation, refer to this post.

Enable Support for Device Tunnels

The default configuration of the Routing and Remote Access server role does not allow machine certificate authentication. If device tunnels will be used, this needs to be enabled.

  • Connect to the VPN server and open an administrative PowerShell window
  • Run this script to enable machine certificate authentication
    • Modify the first line of the script with the common name of the root CA before running the script

This PowerShell script is sourced from this page.

The NPS Server

In this deployment, the role of the NPS server will be filled by Windows Server 2019 running the Network Policy Server role. This server should be domain-joined.

Network Placement and Configuration

The server will be located behind the internal firewall on the internal network. The server should have a single network adapter with a static IP address or a DHCP reservation.

Firewall Configuration

The following ports should be allowed through the internal firewall and the Windows firewall between the VPN server and the NPS server.

  • UDP 1812 (RADIUS Authentication)
  • UDP 1813 (RADIUS Accounting)
    • RADIUS traffic can also use UDP 1645 and UDP 1646, however, these are legacy ports and should not be needed when using modern clients and servers

Windows Server 2019 has a bug where the Windows Firewall rules for the NPS role will appear as active but not actually be working. If communication on these ports does not seem to be making it through the Windows Firewall, open an administrative command prompt and run this command.

For more information about this bug and the solution, see this post.

Feature Installation and Configuration

These steps will walk through the installation and configuration of the Network Policy Server role. These steps should be preformed on the NPS server.

  • Open an administrative PowerShell window and run this command to install the Network Policy Server role
  • Open the Network Policy Server console
  • Right click on the NPS server and select Register server in Active Directory
    • Click OK at the confirmation dialog and again at the success dialog
  • In the Network Policy Server console, expand RADIUS Clients and Servers
  • Right click on RADIUS Clients and select New
  • Ensure Enable this RADIUS client is checked
  • In the Friendly name box, enter the name of the VPN server
  • In the Address (IP or DNS) box, enter the IP address of the internal network interface on the VPN server
  • Shared Secret
    • Ensure the Manual box is checked
    • Enter the Shared Secret that was created during the VPN server setup
  • Click OK to close the window
  • Select the RADIUS server, ensure RADIUS server for Dial-Up or VPN Connections is selected, and click Configure VPN or Dial-Up
  • In the window that appears, select Virtual Private Network (VPN) Connections and click Next
  • Select the VPN server and click Next
  • On the Authentication Methods page
    • Uncheck Microsoft Encrypted Authentication version 2 (MS-CHAPv2)
    • Check Extensible Authentication Protocol
    • Set the Type to Microsoft: Protected EAP (PEAP)
    • Click Configure
      • Select Secured password (EAP-MSCHAP v2) and click Remove
      • Click Add, select Smart Card or other certificate, and click OK
      • Click Next
  • At the User Groups page
    • Click Add and select the AOVPN Users AD group
    • Click Next
  • At the IP Filters page, click Next
  • At the Encryption Settings page, click Next
  • At the Realm Name page, click Next
  • Click Finish to complete the wizard

This completes the VPN and NPS server configuration portion of the deployment. The next post in the series is Always On VPN – User Tunnel.

-->

This step-by-step article describes how to install virtual private networking (VPN) and how to create a new VPN connection in servers that are running Windows Server 2003.

For a Microsoft Windows XP version of this article, see 314076.

Original product version: Windows Server 2003
Original KB number: 323441

Summary

With a virtual private network, you can connect network components through another network, such as the Internet. You can make your Windows Server 2003-based computer a remote-access server so that other users can connect to it by using VPN, and then they can log on to the network and access shared resources. VPNs do this by 'tunneling' through the Internet or through another public network in a manner that provides the same security and features as a private network. Data is sent across the public network by using its routing infrastructure, but to the user, it appears as if the data is sent over a dedicated private link.

Overview of VPN

A virtual private network is a means of connecting to a private network (such as your office network) by way of a public network (such as the Internet). A VPN combines the virtues of a dial-up connection to a dial-up server with the ease and flexibility of an Internet connection. By using an Internet connection, you can travel worldwide and still, in most places, connect to your office with a local call to the nearest Internet-access phone number. If you have a high-speed Internet connection (such as cable or DSL) at your computer and at your office, you can communicate with your office at full Internet speed, which is much faster than any dial-up connection that uses an analog modem. This technology allows an enterprise to connect to its branch offices or to other companies over a public network while maintaining secure communications. The VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link.

Virtual private networks use authenticated links to make sure that only authorized users can connect to your network. To make sure data is secure as it travels over the public network, a VPN connection uses Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP) to encrypt data.

Components of a VPN

A VPN in servers running Windows Server 2003 is made up of a VPN server, a VPN client, a VPN connection (that portion of the connection in which the data is encrypted), and the tunnel (that portion of the connection in which the data is encapsulated). The tunneling is completed through one of the tunneling protocols included with servers running Windows Server 2003, both of which are installed with Routing and Remote Access. The Routing and Remote Access service is installed automatically during the installation of Windows Server 2003. By default, however, the Routing and Remote Access service is turned off.

The two tunneling protocols included with Windows are:

  • Point-to-Point Tunneling Protocol (PPTP): Provides data encryption using Microsoft Point-to-Point Encryption.
  • Layer Two Tunneling Protocol (L2TP): Provides data encryption, authentication, and integrity using IPSec.

Your connection to the Internet must use a dedicated line such as T1, Fractional T1, or Frame Relay. The WAN adapter must be configured with the IP address and subnet mask assigned for your domain or supplied by an Internet service provider (ISP). The WAN adapter must also be configured as the default gateway of the ISP router.

Note

To turn on VPN, you must be logged on using an account that has administrative rights.

Vpn server configurator for mac

How to install and turn on a VPN server

To install and turn on a VPN server, follow these steps:

Vpn Server Configurator For Mac

  1. Click Start, point to Administrative Tools, and then click Routing and Remote Access.

  2. Click the server icon that matches the local server name in the left pane of the console. If the icon has a red circle in the lower-left corner, the Routing and Remote Access service hasn't been turned on. If the icon has a green arrow pointing up in the lower-left corner, the Routing and Remote Access service has been turned on. If the Routing and Remote Access service was previously turn on, you may want to reconfigure the server. To reconfigure the server:

    1. Right-click the server object, and then click Disable Routing and Remote Access. Click Yes to continue when you're prompted with an informational message.
    2. Right-click the server icon, and then click Configure and Enable Routing and Remote Access to start the Routing and Remote Access Server Setup Wizard. Click Next to continue.
    3. Click Remote access (dial-up or VPN) to turn on remote computers to dial in or connect to this network through the Internet. Click Next to continue.
  3. Click to select VPN or Dial-up depending on the role that you intend to assign to this server.

  4. In the VPN Connection window, click the network interface that is connected to the Internet, and then click Next.

  5. In the IP Address Assignment window, click Automatically if a DHCP server will be used to assign addresses to remote clients, or click From a specified range of addresses if remote clients must only be given an address from a pre-defined pool. In most cases, the DHCP option is simpler to administer. However, if DHCP isn't available, you must specify a range of static addresses. Click Next to continue.

  6. If you clicked From a specified range of addresses, the Address Range Assignment dialog box opens. Click New. Type the first IP address in the range of addresses that you want to use in the Start IP address box. Type the last IP address in the range in the End IP address box. Windows calculates the number of addresses automatically. Click OK to return to the Address Range Assignment window. Click Next to continue.

  7. Accept the default setting of No, use Routing and Remote Access to authenticate connection requests, and then click Next to continue. Click Finish to turn on the Routing and Remote Access service and to configure the server as a Remote Access server.

How to configure the VPN server

To continue to configure the VPN server as required, follow these steps.

How to configure the remote access server as a router

For the remote access server to forward traffic properly inside your network, you must configure it as a router with either static routes or routing protocols, so that all of the locations in the intranet are reachable from the remote access server.

To configure the server as a router:

  1. Click Start, point to Administrative Tools, and then click Routing and Remote Access.
  2. Right-click the server name, and then click Properties.
  3. Click the General tab, and then click to select Router under Enable this computer as a.
  4. Click LAN and demand-dial routing, and then click OK to close the Properties dialog box.
Server

How to modify the number of simultaneous connections

The number of dial-up modem connections is dependent on the number of modems that are installed on the server. For example, if you have only one modem installed on the server, you can have only one modem connection at a time.

The number of dial-up VPN connections is dependent on the number of simultaneous users whom you want to permit. By default, when you run the procedure described in this article, you permit 128 connections. To change the number of simultaneous connections, follow these steps:

  1. Click Start, point to Administrative Tools, and then click Routing and Remote Access.
  2. Double-click the server object, right-click Ports, and then click Properties.
  3. In the Ports Properties dialog box, click WAN Miniport (PPTP) > Configure.
  4. In the Maximum ports box, type the number of VPN connections that you want to permit.
  5. Click OK > OK, and then close Routing and Remote Access.

How to manage addresses and name servers

The VPN server must have IP addresses available to assign them to the VPN server's virtual interface and to VPN clients during the IP Control Protocol (IPCP) negotiation phase of the connection process. The IP address assigned to the VPN client is assigned to the virtual interface of the VPN client.

For Windows Server 2003-based VPN servers, the IP addresses assigned to VPN clients are obtained through DHCP by default. You can also configure a static IP address pool. The VPN server must also be configured with name resolution servers, typically DNS, and WINS server addresses, to assign to the VPN client during IPCP negotiation.

How to manage access

Configure the dial-in properties on user accounts and remote access policies to manage access for dial-up networking and VPN connections.

Note

By default, users are denied access to dial-up networking.

Access by user account

To grant dial-in access to a user account if you're managing remote access on a user basis, follow these steps:

Home Vpn

  1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
  2. Right-click the user account, and then click Properties.
  3. Click the Dial-in tab.
  4. Click Allow access to grant the user permission to dial in. Click OK.

Access by group membership

If you manage remote access on a group basis, follow these steps:

Vpn Server Configurator 2.6.1

  1. Create a group with members who are permitted to create VPN connections.
  2. Click Start, point to Administrative Tools, and then click Routing and Remote Access.
  3. In the console tree, expand Routing and Remote Access, expand the server name, and then click Remote Access Policies.
  4. Right-click anywhere in the right pane, point to New, and then click Remote Access Policy.
  5. Click Next, type the policy name, and then click Next.
  6. Click VPN for Virtual Private Access access method, or click Dial-up for dial-up access, and then click Next.
  7. Click Add, type the name of the group that you created in step 1, and then click Next.
  8. Follow the on-screen instructions to complete the wizard.

If the VPN server already permits dial-up networking remote access services, do not delete the default policy. Instead, move it so that it is the last policy to be evaluated.

How to configure a VPN connection from a client computer

To set up a connection to a VPN, follow these steps. To set up a client for virtual private network access, follow these steps on the client workstation:

Note

Unified Server Configurator

You must be logged on as a member of the Administrators group to follow these steps.

Because there are several versions of Microsoft Windows, the following steps may be different on your computer. If they are, see your product documentation to complete these steps.

  1. On the client computer, confirm that the connection to the Internet is correctly configured.

  2. Click Start > Control Panel > Network Connections. Click Create a new connection under Network Tasks, and then click Next.

  3. Click Connect to the network at my workplace to create the dial-up connection. Click Next to continue.

  4. Click Virtual Private Network connection, and then click Next.

  5. Type a descriptive name for this connection in the Company name dialog box, and then click Next.

  6. Click Do not dial the initial connection if the computer is permanently connected to the Internet. If the computer connects to the Internet through an Internet Service Provider (ISP), click Automatically dial this initial connection, and then click the name of the connection to the ISP. Click Next.

  7. Type the IP address or the host name of the VPN server computer (for example, VPNServer.SampleDomain.com).

  8. Click Anyone's use if you want to permit any user who logs on to the workstation to have access to this dial-up connection. Click My use only if you want this connection to be available only to the currently logged-on user. Click Next.

  9. Click Finish to save the connection.

  10. Click Start > Control Panel > Network Connections.

  11. Double-click the new connection.

  12. Click Properties to continue to configure options for the connection. To continue to configure options for the connection, follow these steps:

    • If you're connecting to a domain, click the Options tab, and then click to select the Include Windows logon domain check box to specify whether to request Windows Server 2003 logon domain information before trying to connect.
    • If you want the connection to be redialed if the line is dropped, click the Options tab, and then click to select the Redial if line is dropped check box.

Vpn Server Configurator

To use the connection, follow these steps:

  1. Click Start, point to Connect to, and then click the new connection.

  2. If you don't currently have a connection to the Internet, Windows offers to connect to the Internet.

  3. When the connection to the Internet is made, the VPN server prompts you for your user name and password. Type your user name and password, and then click Connect. Your network resources must be available to you in the same way they're when you connect directly to the network.

    Note

    To disconnect from the VPN, right-click the connection icon, and then click Disconnect.

Troubleshooting

Troubleshooting remote access VPNs

Can't establish a remote access VPN connection

  • Cause: The name of the client computer is the same as the name of another computer on the network.

    Solution: Verify that the names of all computers on the network and computers connecting to the network are using unique computer names.

  • Cause: The Routing and Remote Access service isn't started on the VPN server.

    Solution: Verify the state of the Routing and Remote Access service on the VPN server.

    For more information about how to monitor the Routing and Remote Access service, and how to start and stop the Routing and Remote Access service, see Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: Remote access isn't turned on the VPN server.

    Solution: Turn on remote access on the VPN server.

    For more information about how to turn on the remote access server, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: PPTP or L2TP ports aren't turned on for inbound remote access requests.

    Solution: Turn on PPTP or L2TP ports, or both, for inbound remote access requests.

    For more information about how to configure ports for remote access, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The LAN protocols used by the VPN clients aren't turned on for remote access on the VPN server.

    Solution: Turn on the LAN protocols used by the VPN clients for remote access on the VPN server.

    For more information about how to view properties of the remote access server, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: All of the PPTP or L2TP ports on the VPN server are already being used by currently connected remote access clients or demand-dial routers.

    Solution: Verify that all of the PPTP or L2TP ports on the VPN server are already being used. To do so, click Ports in Routing and Remote Access. If the number of PPTP or L2TP ports permitted isn't high enough, change the number of PPTP or L2TP ports to permit more concurrent connections.

    For more information about how to add PPTP or L2TP ports, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN server doesn't support the tunneling protocol of the VPN client.

    By default, Windows Server 2003 remote access VPN clients use the Automatic server type option, which means that they try to establish an L2TP over IPSec-based VPN connection first, and then they try to establish a PPTP-based VPN connection. If VPN clients use either the Point-to-Point Tunneling Protocol (PPTP) or Layer-2 Tunneling Protocol (L2TP) server type option, verify that the selected tunneling protocol is supported by the VPN server.

    By default, a computer running Windows Server 2003 Server and the Routing and Remote Access service is a PPTP and L2TP server with five L2TP ports and five PPTP ports. To create a PPTP-only server, set the number of L2TP ports to zero. To create an L2TP-only server, set the number of PPTP ports to zero.

    Solution: Verify that the appropriate number of PPTP or L2TP ports is configured.

    For more information about how to add PPTP or L2TP ports, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN client and the VPN server in conjunction with a remote access policy aren't configured to use at least one common authentication method.

    Solution: Configure the VPN client and the VPN server in conjunction with a remote access policy to use at least one common authentication method.

    For more information about how to configure authentication, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN client and the VPN server in conjunction with a remote access policy aren't configured to use at least one common encryption method.

    Solution: Configure the VPN client and the VPN server in conjunction with a remote access policy to use at least one common encryption method.

    For more information about how to configure encryption, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN connection doesn't have the appropriate permissions through dial-in properties of the user account and remote access policies.

    Solution: Verify that the VPN connection has the appropriate permissions through dial-in properties of the user account and remote access policies. For the connection to be established, the settings of the connection attempt must:

    • Match all of the conditions of at least one remote access policy.
    • Be granted remote access permission through the user account (set to Allow access) or through the user account (set to Control access through Remote Access Policy) and the remote access permission of the matching remote access policy (set to Grant remote access permission).
    • Match all the settings of the profile.
    • Match all the settings of the dial-in properties of the user account.

    For more information about an introduction to remote access policies, and how to accept a connection attempt, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The settings of the remote access policy profile are in conflict with properties of the VPN server.

    The properties of the remote access policy profile and the properties of the VPN server both contain settings for:

    • Multilink.
    • Bandwidth allocation protocol (BAP).
    • Authentication protocols.

    If the settings of the profile of the matching remote access policy are in conflict with the settings of the VPN server, the connection attempt is rejected. For example, if the matching remote access policy profile specifies that the Extensible Authentication Protocol - Transport Level Security (EAP-TLS) authentication protocol must be used and EAP isn't enabled on the VPN server, the connection attempt is rejected.

    Solution: Verify that the settings of the remote access policy profile aren't in conflict with properties of the VPN server.

    For more information about multilink, BAP, and authentication protocols, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The answering router can't validate the credentials of the calling router (user name, password, and domain name).

    Solution: Verify that the credentials of the VPN client (user name, password, and domain name) are correct and can be validated by the VPN server.

  • Cause: There aren't enough addresses in the static IP address pool.

    Solution: If the VPN server is configured with a static IP address pool, verify that there are enough addresses in the pool. If all of the addresses in the static pool have been allocated to connected VPN clients, the VPN server can't allocate an IP address, and the connection attempt is rejected. If all of the addresses in the static pool have been allocated, modify the pool.

    For more information about TCP/IP and remote access, and how to create a static IP address pool, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN client is configured to request its own IPX node number and the VPN server isn't configured to permit IPX clients to request their own IPX node number.

    Solution: Configure the VPN server to permit IPX clients to request their own IPX node number.

    For more information about IPX and remote access, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN server is configured with a range of IPX network numbers that are being used elsewhere on your IPX network.

    Solution: Configure the VPN server with a range of IPX network numbers that is unique to your IPX network.

    For more information about IPX and remote access, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The authentication provider of the VPN server is improperly configured.

    Solution: Verify the configuration of the authentication provider. You can configure the VPN server to use either Windows Server 2003 or Remote Authentication Dial-In User Service (RADIUS) to authenticate the credentials of the VPN client.

    For more information about authentication and accounting providers, see the Windows Server 2003 Help and Support Center, and how to use RADIUS authentication. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN server can't access Active Directory.

    Solution: For a VPN server that is a member server in a mixed-mode or native-mode Windows Server 2003 domain that is configured for Windows Server 2003 authentication, verify that:

    • The RAS and IAS Servers security group exists. If not, create the group and set the group type to Security and the group scope to Domain local.

    • The RAS and IAS Servers security group has Read permission to the RAS and IAS Servers Access Check object.

    • The computer account of the VPN server computer is a member of the RAS and IAS Servers security group. You can use the netsh ras show registeredserver command to view the current registration. You can use the netsh ras add registeredserver command to register the server in a specified domain.

      If you add (or remove) the VPN server computer to the RAS and IAS Servers security group, the change doesn't take effect immediately (because of the way that Windows Server 2003 caches Active Directory information). To immediately effect this change, restart the VPN server computer.

    • The VPN server is a member of the domain.

    For more information about how to add a group, how to verify permissions for the RAS and IAS security group, and about netsh commands for remote access, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: A Windows NT 4.0-based VPN server can't validate connection requests.

    Solution: If VPN clients are dialing in to a VPN server running Windows NT 4.0 that is a member of a Windows Server 2003 mixed-mode domain, verify that the Everyone group is added to the Pre-Windows 2000 Compatible Access group with the following command:

    If not, type the following command at a command prompt on a domain controller computer, and then restart the domain controller computer:

    For more information about Windows NT 4.0 remote access server in a Windows Server 2003 domain, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: The VPN server can't communicate with the configured RADIUS server.

    Solution: If you can reach your RADIUS server only through your Internet interface, do one of the following:

    • Add an input filter and an output filter to the Internet interface for UDP port 1812 (based on RFC 2138, 'Remote Authentication Dial-In User Service (RADIUS)'). -or-
    • Add an input filter and an output filter to the Internet interface for UDP port 1645 (for older RADIUS servers), for RADIUS authentication and UDP port 1813 (based on RFC 2139, 'RADIUS Accounting'). -or-
    • -or- Add an input filter and an output filter to the Internet interface for UDP port 1646 (for older RADIUS servers) for RADIUS accounting.

    For more information about how to add a packet filter, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: Can't connect to the VPN server over the Internet using the Ping.exe utility.

    Solution: Because of the PPTP and L2TP over IPSec packet filtering that is configured on the Internet interface of the VPN server, Internet Control Message Protocol (ICMP) packets used by the ping command are filtered out. To turn on the VPN server to respond to ICMP (ping) packets, add an input filter and an output filter that permit traffic for IP protocol 1 (ICMP traffic).

    For more information about how to add a packet filter, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

Can't send and receive data

Dell Server Configurator Tool

  • Cause: The appropriate demand-dial interface hasn't been added to the protocol being routed.

    Solution: Add the appropriate demand-dial interface to the protocol being routed.

    For more information about how to add a routing interface, see the Windows Server 2003 Help and Support Center. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: There are no routes on both sides of the router-to-router VPN connection that support the two-way exchange of traffic.

    Solution: Unlike a remote access VPN connection, a router-to-router VPN connection doesn't automatically create a default route. Create routes on both sides of the router-to-router VPN connection so that traffic can be routed to and from the other side of the router-to-router VPN connection.

    You can manually add static routes to the routing table, or you can add static routes through routing protocols. For persistent VPN connections, you can turn on Open Shortest Path First (OSPF) or Routing Information Protocol (RIP) across the VPN connection. For on-demand VPN connections, you can automatically update routes through an auto-static RIP update. For more information about how to add an IP routing protocol, how to add a static route, and how to perform auto-static updates, see Windows Server 2003 online Help. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: A two-way initiated, the answering router as a remote access connection is interpreting router-to-router VPN connection.

    Solution: If the user name in the credentials of the calling router appears under Dial-In Clients in Routing and Remote Access, the answering router may interpret the calling router as a remote access client. Verify that the user name in the credentials of the calling router matches the name of a demand-dial interface on the answering router. If the incoming caller is a router, the port on which the call was received shows a status of Active and the corresponding demand-dial interface is in a Connected state.

    For more information about how to check the status of the port on the answering router, and how to check the status of the demand-dial interface, see Windows Server 2003 online Help. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: Packet filters on the demand-dial interfaces of the calling router and answering router are preventing the flow of traffic.

    Solution: Verify that there are no packet filters on the demand-dial interfaces of the calling router and answering router that prevent the sending or receiving of traffic. You can configure each demand-dial interface with IP and IPX input and output filters to control the exact nature of TCP/IP and IPX traffic that is permitted into and out of the demand-dial interface.

    For more information about how to manage packet filters, see Windows Server 2003 online Help. Click Start to access the Windows Server 2003 Help and Support Center.

  • Cause: Packet filters on the remote access policy profile are preventing the flow of IP traffic.

    Solution: Verify that there are no configured TCP/IP packet filters on the profile properties of the remote access policies on the VPN server (or the RADIUS server if Internet Authentication Service is used) that are preventing the sending or receiving of TCP/IP traffic. You can use remote access policies to configure TCP/IP input and output packet filters that control the exact nature of TCP/IP traffic permitted on the VPN connection. Verify that the profile TCP/IP packet filters aren't preventing the flow of traffic.

    For more information about how to configure IP options, see Windows Server 2003 online Help. Click Start to access the Windows Server 2003 Help and Support Center.