Step-by-Step Guide For Setting Up A PPTP-based Site-to-Site VPN Connection in A Test Lab
Step-by-Step Guide For Setting Up A PPTP-based Site-to-Site VPN Connection in A Test Lab
Abstract
This guide describes the configuration of a Point-to-Point Tunneling Protocol (PPTP)-
based site-to-site virtual private network (VPN) connection using five computers in a test
lab. The VPN connection described in this guide enables you to simulate and observe
Microsoft® Windows® Server™ 2003 site-to-site VPN functionality. The VPN connection
described in this guide is for testing purposes only, and cannot be used in a production
environment.
Microsoft, Windows, and Windows Server are either registered trademarks or trademarks
of Microsoft Corporation in the United States and/or other countries.
Contents........................................................................................................................ .....4
You can use this example deployment to learn about Windows Server 2003 with SP1
site-to-site VPN functionality before you deploy a site-to-site VPN connection in a
production environment. This test lab configuration simulates a deployment of a PPTP-
based site-to-site VPN connection between the Seattle and New York offices of an
organization.
Note:
The following instructions are for configuring a test lab using a minimum number
of computers. Individual computers are needed to separate the services provided
on the network and to clearly show the functionality. This configuration is
designed to reflect neither best practices nor a recommended configuration for a
production network. The configuration, including IP addresses and all other
configuration parameters, is designed to work only on a separate test lab
network.
In this test lab scenario, Windows Firewall is installed and turned-on automatically on the
client computers running Windows XP Professional with SP2. You will configure a
Windows Firewall exception on CLIENT1, allowing communication between the two client
computers. On the three computers with Windows Server 2003 with SP1, Standard
Edition, Windows Firewall is automatically installed, but it is not turned-on by default. On
these computers, Windows Firewall will remain turned-off. In addition, the Windows
6
Firewall/Internet Connection Sharing (ICS) service should be disabled on each of these
computers.
Computer Role
In addition to these five computers, the test lab also contains four hubs (or Layer 2
switches):
• A hub that connects the Seattle office (CLIENT1) to the answering router
(ROUTER1).
• A hub that connects the New York office (CLIENT2) to the calling router
(ROUTER2).
• A hub that connects the answering router (ROUTER1) to the Internet router
(INTERNET).
• A hub that connects the calling router (ROUTER2) to the Internet router
(INTERNET).
Note:
Because there are only two computers on each subnet, the hubs can be replaced
by Ethernet crossover cables.
The IP addresses for the test lab configuration are shown in Tables 2, 3, and 4.
Computer/Interface IP Addresses
CLIENT1 172.16.4.3
Computer/Interface IP Addresses
Computer/Interface IP Addresses
CLIENT2 172.16.56.3
2. On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
3. Click Use the following IP address, type 172.16.4.3 for the IP address,
type 255.255.255.0 for the Subnet mask, and then type 172.16.4.1 for the
Default gateway.
2. Click Windows Firewall, and then in the Windows Firewall dialog box,
click the Advanced tab.
3. Click Settings for ICMP, and then click Allow incoming echo request.
2. On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
3. Click Use the following IP address, and then type 172.16.56.3 for the
IP address, type 255.255.255.0 for the Subnet mask, and then type
172.16.56.1 for the Default gateway.
ROUTER1
ROUTER1 is a computer on the Seattle office subnet, running Windows Server 2003 with
SP1, Standard Edition. ROUTER1 is acting as the answering router.
2. On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
3. Configure the IP address and subnet mask with the following values:
ROUTER2
ROUTER2 is a computer on the New York office subnet, running Windows Server 2003
with SP1, Standard Edition. ROUTER2 is acting as the calling router.
2. On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
3. Configure the IP address and subnet mask with the following values:
2. On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
3. Configure the IP address and subnet mask with the following values:
6. The Routing and Remote Access Server Setup Wizard opens. Click
Next.
2. The Routing and Remote Access Server Setup Wizard appears. Click
Next.
4. Click Next. On the Remote Access page, select VPN, as shown in the
following figure.
16
5. Click Next. On the VPN Connection page, select To the Internet, and then
verify that the Enable security on the selected interface by setting up static
packet filters check box is selected, as shown in the following figure.
17
7. Click Next. On the Address Range Assignment page, click New, as shown
in the following figure.
19
10. On the Managing Multiple Remote Access Servers page, select No, use
Routing and Remote Access to authenticate connection requests, as shown
in the following figure.
21
11. Click Next. On the Completing the Routing and Remote Access Server
Setup page, click Finish.
12. Click OK to close the message box prompting you to configure the DHCP
Relay Agent. For this scenario the DHCP Relay Agent will not be configured.
4. Click Next. On the Connection Type page, select Connect using virtual
private networking (VPN), as shown in the following figure.
23
6. Click Next. On the Destination Address page, type 10.2.0.2 in the Host
name or IP address box, as shown in the following figure.
25
8. Click Next. On the Static Routes for Remote Networks page, click Add, as
shown in the following figure.
27
10. Click OK. On the Static Routes for Remote Networks page, click Next.
11. On the Dial In Credentials page, type a password for the VPN_NewYork
user account, and then retype the password in the Confirm password box. The
User name box is automatically populated with the value VPN_NewYork.
12. Click Next. On the Dial Out Credentials page, do the following:
13. Click Next. On the last Demand-Dial Interface Wizard page, click Finish.
14. Click OK to close the message box prompting you to configure the DHCP
Relay Agent. For this scenario the DHCP Relay Agent will not be configured.
2. The Routing and Remote Access Server Setup Wizard appears. Click
Next.
4. On the Remote Access page, select VPN, and then click Next.
5. On the VPN Connection page, select To the Internet, verify that the
Enable security on the selected interface by setting up static packet
30
10. On the Completing the Routing and Remote Access Server Setup
page, click Finish.
6. On the Destination Address page, type 10.1.0.2, and then click Next.
b. Select Add a user account so a remote router can dial in, and
then click Next.
31
c. In the Metric box, accept the displayed value 1, and then click
OK.
10. On the Static Routes for Remote Networks page, click Next.
11. On the Dial In Credentials page, type the password for the
VPN_Seattle user account, and then retype the password in the Confirm
password box. The User name box is pre-populated with the value
VPN_Seattle. Click Next.
Confirm the remote access policy configuration on the answering and calling
routers
1. In the Routing and Remote Access snap-in, click Remote Access
Policies.
3. On the Settings tab, select Grant remote access permission, and then
click OK to save changes.
2. In the console tree of the Routing and Remote Access snap-in, click
Network Interfaces.
This is the IP address for CLIENT1. Pinging CLIENT1 from CLIENT2 will test
whether the Seattle subnet is now reachable.
Results that are similar to the following indicate that the connection is working.
Note:
172.16.56.1 is the IP address of the ROUTER2 interface that connects to the
New York intranet. 172.56.200.2 is the IP address that ROUTER2 assigned
to ROUTER1. The presence of this IP address in the Tracert output indicates
that packets are moving across the site-to-site VPN connection. 172.16.4.3 is
the IP address of CLIENT1.
Summary
The preceding tasks describe how to configure a PPTP-based site-to-site VPN
connection in a test lab with five computers. These five computers simulate two remote
sites using VPN to connect over the Internet.
See Also
Virtual Private Networks for Windows Server 2003