Configuring and Testing an L2TPIPSec Profile


Configuring and Testing an L2TP/IPSec Profile

To make a VPN connection with L2TP/IPSec, you must have a computer certificate on the VPN client computer and one on the VPN server. You can use CMAK to configure a profile that allows the VPN client computer to obtain and install a certificate with minimal user interaction. This section describes how to configure the example.com domain so that computers can automatically obtain these certificates over the network, how to configure the client computer to use these certificates, and how to create a VPN-only L2TP/IPSec Connection Manager profile that uses these certificates. To do this in the test lab, you must install IIS on DC1 because IIS1 cannot distribute or issue the certificates that you will create for this test lab. Version 2 certificates are not available on or distributable by Windows Server 2003, Standard Edition, but they are distributable by Windows Server 2003, Enterprise Edition or Datacenter.

Because this test lab does not actually connect to the Internet, you must use the dial-up profile to connect to the intranet segment so that the client computer can obtain a certificate from the certification authority that you will install on DC1. In a production environment, the profile could be configured to first dial an Internet service provider (ISP) for Internet access before making a VPN connection to the intranet (known as a double-dial profile), or the profile could be configured as a VPN-only profile.

This test lab scenario also requires manual installation of a certificate chain on CLIENT1.

DC1

To configure the test lab for L2TP/IPSec access, install IIS and Certificate Services on DC1, configure certificate settings, create a user for L2TP/IPSec access, and update Group Policy.

Install IIS

Use Add/Remove Windows Components to install IIS on DC1, as you did on IIS1 in the section “Configuring the Initial Test Lab.”

Install Certificate Services, and configure the certification authority

  1. When IIS finishes installing, click Add/Remote Windows Components.

  2. In Windows Components, select the Certificate Services check box. Click Yes when warned about not changing the name or domain membership of this computer. Click Next.

  3. On the CA Type page, click Enterprise Root CA and click Next.

  4. On the CA Identifying Information page, type Example CA in the Common Name For This CA text box and then click Next.

  5. On the Certificate Database Settings page, click Next.

  6. When asked whether to temporarily stop IIS, click Yes.

  7. When asked whether to enable ASP pages, click Yes.

  8. On the Completing The Windows Components Wizard page, click Finish.

Configure certificate templates

  1. Click Start, click Run, and type certtmpl.msc to open Certificate Templates.

  2. In the details pane, right-click the Authenticated Session template, and click Duplicate Template.

  3. On the General tab, type Authenticated Session for WebEnroll in the Template Display Name text box.

  4. On the Security tab, click Authenticated Users in Group Or User Names. In Permissions For Authenticated Users, the Read check box is selected by default. Select the Enroll and Autoenroll check boxes under Allow, and then click OK.

  5. In the details pane, right-click the RAS And IAS Server template, and click Properties.

  6. On the Security tab, click Authenticated Users in Group Or User Names, select the Enroll and Autoenroll check boxes under Allow, and then click OK.

Configure the certification authority to issue the new certificates

  1. Click Start, point to Administrative Tools, and click Certification Authority.

  2. Double-click Example CA to open it. Right-click Certificate Templates, point to New, and click Certificate Template To Issue.

  3. In the Enable Certificate Templates dialog box, hold down the Ctrl key and click Authenticated Session For WebEnroll and RAS And IAS Server. Release the Ctrl key, and click OK.

Configure Active Directory for auto-enrollment of certificates

  1. Open the Active Directory Users And Computers administrative tool.

  2. In the console tree, right-click the example.com domain, and then click Properties.

  3. On the Group Policy tab, click Default Domain Policy and then click Edit.

  4. In the console tree for Group Policy Object Editor, open Computer Configuration, then Windows Settings, and then Security Settings. Click Public Key Policies.

  5. In the details pane, right-click Autoenrollment Settings, and click Properties. Select Enroll Certificates Automatically, and select both check boxes. Click OK.

    click to expand

  6. Close Group Policy Object Editor.

Create a user account

  1. Open the Active Directory Users And Computers administrative tool, if not already open.

  2. Create a user account named RemoteUser just as you did for VPNUser. Add RemoteUser to both the DialUsers group and the VPNUsers group.

Update Group Policy

  • At a command prompt, type gpupdate to update Group Policy on DC1.

VPN1

To configure the test lab for L2TP access, install the appropriate certificate on VPN1, and create an L2TP/IPSec VPN profile.

Update Group Policy

  • To immediately update Group Policy and request a computer certificate, type gpupdate at a command prompt.

Create the L2TPCorp profile

  1. Open the Connection Manager Administration Kit Wizard, and click Next.

  2. On the Service Profile Selection page, click New Profile if necessary, and click Next.

  3. On the Service And File Names page, type L2TP To CorpNet in the Service Name text box, type L2TPCorp in the File Name text box, and click Next.

  4. On the Realm Name page, click Add A Realm Name To The User Name. If Suffix is not already clicked, click it. In the Realm Name text box, type @example.com and then click Next.

  5. On the Merging Profile Information page, click Next.

  6. In VPN Support, select the Phone Book From This Profile check box. In VPN Server Name Or IP Address, click Always Use The Same VPN Server, type 10.0.0.2, and click Next.

  7. On the VPN Entries page, click the default entry and click Edit.

  8. Click the Security tab. In the Security Settings drop-down list, click Use Advanced Security Settings and then click Configure.

  9. In Authentication Methods, clear the Microsoft CHAP check box. In VPN Strategy, click Only Use Layer Two Tunneling Protocol (L2TP). Click OK twice, and then click Next.

  10. On the Phone Book page, clear the Automatically Download Phone Book Updates check box, and click Next.

  11. On the Dial-up Networking Entries page, click Next.

  12. On the Routing Table Update page, click Next.

  13. On the Automatic Proxy Configuration page, click Next.

  14. On the Custom Actions page, click Next.

  15. On the Logon Bitmap page, click Next.

  16. On the Phone Book Bitmap page, click Next.

  17. On the Icons page, click Next.

  18. On the Notification Area Shortcut Menu page, click Next.

  19. On the Help File page, click Next.

  20. On the Support Information page, type For help connecting, contact the Support Desk. in the Support Information text box and then click Next.

  21. On the Connection Manager Software page, click Next.

  22. On the License Agreement page, click Next.

  23. On the Additional Files page, click Next.

  24. On the Ready To Build The Service Profile page, select the Advanced Customization check box and then click Next.

  25. On the Advanced Customization page, in the Section Name drop-down list, click Connection Manager. In the Key Name drop-down list, click HideDomain. In the Value text box, type 1. Click Apply.

  26. On the Advanced Customization page, in the Section Name drop-down list, click Connection Manager. In the Key Name drop-down list, click Dialup. In the Value text box, type 0. Click Apply.

  27. Click Next, and wait for the profile to finish building.

  28. When the Completing The Connection Manager Administration Kit Wizard page appears, click Finish.

Prepare the L2TPCorp profile for distribution

  1. Browse to the \Program Files\Cmak\Profiles\L2TPCorp folder.

  2. Copy L2TPCorp.exe to a floppy disk.

IAS1

From a command prompt, type gpupdate to update Group Policy.

CLIENT1

To set up the test lab for L2TP/IPSec access, configure CLIENT1 with the necessary certificates and install the L2TPCorp profile.

Get a certificate

  1. Use the Dial-Up To CorpNet profile to connect to the network. Type RemoteUser in the User Name text box, and type the password for the RemoteUser account in the Password text box.

  2. When connected, open a Web browser and type http://dc1.example.com
    /certsrv
    .

  3. Click Request A Certificate.

  4. Click Advanced Certificate Request.

  5. Click Create And Submit A Request To This CA.

  6. Click Authenticated Session For WebEnroll in the Certificate Template drop- down list, and select the Store Certificate In The Local Computer Certificate Store check box. Leave all the other settings as they are.

  7. Click Submit.

  8. Click Yes to approve the request for a certificate.

  9. When the request is finished processing, click Install This Certificate.

  10. Click Yes to approve the installation of the certificate.

  11. When the certificate has been installed, disconnect Dial-up To CorpNet.

  12. In the Microsoft Management Console window, add the Certificates snap-in for the local computer. Add Example CA to the Trusted Root Certification Authorities folder.

Connect to CorpNet using the L2TPCorp profile

  1. Install the L2TP To CorpNet profile on CLIENT1.

  2. On the Connection Manager logon screen, type RemoteUser in the User Name text box and type the password for the account in the Password text box.

  3. Click Connect.

Test connectivity

  1. When the connection to the intranet segment has completed, open a Web browser.

  2. In the Address text box, type http://IIS1.example.com/iisstart.htm. You should see a Web page titled “Under Construction.”

  3. Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the files in the root folder on IIS1.

  4. Right-click the connection icon in the notification area, and then click Disconnect.




Deploying Virtual Private Networks With Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference)
ISBN: 0735615764
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net