Optional: To prove that connectivity and routing are working properly, we added a web server at each physical site.
This proves that packet routing is being performed correctly by the two VPN servers, which also act as routers.
However, these web servers are not useful in a business environment. This is just an additional test to prove the functionality of this tutorial.
On site 1 (Brussels), we added a "brux-web" server with the IP address "10.0.1.11" (to stay in the same "10.0.1.X" network as this site 1 (Brussels)).
We installed the "Web Server (IIS)" role on this "brux-web" server.
On site 2 (Paris), we added a "paris-web" server with the IP address "10.0.2.11".
Again, we installed the "Web Server (IIS)" role on this server.
From the web server "brux-web" we tried to access our own web server (10.0.1.11) and we can see the "IIS 8" page appear.
In a second tab of the same web browser, we try to access the remote web server "paris-web" (10.0.2.11) and, as expected, it works.
Note that the reverse test also works. From the "paris-web" web server, we also have access to the "brux-web" web server (10.0.1.11) and the local "paris-web" web server (10.0.2.11).
As you can see from the Internet Explorer history, we were able to access both web servers (10.0.1.11 and 10.0.22.11) from the same server.
If you want to test the connectivity between these 2 servers again via the "ping" command, don't forget to enable the rules below for the incoming traffic of these 2 servers:
Now, ping is allowed.
Again, to ensure that both routing and VPN tunnels are configured correctly, it's best to test the ping between your two web servers (in both directions).
To begin with, you can see that our web server "brux-web" can communicate without any problems with itself (brux-web / 10.0.1.11) and with the remote web server (paris-web / 10.0.2.11).
Batch
ping 10.0.1.11
Plain Text
Reply from 10.0.1.11: bytes=32 time<1ms TTL=128 ... Packets : Sent = 4, Received = 4, ...
Batch
ping 10.0.2.11
Plain Text
Reply from 10.0.2.11: bytes=32 time=1 ms TTL=126 ... Packets : Sent = 4, Received = 4, ...
Then, you can see that our web server "paris-web" can communicate without any problem with the remote web server (brux-web / 10.0.1.11) and with itself (paris-web / 10.0.2.11).
A short network tutorial with the routing information you can view from the command line on your two VPN servers.
Note: there is nothing to modify or configure.
This is for informational purposes only to help you understand what's happening in the network and how network packets reach the correct destination thanks to your two VPN servers, which also act as routers.
On the "brux-vpn" VPN server at Site 1 (Brussels), open a command prompt and simply type the command "route print."
Batch
route print
In the list of interfaces on this VPN server "brux-vpn" of site 1 (Brussels), you will find in particular:
Plain Text
Interface List 29...........................paris ... 14...00 0c 29 се 4b d6 ......Intel(R) 82574L Gigabit Network Connection #2 12...00 0с 29 се 4b cc ......Intel(R) 82574L Gigabit Network Connection
A little further down, you'll find the routing table for the "IPv4" protocol.
As you can see:
Plain Text
IPv4 Route Table =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 266 10.0.1.0 255.255.255.0 On-link 10.0.1.10 266 ... 10.0.2.0 255.255.255.0 10.0.12.1 10.0.12.2 11 10.0.11.1 255.255.255.255 On-link 10.0.11.1 296 10.0.11.2 255.255.255.255 10.0.11.2 10.0.11.1 41 10.0.12.1 255.255.255.255 On-link 10.0.12.2 11 10.0.12.2 255.255.255.255 On-link 10.0.12.2 266
A little further down, just after the IPv4 routing table, you'll find the list of persistent routes.
In this case, you'll see that all network traffic (0.0.0.0) is supposed to be sent to the IP address "192.168.1.1" (which corresponds to the default gateway specified in the TCP/IP configuration of the "WAN" interface of this VPN server).
However, the truth about network routing is above (in the routing table).
Plain Text
Persistent Routes: Network Address Netmask Gateway Address Metric 0.0.0.0 0.0.0.0 192.168.1.1 1
Similarly, go to the remote VPN server "paris-vpn", open a command prompt and type the command "route print" again.
Batch
route print
In the list of interfaces on this VPN server "paris-vpn" of site 2 (Paris), you will find in particular:
Plain Text
Interface List 29...........................brux ... 15...00 0c 29 30 c6 88 ......Intel(R) 82574L Gigabit Network Connection #2 12...00 0с 29 30 c6 7e ......Intel(R) 82574L Gigabit Network Connection
A little further down, you'll find the routing table for the "IPv4" protocol.
As you can see:
Plain Text
IPv4 Route Table =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.12 266 10.0.1.0 255.255.255.0 10.0.11.1 10.0.11.2 31 10.0.2.0 255.255.255.0 On-link 10.0.2.10 266 ... 10.0.11.1 255.255.255.255 On-link 10.0.11.2 31 10.0.11.2 255.255.255.255 On-link 10.0.11.2 286 10.0.12.1 255.255.255.255 On-link 10.0.12.1 296 10.0.12.2 255.255.255.255 10.0.12.2 10.0.12.1 41
Just below the IPv4 routing table, you'll find the list of persistent routes again.
Again, you'll see that all network traffic (0.0.0.0) is supposed to be sent to the IP address "192.168.1.1" (including via the "WAN" interface of this VPN server).
However, the actual network routing performed is above (in the routing table).
Plain Text
Persistent Routes: Network Address Netmask Gateway Address Metric 0.0.0.0 0.0.0.0 192.168.1.1 1
Windows Server 4/28/2012
Windows Server 8/8/2012
Windows Server 12/3/2016
Windows Server 11/23/2017
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment