When you have offices in different countries, it may be interesting to have access to data hosted elsewhere in the world.
To do this, we will use the VPN gateway system.
Info : in business, it's possible to use IP VPN technologies available from some operators : IP VPN from Orange (diagram available here) or SD-WAN from Interoute (GTT) for example.
If you check the WHOIS of your company's public IP address in the case of IP VPN, you will see for example this "[country name] [city name] Customer P2p Interface Addresses In [2-letter code country]" for the location of your IP address.
In this tutorial we will take the example of a company that would be implemented in Belgium (with an office in Brussels) and who would also have another office in France (in Paris).
Note : if you want to learn more about VPN technology, see our previous tutorial : Windows Server 2012 - Routing and VPN server.
Important : for the stability and security of your VPN tunnels on Windows Server, favor the use of L2TP as explained at the end of the tutorial, rather than PPTP.
Tutorial created on Windows Server 2012, but also tested on Windows Server 2022 and 2016.
To implement this solution and best match the configuration of a real corporate network, here is the network configuration we used:
The "brux-vpn" and "paris-vpn" servers will serve:
Important : to access servers on both the internal and remote networks, It is recommended to use different network IDs on these 2 networks. Thanks to the VPN connection, all machines will be able to access both networks.
As you can see in the image below, each server has a unique LAN IP address. For example: "10.0.1.50" for the "brux-win8-pc" PC at Site 1 (Brussels) and "10.0.2.50" for the "paris-win8-pc" PC at Site 2 (Paris).
Warning : you will also see that you will need to use a different network ID for each VPN tunnel between your physical sites.
This is what will allow your VPN servers (also acting as a router) to correctly route packets between machines on the LAN (at each site), as well as send traffic to and receive traffic from the remote site. In our case, "10.0.11.X" for VPN clients (i.e., the "paris-vpn" server) is on the Brussels VPN server (brux-vpn) and "10.0.12.X" for VPN clients (i.e., the "brux-vpn" server) is on the Paris VPN server (paris-vpn).
Note: as you can see, there are no DNS servers in this infrastructure, as the DHCP server we configure will simply send the IP address of Google's public DNS server (e.g., 8.8.8.8).
However, you could also use root DNS servers by simply installing the "DNS Server" role on your "brux-vpn" and "paris-vpn" servers.
Once the "DNS Server" role is installed on these two servers, simply configure your DHCP server so that your client machines use the IP address of this local DNS server at each site as their primary DNS server. Without configuring Windows Server DNS server, it will automatically forward DNS queries to existing root DNS servers on the Internet.
As you can see, the VPN server "brux-vpn" of site 1 (Brussels) is in a workgroup "WORKGROUP".
Here's the configuration of its network cards.
For its WAN interface:
For its LAN interface:
The VPN server "paris-vpn" at site 2 (Paris) is in the same working group "WORKGROUP".
The network card configuration is similar, except that Site 2 (Paris) uses a "10.0.2.X" (Paris) network instead of "10.0.1.X" (Brussels).
For its WAN interface:
For its LAN interface:
Since the VPN gateway system allows you to connect multiple remote networks into a single network, it may be necessary to configure any hardware firewalls that may be present between your network and the Internet. This is particularly the case in large companies.
Note: this does not apply to the Windows firewall, which is, by default, correctly configured to allow the PPTP and L2TP VPN connections we will use in this tutorial.
To find out which ports to unblock (depending on your configuration), consult the page "Which ports to unblock for VPN traffic to pass-through ?" created by Samir Jain on Microsoft's Technet.
First, the machines at Site 1 (Brussels) must receive an IP address, but must also be able to know the gateway IP address (the IP address of the local VPN server that will also act as a router at this physical site) and the IP address of the DNS server they should use (e.g., Google's (8.8.8.8)).
To do this, on the "brux-vpn" server, open the Server Manager and click "Add roles and features".
Select "Role or feature-based installation".
On this "brux-vpn" server, install the "DHCP Server" role.
As Windows Server tells you, DHCP options allow you to specify the addresses of the DNS servers and routers that your client machines should use.
Which is necessary in this case.
Confirm DHCP server installation.
Please wait while the DHCP server is installed on this "brux-vpn" server.
Once the DHCP server installation is complete, click the "Complete DHCP Configuration" link.
Simply click "Validate" to create the security groups needed for DHCP server administration.
Then, click "Close".
Also close the Add Roles and Features Wizard.
Windows Server 4/28/2012
Windows Server 8/8/2012
Windows Server 4/22/2015
Windows Server 12/3/2016
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
You must be logged in to post a comment