
As you can see, currently, our 2 VPN servers (brux-vpn and paris-vpn) are still in the same workgroup named "WORKGROUP" (so the default one).


Before joining your Site 1 (Brussels) VPN server to your Active Directory domain, you'll need to change the DNS servers used by this server.
For the "brux-vpn" VPN server at Site 1 (Brussels):
Note: Internet access from this VPN server will still work, as it will use the DNS servers present on your AD domain controllers and these will by default redirect DNS requests to the root DNS servers present on the Internet (and which are already entered by default in the DNS servers installed on Windows Server).

Then, display the system properties of this VPN server "brux-vpn" and click on the "Change settings" link.

Then, click on "Edit".

Select "Domain" and enter your Active Directory domain.

Specify the credentials of an account authorized to join this server to your Active Directory domain.

Click "Close".

Warning : do not restart your VPN server yet.
Joining your VPN server to Active Directory created a computer account in its name on a local domain controller (on the same physical site as it), but this computer account has not yet been replicated to all your domain controllers.
This could cause problems after restarting this server, as it may contact another AD domain controller that does not yet have this computer account.
And since the connection between your two sites depends on this VPN server, you must wait until the account is also replicated to the other site (Paris in this case) before restarting your server.

On the local AD domain controller (in our case: brux-dc1), we can see that a computer account "BRUX-VPN" has appeared in the "Computers" folder of this AD server.

To make this computer account known to your other Active Directory domain controllers (including the remote physical site), open a command prompt on the local domain controller where the created computer account (in our case: brux-vpn) is visible.
Then, type the command below again.
Batch
repadmin /syncall /A /e /P

Once the command is complete, the message "Total synchronization completed..." will appear.

If you go to the VPN server "paris-vpn" of the remote site (Paris), you should see this same computer account "BRUX-VPN" appear.

Similar to the other VPN server (at Site 1 (Brussels)), on the "paris-vpn" VPN server at Site 2 (Paris), ensure that you only use your local AD domain controllers as DNS servers.
Again, for the WAN interface, ensure that no DNS servers are specified.
Then, for the LAN interface, specify the IP addresses of your local AD domain controllers as DNS servers:

Next, open the System Properties of your Windows Server and click on the "Change Settings" link.

Select "Domain" and enter your Active Directory domain name again.

Warning : again, do not restart this second VPN server either.
So, click "Restart later".

On one of your local domain controllers ("paris-dc1" in our case), you will see that a new computer account "PARIS-VPN" has been created in the "Computers" folder.

Similar to before, to have this computer account copied to all your Active Directory domain controllers, use the same command again on this AD domain controller (where the created computer account already appears).
Batch
repadmin /syncall /A /e /P


As expected, this new computer account (in our case: PARIS-VPN) is visible on all your Active Directory domain controllers.

Windows Server 4/16/2021
Windows Server 4/30/2021
Windows Server 4/3/2021
Windows Server 5/21/2021
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment