Book now with code EOY2025
networker050184 wrote: » Maybe some diagrams or something will help. I'm not really sure what you are trying to do.
SrSysAdmin wrote: » I think I need two separate VPN servers for what I want to do (I'm using RRAS), but this may help give you an idea of what I'm attempting to do: User A connects to public IP 1.2.3.4 \/ Firewall redirects 1.2.3.4 to internal IP 10.10.1.1 which is an IP setup on the Windows Server 2003 box running VPN \/ The 10.10.1.1 VPN server assigns an IP of 10.10.2.x User B connect to public IP 4.3.2.1 \/ Firewall redirects 4.3.2.1 to internal IP 10.10.1.2 which is a 2nd IP setup on the same Server 2003 box running VPN \/ The 10.10.1.2 VPN server assigns an IP of 10.10.3.x
garv221 wrote: » This is what you want to do? Why do clients need to be forwarded? I'm sorry but still I don't understand.
phoeneous wrote: » For the record, I hate RRAS. How many interfaces does the RRAS box have? And what are each of the internal interfaces connected to?
undomiel wrote: » The method that jumps to my mind is to use packet filters on the RRAS to control which VPN profile is allowed to route to which network.
phoeneous wrote: » It sounds like you just need to configure static routes. I googled "rras configure routes" and a bunch of stuff come up, this stood out. Can you put an additional nic in? Your task sounds possible to me.
SrSysAdmin wrote: » Regardless of whether or not this is possible, I really appreciate the help. It is great when IT people work together on forums. Too often people on forums get a smug sense of "I know more than you" and are unwilling to help and/or they act as if you're an idiot for needing help.
phoeneous wrote: » I'm sure it is possible, I just don't have an rras box to test it on. And to summarize the article, you cannot have multiple ip's on the same interface for different vpn gateways. Take this as an example: say you are in a building with 5 rooms and each room has a vpn user that will each connect to a different public ip, but there is only one gateway and one public ip at the building where they are. When one of those users creates a vpn connection, that one public ip will be used in the tunnel and cannot be used by any of the other users. So the vpn gateway will need to have 5 public ip addresses to accomodate each user. I had to do this for several remote users at a bank I used to work for. We had to create 1:1 nat translations and mac reservations. The reciprocal applies to your situation. You cannot have multiple public ip's on the same interface for vpn use. Once a vpn user is cnnected to one of those public ip's, the interface won't be able to accept another tunnel. So bottom line is you need to get one nic/interface per public ip for vpn use.
SrSysAdmin wrote: » I'm not sure there is room for another NIC. There are already four NICs in the server and this is one of those HP All-in-One Storage Servers that have a NAS and server all in one small box. I may be able to hook up a USB-attached NIC however which would probably allow for enough traffic for VPN users.
Devilsbane wrote: » USB NIC, or you could take one of the existing NICs and assign a second IP to it
SrSysAdmin wrote: » Here is my situation. Clients connect to a public IP which is redirected to an IP on my Windows VPN server. All the users coming in through that IP then I would like to be immediately forwarded to an IP on one of our internal firewalls. I have a 2nd IP on the VPN server for other clients which don't need to be forwarded. How do I go about forwarding the users connecting to the first IP to our internal firewall IP? I asked on another forum but they weren't able to help. Do any of you guys have any idea? Thanks in advance.
phoeneous wrote: » No, I'm saying if you use multiple ip's on the same interface you cannot have simultaneous vpn tunnels. If you are using just one public ip then you can have as many users connect as it can support. You are better off getting a dedicated vpn appliance like an ASA 5500 and completely seperating them off. And why are you teaming the nic's? Unless you have are spanning the port or there is load balancing through windows, teaming the nics only gives you failover if one nic fails. Unless there is some cool nic teaming feature in rras that I'm not aware of which is highly likely since I hate it.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!