SlideShare a Scribd company logo
http://www.mycertprofile.com/Profile/3992184764
L2TP/IPsec VPN On Windows Server 2016
Complete Lab (V2.0)
Ahmed Abdelwahed
Microsoft Certified Trainer
Ahmed_abdulwahed@outlook.com
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
2 | P a g e
Table of Contents
What is VPN?...................................................................................................................................................................3
Existing Active directory environment............................................................................................................................3
Existing DHCP Server Configuration:...............................................................................................................................4
VPN Server Setup and Configurations ............................................................................................................................5
VPN Configuration Steps:............................................................................................................................................6
Step 1: Join VPN Server to ITPROLABS.XYZ domain.................................................................................................6
Step 2: Add Remote Access role..............................................................................................................................6
Step 3: Enable and configure routing and remote access (Enable VPN Service) ...................................................10
Step 4: Allow VPN clients to obtain TCP/IP configuration from DHCP and use internal DNS.................................13
Step 5: Configure a preshared key for IPSec connection.......................................................................................14
Allowing internet users to connect through VPN .........................................................................................................15
Step 1: Active Directory Configuration .....................................................................................................................15
Step 2: Configure the Remote Access policies (NPS)................................................................................................17
Testing...........................................................................................................................................................................23
Create VPN connection from windows 10 Client......................................................................................................23
Allow internet connectivity with VPN.......................................................................................................................26
Connect to VPN.........................................................................................................................................................27
Check connected VPN client Status ..........................................................................................................................28
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
3 | P a g e
What is VPN?
A Virtual Private Network (VPN) is a secure network tunnel that allows you to connect to your private
network from internet locations. So, you can access and use your internal resources based on your
permissions.
Existing Active directory environment
1. OS: Windows server 2016
2. Domain Name: ITPROLABS.XYZ
3. Domain IP: 192.168.153.10/24
4. IP Scheme: 192.168.153.0/24
Full Windows Server 2016 Active directory lab:
https://gallery.technet.microsoft.com/Install-Windows-Server-f37e3c6d?redir=0
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
4 | P a g e
Existing DHCP Server Configuration:
VPN clients will contact the DHCP server to obtain our internal TCP/IP configuration so they can
access internal resources, the DHCP server configuration explained as below:
1. Server IP: 192.168.153.10/24
2. Scope range: 192.168.153.50 – 192.168.153.254
3. DG: 192.168.153.2
4. DNS: 192.168.153.10
Full Windows Server 2016 DHCP lab:
https://gallery.technet.microsoft.com/Installing-and-Configuring-bf727a5f?redir=0
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
5 | P a g e
VPN Server Setup and Configurations
Server Name: VPN
LAN IP: 192.168.153.11/24
WAN IP: public IP address
Network configuration:
We have 2 network interfaces one for LAN connectivity (in our domain scope) and another for WAN that will
receive VPN client connection requests from internet.
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
6 | P a g e
VPN Configuration Steps:
Step 1: Join VPN Server to ITPROLABS.XYZ domain
First, Join our VPN server to ITPROLABS.XYZ domain, so we can use active directory to authenticate the
incoming VPN client connections.
Step 2: Add Remote Access role
On VPN server, from Server Manager add remote access role as explained in the figures below
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
7 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
8 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
9 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
10 | P a g e
Step 3: Enable and configure routing and remote access (Enable VPN Service)
1. On VPN, from Server Manager, open Routing and Remote Access.
2. Right-click VPN (local), and then click Configure and Enable Routing and Remote Access
and follow the instructions as explained in the figures below
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
11 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
12 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
13 | P a g e
Step 4: Allow VPN clients to obtain TCP/IP configuration from DHCP and use internal DNS
Here we will allow incoming VPN clients to obtain TCP/IP configuration from DHCP, also It’s better to allow VPN users
to use the internal DNS server, so they can locate and access internal resources easily
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
14 | P a g e
Step 5: Configure a preshared key for IPSec connection
On VPN server configure preshared key that will be used in IPSec connections
Disable PPTP connections
By default, VPN Server can receive 128 concurrent PPTP, SSTP and L2TP connections, you can increase this number of
concurrent connections or decrease it or disable it by decrease the mentioned number - 128 - to zero, as explained
in the figures below
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
15 | P a g e
Allowing internet users to connect through VPN
Step 1: Active Directory Configuration
Create active directory group to only allow members of this group to connect through VPN, to do this
from active directory users and computers we will create active directory group (VPN_Users) and add
member user to it (aabdelwahed) so we can use him as user testing. The following instructions are
configured on ITPROLABS.XYZ domain (DC01)
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
16 | P a g e
Now you can add members to this group that you want to allow them to connect through VPN
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
17 | P a g e
Step 2: Configure the Remote Access policies (NPS)
Users you want to allow them to connect through VPN must have grant access permission from Network policy
Server or give users dial in grant access (One by one) permission from active directory users and computers wizard,
in our scenario we will configure this permission through Network Policy Server (NPS) to allow members of
VPN_Users group (Bulk Users) that we just created in active directory to access the network through VPN. the
following steps configured on VPN Server.
On VPN, from Server Manager, open the Network Policy Server console
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
18 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
19 | P a g e
add users and groups that you want to allow them to connect through VPN
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
20 | P a g e
from this wizard, we can apply some polices and restrictions on VPN clients like session time limit.
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
21 | P a g e
Configuration summary
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
22 | P a g e
Make sure that your created policy order is 1
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
23 | P a g e
Testing
Create VPN connection from windows 10 Client.
First, create VPN connection to VPN Server public IP address (as explained in the figures below)
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
24 | P a g e
Now, configure our connection to use L2TP (as explained in the below figures)
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
25 | P a g e
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
26 | P a g e
Allow internet connectivity with VPN
By default, the connected to VPN clients can’t browse internet to solve this issues solved as explained in
the figures below.
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
27 | P a g e
Connect to VPN
Now you can use your VPN connection using aabdelwahed user who have grant access permission to
connect through VPN according to his membership on VPN_Users group.
L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab
28 | P a g e
Now, run ipconfig /all to check your VPN connection configuration, so now you can access the network
resources based on your permissions.
Check connected VPN client Status
Now back to VPN server to check status of connected users also you can force disconnect any
connected users as explained in the figures below.

More Related Content

What's hot

Fortinet
FortinetFortinet
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
Amazon Web Services
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
Amazon Web Services
 
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013
Bachir Benyammi
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
Ahmed Riad .
 
Aws multi-region High Availability
Aws multi-region High Availability Aws multi-region High Availability
Aws multi-region High Availability
Adam Book
 
AWS Systems manager 2019
AWS Systems manager 2019AWS Systems manager 2019
AWS Systems manager 2019
John Varghese
 
Advanced Architectures with AWS Transit Gateway
Advanced Architectures with AWS Transit GatewayAdvanced Architectures with AWS Transit Gateway
Advanced Architectures with AWS Transit Gateway
Amazon Web Services
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
Amazon Web Services
 
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Amazon Web Services
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
Amazon Web Services
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
Maganathin Veeraragaloo
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
Amazon Web Services
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트
Amazon Web Services Korea
 
Hướng dẫn sử dụng share point 2010
Hướng dẫn sử dụng share point 2010Hướng dẫn sử dụng share point 2010
Hướng dẫn sử dụng share point 2010
Bùi Quang Hưng
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
Amazon Web Services
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
Amazon Web Services
 
AWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the CloudAWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the Cloud
Amazon Web Services
 

What's hot (20)

Fortinet
FortinetFortinet
Fortinet
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Aws multi-region High Availability
Aws multi-region High Availability Aws multi-region High Availability
Aws multi-region High Availability
 
AWS Systems manager 2019
AWS Systems manager 2019AWS Systems manager 2019
AWS Systems manager 2019
 
Advanced Architectures with AWS Transit Gateway
Advanced Architectures with AWS Transit GatewayAdvanced Architectures with AWS Transit Gateway
Advanced Architectures with AWS Transit Gateway
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response: AWS ...
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트
 
Hướng dẫn sử dụng share point 2010
Hướng dẫn sử dụng share point 2010Hướng dẫn sử dụng share point 2010
Hướng dẫn sử dụng share point 2010
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the CloudAWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the Cloud
 

Similar to L2 tp i-psec vpn on windows server 2016 step by step

Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by step
Ahmed Abdelwahed
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
Chanaka Lasantha
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
ahmedraed19
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
Dewa Ketut Setiawan
 
Site to-multi site open vpn solution-latest
Site to-multi site open vpn solution-latestSite to-multi site open vpn solution-latest
Site to-multi site open vpn solution-latest
Chanaka Lasantha
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
ssuserf7cd2b
 
Nike popup compliance workshop
Nike popup compliance workshopNike popup compliance workshop
Nike popup compliance workshop
Chef
 
Openvpn
OpenvpnOpenvpn
Openvpn
mato2012
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
Alessandro De Suoodh
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Maki Toshio
 
Amazon AWS Workspace Howto
Amazon AWS Workspace HowtoAmazon AWS Workspace Howto
Amazon AWS Workspace Howto
mailbhargav
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
Microsoft TechNet
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
Kunal Sharma
 
3- NIC Teaming
3- NIC Teaming3- NIC Teaming
3- NIC Teaming
Fahad Al-Balushi
 
IPv6 Greenfield
IPv6 Greenfield IPv6 Greenfield
Skype 4 Business Webcast 11. März 2015
Skype 4 Business Webcast 11. März 2015Skype 4 Business Webcast 11. März 2015
Skype 4 Business Webcast 11. März 2015
Thomas Poett
 
PPPoE With Mikrotik and Radius
PPPoE With Mikrotik and RadiusPPPoE With Mikrotik and Radius
PPPoE With Mikrotik and Radius
Dashamir Hoxha
 
NTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALSNTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALS
Sharon Reynolds
 
Modul 1 integration island
Modul 1   integration islandModul 1   integration island
Modul 1 integration island
CyberSpace
 
Session 3 Tp 3
Session 3 Tp 3Session 3 Tp 3
Session 3 Tp 3
githe26200
 

Similar to L2 tp i-psec vpn on windows server 2016 step by step (20)

Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by step
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
Site to-multi site open vpn solution-latest
Site to-multi site open vpn solution-latestSite to-multi site open vpn solution-latest
Site to-multi site open vpn solution-latest
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Nike popup compliance workshop
Nike popup compliance workshopNike popup compliance workshop
Nike popup compliance workshop
 
Openvpn
OpenvpnOpenvpn
Openvpn
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
 
Amazon AWS Workspace Howto
Amazon AWS Workspace HowtoAmazon AWS Workspace Howto
Amazon AWS Workspace Howto
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
 
3- NIC Teaming
3- NIC Teaming3- NIC Teaming
3- NIC Teaming
 
IPv6 Greenfield
IPv6 Greenfield IPv6 Greenfield
IPv6 Greenfield
 
Skype 4 Business Webcast 11. März 2015
Skype 4 Business Webcast 11. März 2015Skype 4 Business Webcast 11. März 2015
Skype 4 Business Webcast 11. März 2015
 
PPPoE With Mikrotik and Radius
PPPoE With Mikrotik and RadiusPPPoE With Mikrotik and Radius
PPPoE With Mikrotik and Radius
 
NTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALSNTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALS
 
Modul 1 integration island
Modul 1   integration islandModul 1   integration island
Modul 1 integration island
 
Session 3 Tp 3
Session 3 Tp 3Session 3 Tp 3
Session 3 Tp 3
 

More from Ahmed Abdelwahed

Ahmed abdelwahed cv
Ahmed abdelwahed   cvAhmed abdelwahed   cv
Ahmed abdelwahed cv
Ahmed Abdelwahed
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
Ahmed Abdelwahed
 
Install and configure windows server 2016 core on hyper v 2016 step by step
Install and configure windows server 2016 core on hyper v 2016 step by stepInstall and configure windows server 2016 core on hyper v 2016 step by step
Install and configure windows server 2016 core on hyper v 2016 step by step
Ahmed Abdelwahed
 
Install and manage windows nano server 2016 step by step
Install and manage windows nano server 2016 step by stepInstall and manage windows nano server 2016 step by step
Install and manage windows nano server 2016 step by step
Ahmed Abdelwahed
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete lab
Ahmed Abdelwahed
 
Iscsi storage in windows server 2016 step by step
Iscsi storage in windows server 2016 step by stepIscsi storage in windows server 2016 step by step
Iscsi storage in windows server 2016 step by step
Ahmed Abdelwahed
 
File server resource manager (fsrm) in windows server 2016
File server resource manager (fsrm) in windows server 2016File server resource manager (fsrm) in windows server 2016
File server resource manager (fsrm) in windows server 2016
Ahmed Abdelwahed
 
Hyper v replication on windows server 2016 step by step
Hyper v replication on windows server 2016 step by stepHyper v replication on windows server 2016 step by step
Hyper v replication on windows server 2016 step by step
Ahmed Abdelwahed
 
Create and Configure Windows Server 2016 VM in the Azure Step by Step
Create and Configure Windows Server 2016 VM in the Azure Step by StepCreate and Configure Windows Server 2016 VM in the Azure Step by Step
Create and Configure Windows Server 2016 VM in the Azure Step by Step
Ahmed Abdelwahed
 

More from Ahmed Abdelwahed (9)

Ahmed abdelwahed cv
Ahmed abdelwahed   cvAhmed abdelwahed   cv
Ahmed abdelwahed cv
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
 
Install and configure windows server 2016 core on hyper v 2016 step by step
Install and configure windows server 2016 core on hyper v 2016 step by stepInstall and configure windows server 2016 core on hyper v 2016 step by step
Install and configure windows server 2016 core on hyper v 2016 step by step
 
Install and manage windows nano server 2016 step by step
Install and manage windows nano server 2016 step by stepInstall and manage windows nano server 2016 step by step
Install and manage windows nano server 2016 step by step
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete lab
 
Iscsi storage in windows server 2016 step by step
Iscsi storage in windows server 2016 step by stepIscsi storage in windows server 2016 step by step
Iscsi storage in windows server 2016 step by step
 
File server resource manager (fsrm) in windows server 2016
File server resource manager (fsrm) in windows server 2016File server resource manager (fsrm) in windows server 2016
File server resource manager (fsrm) in windows server 2016
 
Hyper v replication on windows server 2016 step by step
Hyper v replication on windows server 2016 step by stepHyper v replication on windows server 2016 step by step
Hyper v replication on windows server 2016 step by step
 
Create and Configure Windows Server 2016 VM in the Azure Step by Step
Create and Configure Windows Server 2016 VM in the Azure Step by StepCreate and Configure Windows Server 2016 VM in the Azure Step by Step
Create and Configure Windows Server 2016 VM in the Azure Step by Step
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

L2 tp i-psec vpn on windows server 2016 step by step

  • 1. http://www.mycertprofile.com/Profile/3992184764 L2TP/IPsec VPN On Windows Server 2016 Complete Lab (V2.0) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com
  • 2. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 2 | P a g e Table of Contents What is VPN?...................................................................................................................................................................3 Existing Active directory environment............................................................................................................................3 Existing DHCP Server Configuration:...............................................................................................................................4 VPN Server Setup and Configurations ............................................................................................................................5 VPN Configuration Steps:............................................................................................................................................6 Step 1: Join VPN Server to ITPROLABS.XYZ domain.................................................................................................6 Step 2: Add Remote Access role..............................................................................................................................6 Step 3: Enable and configure routing and remote access (Enable VPN Service) ...................................................10 Step 4: Allow VPN clients to obtain TCP/IP configuration from DHCP and use internal DNS.................................13 Step 5: Configure a preshared key for IPSec connection.......................................................................................14 Allowing internet users to connect through VPN .........................................................................................................15 Step 1: Active Directory Configuration .....................................................................................................................15 Step 2: Configure the Remote Access policies (NPS)................................................................................................17 Testing...........................................................................................................................................................................23 Create VPN connection from windows 10 Client......................................................................................................23 Allow internet connectivity with VPN.......................................................................................................................26 Connect to VPN.........................................................................................................................................................27 Check connected VPN client Status ..........................................................................................................................28
  • 3. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 3 | P a g e What is VPN? A Virtual Private Network (VPN) is a secure network tunnel that allows you to connect to your private network from internet locations. So, you can access and use your internal resources based on your permissions. Existing Active directory environment 1. OS: Windows server 2016 2. Domain Name: ITPROLABS.XYZ 3. Domain IP: 192.168.153.10/24 4. IP Scheme: 192.168.153.0/24 Full Windows Server 2016 Active directory lab: https://gallery.technet.microsoft.com/Install-Windows-Server-f37e3c6d?redir=0
  • 4. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 4 | P a g e Existing DHCP Server Configuration: VPN clients will contact the DHCP server to obtain our internal TCP/IP configuration so they can access internal resources, the DHCP server configuration explained as below: 1. Server IP: 192.168.153.10/24 2. Scope range: 192.168.153.50 – 192.168.153.254 3. DG: 192.168.153.2 4. DNS: 192.168.153.10 Full Windows Server 2016 DHCP lab: https://gallery.technet.microsoft.com/Installing-and-Configuring-bf727a5f?redir=0
  • 5. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 5 | P a g e VPN Server Setup and Configurations Server Name: VPN LAN IP: 192.168.153.11/24 WAN IP: public IP address Network configuration: We have 2 network interfaces one for LAN connectivity (in our domain scope) and another for WAN that will receive VPN client connection requests from internet.
  • 6. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 6 | P a g e VPN Configuration Steps: Step 1: Join VPN Server to ITPROLABS.XYZ domain First, Join our VPN server to ITPROLABS.XYZ domain, so we can use active directory to authenticate the incoming VPN client connections. Step 2: Add Remote Access role On VPN server, from Server Manager add remote access role as explained in the figures below
  • 7. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 7 | P a g e
  • 8. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 8 | P a g e
  • 9. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 9 | P a g e
  • 10. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 10 | P a g e Step 3: Enable and configure routing and remote access (Enable VPN Service) 1. On VPN, from Server Manager, open Routing and Remote Access. 2. Right-click VPN (local), and then click Configure and Enable Routing and Remote Access and follow the instructions as explained in the figures below
  • 11. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 11 | P a g e
  • 12. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 12 | P a g e
  • 13. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 13 | P a g e Step 4: Allow VPN clients to obtain TCP/IP configuration from DHCP and use internal DNS Here we will allow incoming VPN clients to obtain TCP/IP configuration from DHCP, also It’s better to allow VPN users to use the internal DNS server, so they can locate and access internal resources easily
  • 14. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 14 | P a g e Step 5: Configure a preshared key for IPSec connection On VPN server configure preshared key that will be used in IPSec connections Disable PPTP connections By default, VPN Server can receive 128 concurrent PPTP, SSTP and L2TP connections, you can increase this number of concurrent connections or decrease it or disable it by decrease the mentioned number - 128 - to zero, as explained in the figures below
  • 15. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 15 | P a g e Allowing internet users to connect through VPN Step 1: Active Directory Configuration Create active directory group to only allow members of this group to connect through VPN, to do this from active directory users and computers we will create active directory group (VPN_Users) and add member user to it (aabdelwahed) so we can use him as user testing. The following instructions are configured on ITPROLABS.XYZ domain (DC01)
  • 16. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 16 | P a g e Now you can add members to this group that you want to allow them to connect through VPN
  • 17. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 17 | P a g e Step 2: Configure the Remote Access policies (NPS) Users you want to allow them to connect through VPN must have grant access permission from Network policy Server or give users dial in grant access (One by one) permission from active directory users and computers wizard, in our scenario we will configure this permission through Network Policy Server (NPS) to allow members of VPN_Users group (Bulk Users) that we just created in active directory to access the network through VPN. the following steps configured on VPN Server. On VPN, from Server Manager, open the Network Policy Server console
  • 18. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 18 | P a g e
  • 19. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 19 | P a g e add users and groups that you want to allow them to connect through VPN
  • 20. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 20 | P a g e from this wizard, we can apply some polices and restrictions on VPN clients like session time limit.
  • 21. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 21 | P a g e Configuration summary
  • 22. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 22 | P a g e Make sure that your created policy order is 1
  • 23. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 23 | P a g e Testing Create VPN connection from windows 10 Client. First, create VPN connection to VPN Server public IP address (as explained in the figures below)
  • 24. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 24 | P a g e Now, configure our connection to use L2TP (as explained in the below figures)
  • 25. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 25 | P a g e
  • 26. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 26 | P a g e Allow internet connectivity with VPN By default, the connected to VPN clients can’t browse internet to solve this issues solved as explained in the figures below.
  • 27. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 27 | P a g e Connect to VPN Now you can use your VPN connection using aabdelwahed user who have grant access permission to connect through VPN according to his membership on VPN_Users group.
  • 28. L2TP/IPsec VPN On Windows Server 2016 Step By Step| Complete Lab 28 | P a g e Now, run ipconfig /all to check your VPN connection configuration, so now you can access the network resources based on your permissions. Check connected VPN client Status Now back to VPN server to check status of connected users also you can force disconnect any connected users as explained in the figures below.