Windows PTPP VPN as a service?

Posted on 2009-04-21
Last Modified: 2012-05-06
Hi folks,

I have a windows 2008 server, which has a VPN connection (client) to another server elsewhere. The problem is, I need this VPN connection to stay connected even when I logoff the system - so ideally I would want it to run as a service.

Is this possible?

Question by:JigsawTech
    LVL 4

    Accepted Solution

    Better off doing a site to site link via rras and restrict the routing across it to just that server.
    LVL 77

    Expert Comment

    by:Rob Williams
    Some folk have successfully done this with XP machines using Microsoft's srvany and inetsrv (see below) but it is pretty much a hack. Microsoft's Srvany and Instsrv, are designed to allow you to run an application as a service.;en-us;Q152460
    Run batch file as a service

    Between two servers, using Microsoft 'tools' it is usually done by creating a site to site IPSec connection and demand-dial interfaces. However I have not seen documentation on the later for 2008, it is a very lengthy configuration procedure and the connection can be somewhat unstable. If interested in the concept, the following outlines for server 2003:
    or using PPTP:

    Having said all of that, as dj_relentless stated, using two hardware VPN routers is a much better choice. These units are now so affordable, starting at <$150 US, that they will save you the cost of labor of setting up your Microsoft site to site VPN. A hardware solution is much easier to set up, far more stable, more secure, and offers slightly better performance.
    Though my first choice would be a pair of Cisco ASA 5500 series routers for about $500 ea, the Linksys RV042's at $200 are excellent, and if the budget is tight you can use the Netgear FVS318 or Linksys BEFVP41 for under $150.
    LVL 1

    Author Closing Comment

    Hi folks. Yep I tried demand dial with RRAS and it works perfectly! Ta.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    For a while, I have wanted to connect my HTC Incredible to my corporate network to take advantage of the phone's powerful capabilities. I searched online and came up with varied answers from "it won't work" to super complicated statements that I did…
    I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
    This tutorial will show how to inventory, catalog, and restore media from legacy versions of Backup Exec into both 2012 and 2014 versions of the software. Select Storage from the tabs along the ribbon bar as the top: Ensure the proper storage devi…
    This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now