Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Suggestions on running a VPN in front of a Terminal Services server

Posted on 2012-03-30
7
Medium Priority
?
362 Views
Last Modified: 2012-04-05
We're working with a subsidiary company that runs a Windows 2003 Server in Terminal Services mode to allow employees to work from home.  The same machine is also used to allow other subsidiaries on different network segments to remote in to the server.  The parent company has requested that all external traffic in to the TS Server now be across a VPN.  What is the quickest, cheapest way to accomplish this while making it as easy as we can on the employees who want to work from home and leaving internal employee traffic in to the server untouched?  In our opinion, RDP is already secure and that makes the requirement more of a line item to cross off rather than a major security project.  Any advice or EE links will be greatly appreciated.  Thanks,
0
Comment
Question by:james_axton
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 

Assisted Solution

by:ldelgado2323
ldelgado2323 earned 600 total points
ID: 37788873
Do you have any sort of firewall in place? if so, we can implement several solutions for this requirement, also, do you have a domain controller in place, this way we can use the security settings to create a VPN connection through routing and remote access......
0
 

Author Comment

by:james_axton
ID: 37789081
There is both a hardware firewall and a DC.
0
 
LVL 2

Expert Comment

by:adamnl
ID: 37793063
Are you sure about the statement 'RDP is already secure'? http://nakedsecurity.sophos.com/2012/03/16/rdp-exploit-china/

As a security consultant, I would give the same advice to clients. How to configure the VPN depends on the solution of your choice. As mentioned before the DC can be used to validate login credentials. For added security use certificates on company laptops (so people cannot easily connect with their insecure and possibly virus infected home pc).
0
Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

 

Author Comment

by:james_axton
ID: 37797452
Let's close this out.  We can run this through an existing firewall (presumably with some sort of licensing, unless that ability was included) or we can purchase a hardware VPN.  What are the other options here?  idelga, please followup with any suggestions you might have, and adamnl please do the same.  Thanks,
0
 

Expert Comment

by:ldelgado2323
ID: 37797460
If you give me the Firewall model, I can suggest some ways to do this if you still need help...
0
 
LVL 2

Accepted Solution

by:
adamnl earned 1400 total points
ID: 37797555
There are two approaches to using a firewall with a VPN server:

* VPN server in front of the firewall. The VPN server is attached to the Internet, and the firewall is between the VPN server and the intranet.

* VPN server behind the firewall. The firewall is attached to the Internet, and the VPN server is between the firewall and the intranet.

I advice the latter; the firewall is attached to the Internet, and the VPN server is an intranet resource that is attached to the Perimeter Network. The VPN server has an interface on both the perimeter network and the intranet. In this scenario, the firewall must be configured with input and output filters on its Internet interface that allow tunnel maintenance traffic and tunneled data to pass to the VPN server (For an additional layer of security, the VPN server can also be configured with PPTP or L2TP/IPSec packet filters on its perimeter network interface).

Because the firewall does not have the encryption keys for each VPN connection, it can filter only on the plaintext headers of the tunneled data. In other words, all tunneled data passes through the firewall. This is not a security concern, however, because the VPN connection requires an authentication process that prevents unauthorized access beyond the VPN server.

Settings that are set in this setup can be found here: http://technet.microsoft.com/en-us/library/cc737500%28v=WS.10%29.aspx#sectionSection3
0
 

Author Comment

by:james_axton
ID: 37813761
Thanks to everyone for the input!
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question