Suggestions on running a VPN in front of a Terminal Services server

We're working with a subsidiary company that runs a Windows 2003 Server in Terminal Services mode to allow employees to work from home.  The same machine is also used to allow other subsidiaries on different network segments to remote in to the server.  The parent company has requested that all external traffic in to the TS Server now be across a VPN.  What is the quickest, cheapest way to accomplish this while making it as easy as we can on the employees who want to work from home and leaving internal employee traffic in to the server untouched?  In our opinion, RDP is already secure and that makes the requirement more of a line item to cross off rather than a major security project.  Any advice or EE links will be greatly appreciated.  Thanks,
james_axtonAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

ldelgado2323Commented:
Do you have any sort of firewall in place? if so, we can implement several solutions for this requirement, also, do you have a domain controller in place, this way we can use the security settings to create a VPN connection through routing and remote access......
0
james_axtonAuthor Commented:
There is both a hardware firewall and a DC.
0
adamnlCommented:
Are you sure about the statement 'RDP is already secure'? http://nakedsecurity.sophos.com/2012/03/16/rdp-exploit-china/

As a security consultant, I would give the same advice to clients. How to configure the VPN depends on the solution of your choice. As mentioned before the DC can be used to validate login credentials. For added security use certificates on company laptops (so people cannot easily connect with their insecure and possibly virus infected home pc).
0
Protecting & Securing Your Critical Data

Considering 93 percent of companies file for bankruptcy within 12 months of a disaster that blocked access to their data for 10 days or more, planning for the worst is just smart business. Learn how Acronis Backup integrates security at every stage

james_axtonAuthor Commented:
Let's close this out.  We can run this through an existing firewall (presumably with some sort of licensing, unless that ability was included) or we can purchase a hardware VPN.  What are the other options here?  idelga, please followup with any suggestions you might have, and adamnl please do the same.  Thanks,
0
ldelgado2323Commented:
If you give me the Firewall model, I can suggest some ways to do this if you still need help...
0
adamnlCommented:
There are two approaches to using a firewall with a VPN server:

* VPN server in front of the firewall. The VPN server is attached to the Internet, and the firewall is between the VPN server and the intranet.

* VPN server behind the firewall. The firewall is attached to the Internet, and the VPN server is between the firewall and the intranet.

I advice the latter; the firewall is attached to the Internet, and the VPN server is an intranet resource that is attached to the Perimeter Network. The VPN server has an interface on both the perimeter network and the intranet. In this scenario, the firewall must be configured with input and output filters on its Internet interface that allow tunnel maintenance traffic and tunneled data to pass to the VPN server (For an additional layer of security, the VPN server can also be configured with PPTP or L2TP/IPSec packet filters on its perimeter network interface).

Because the firewall does not have the encryption keys for each VPN connection, it can filter only on the plaintext headers of the tunneled data. In other words, all tunneled data passes through the firewall. This is not a security concern, however, because the VPN connection requires an authentication process that prevents unauthorized access beyond the VPN server.

Settings that are set in this setup can be found here: http://technet.microsoft.com/en-us/library/cc737500%28v=WS.10%29.aspx#sectionSection3
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
james_axtonAuthor Commented:
Thanks to everyone for the input!
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
VPN

From novice to tech pro — start learning today.