VPN connection between cloud server and on-prem domain controller
Posted on 2014-12-23
I'm pretty new to VPN connections, but over the last two weeks I have managed to set up a number of VPN connections to Windows 2003 R2, 2008 R2 & 2012 R2 servers.
Most (except one which had a decent Cisco gateway with a PPTP server capability) have been using the standard Windows Server RRAS configuration with PPTP and "dial-in" permissions for the various user accounts.
The most recent VPN I configured is to an Amazon EC2 server and it is the first one I have done using SSTP and a security certificate.
I can connect OK and our applications are working OK, but I'm to the point where testing for this server is about to go to production. There is one site which will be connecting with 5 or more users... so I was wondering if there was a way to create the VPN tunnel between the two servers rather than having each user in the office "dial-in"?
The AWS server's private IP is 188.8.131.52 and the on-prem DC server's private IP range is 192.168.1.0/24. The application we use needs the client side to connect to the server side using the server's IP (in this case the AWS server). This is why the "dial-in" works great because with DHCP enabled for a reserved range, the computers connecting to the AWS server are being given an IP in the same subnet as the AWS server - and therefore the application works fine.
If the answer to my above question is yes, how do I achieve this? Especially when each on-prem client computer will need to be able to point to the private side of the AWS cloud server for the application to work.
A side note if it will help:- the on-prem network has a CyberRoam VPN device (that was once used for a previous remote office).