In this four part series I will be going through implementing Microsoft Remote Access Server /VPN only solution on Windows Server 2016 and integrating it with RADIUS / NPS server for Authentication then add on it Azure MFA implementation for second/Multi Factor authentication for VPN Users as sending message or getting a call on your cell phone.
Part 3 of this series We will configure the VPN on the client machine and deal with common issues and frequent questions as accessing your Shares, DFS root from your VPN client.
For 2 NIC server (Multi-homed server)we need to make sure of the following configuration:
- You have only one Gateway which will be on the Second NIC (The one on DMZ or External Network), the Internal NIC will have no Gateway.
- DNS servers will be specified on your internal NIC (This will be your internal DNS servers)
- If you have multiple VLANs on your network, you won’t be able to reach them from your VPN server since there is no Gateway on your internal NIC. You need to create static routes on the VPN server to these VLANs, For example if you have specific Servers subnet or other subnets as Printers or specific group then you need to create persistent route to this subnet (ROUTE ADD)
- Open the Server Manager on your Windows 2016 VPN server and click Add Roles and Features.
- Click Next and pick Role based or Feature based installation
- Ensure Select a server is your option and your server name is displayed and highlighted in the Server Pool below area
- Select the Remote Access Role
- Click Next – Add features and then select the first option Direct Access and VPN (RAS) as per the below screen shots
- Click Next for the Web Server (IIS) role installation (This is mainly needed for your Direct Access implementation – Don’t forget we picked the role that allow us to install both options, VPN and Direct Access). Click Next on the next screen for the IIS roles services.
- Confirm all your settings and check the Restart the destination server if required and go ahead for Install – It will take few minutes for the installation.
- After Installation is done you will get the option to configure the server with the warning sign displayed in your server manager as shown below. I would highly recommend not doing it this way so you can have better and full control on your configuration
- Instead from Tools, open Remote Access Management – Direct Access and VPN – Pick the second option Run Remote access setup wizard and choose to deploy VPN only
- Right Click on your server name – Configure and Enable Routing and Remote Access – Choose Custom Configuration – VPN access and click Finish (Check below screen shots)
- Your services will restart and the Remote access Service is up and running now and ready for configuration and Usage.
So in Part 1 of this series we installed and enabled the VPN only role on our Windows server 2016 box. In the next part we will start configuring the VPN properties and integrate it with our RADIUS server. Hopefully you enjoyed this part and see you on the next part.
Part 2 of this series http://itcalls.blogspot.com/2016/10/implementing-microsoft-remote-access_30.html
Part 3 of this series http://itcalls.blogspot.com/2016/11/implementing-microsoft-remote-access.html
Part 4 of this series http://itcalls.blogspot.com/2016/11/implementing-microsoft-remote-access_5.html
I am definitely enjoying your website. You definitely have some great insight and great stories.
Wow! Great post! The content is very rich, and I really like it.ms window server
Wow! Thanks for sharing this informative post, Its really worth reading.
Microsoft Server 2016 Support
Microsoft Server 2016 Migration
Best Installing VPN on Windows Server 2016 Method
Wow! This could be one of the most useful blogs we have ever come across on thesubject. Actually excellent info! I’m also an expert in this topic so I can understand your effort.