configuring the isa server

Upload: anyitjong

Post on 10-Apr-2018

236 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Configuring the ISA Server ..

    1/28

    INSTALLING AND CONFIGURING WINDOWS SERVER 2003 RADIUS SUPPORT FOR VPN CLIENTS INCLUDING SUPPORT FOR EAP/TLS AUTHENTICATION

    Some organizations may prefer to not join the ISA Server firewall/VPN server to their internal network domain. Theprimary reason for not joining the ISA Server firewall/VPN server to the internal network domain is to preventpotential intruders from using the firewall as a launch point for an attack on the internal network domain. While theprobability of the firewall being compromised is very small, it is a fact that the ISA Server firewall is a bastion hostand it is exposed to direct attack from the Internet.

    The only user accounts available to the machine are those configured in the local user database when the ISA Serverfirewall/VPN server is not joined to the internal network domain,. In this scenario, all user accounts need to be inputinto the local user database on the ISA Server firewall/VPN server machine. There is a lot administrative overheadwhen you mirror your internal network user database, including both user names and passwords, onto the ISAServer firewall/VPN servers local SAM database.

    A better solution is to use the Microsoft Windows Server 2003 Internet Authentication Service (IAS) . TheMicrosoft IAS Server is a Remote Authentication Dial In User Service (RADIUS) server. A RADIUS server acceptsauthentication requests from the ISA Server firewall/VPN server and forwards them to an authentication server. In aWindows Server 2003 domain, the domain controller represents the authentication server. The authentication serverconfirms or denies the authentication request and forwards the result to the RADIUS server. The RADIUS serverforwards it to the ISA Server firewall/VPN server.

    The Microsoft IAS Server can also be used to centralize the management of Routing and Remote Access Policy.You may wish to apply the same remote access policies to each server if you have two or more ISA Serverfirewall/VPN servers. You could manually configure Remote Access Policy on each server using the graphicalinterface or the netsh command. A better way is to the Microsoft IAS Server. You create Remote Access Policy onthe IAS Server and then configure the ISA Server firewall/VPN servers to use the IAS Server of your choice. Thepolicies configured on the IAS Server are applied to incoming VPN connections to the ISA Server firewall/VPNserver.

    You can also use the IAS Server to support advanced authentication, such as EAP-TLS authentication for PPTP andL2TP/IPSec clients. Advanced authentication methods using EAP enhance the security of your ISA Serverfirewall/VPN server configuration.

    We discuss the following procedures in this ISA Server 2000 VPN Deployment Kit Document :

    Installing the Windows Server 2003 IAS ServerConfiguring a VPN client Remote Access Policy on the IAS ServerConfiguring the ISA Server firewall/VPN server to use the IAS Server for authentication and accountingConfiguring the ISA Server firewall/VPN server to support EAP-TLS authentication for PPTP and L2TP/IPSecclients

    Installing and Configuring the Windows Server 2003 IAS Server

    Perform the following steps to install and configure the IAS Server:

    1. Click Start , point to Control Panel and click on Add or Remove Programs .2. Click the Add/Remove Windows Components button in the Add or Remove Programs window.3. In the Windows Components dialog box (figure 1), select the Networking Services entry and click the

    Details button.

    Figure 1 (1712)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    2/28

    4. In the Networking Services dialog box (figure 2), put a checkmark in the Internet Authentication Servicecheckbox and then click OK. Click Next in the Windows Components dialog box.

    Figure 2 (1713)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    3/28

    5. Click the Finish button on the Completing the Windows Components Wizard page.

    Now well make some basic configuration changes to the IAS Server.

    1. Click Start , point to Administrative Tools and click on Internet Authentication Services .2. In the Internet Authentication Services console, right click on the Internet Authentication Service

    (Local) node in the left pane of the console. Click the Register Server in Active Directory command(figure 3).

    This setting allows the IAS Server to authenticate users in the Active Directory domain. Click OK in theRegister Internet Authentication Server in Active Directory dialog box (figure 4).

    Click OK in the Server registered: dialog box (figure 5). This dialog box informs you that the IAS Serverwas registered in a specific domain and if you want this IAS Server to read users dial-in properties fromother domains, youll need to enter this server into the RAS/IAS Server Group in that domain.

    Figure 3 (1714)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    4/28

    Figure 4 (1715)

    Figure 5 (1716)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    5/28

    3. Right click on the RADIUS Clients node in the left pane of the console and click the New RADIUS Clientcommand (figure 6).

    Figure 6 (1717)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    6/28

    4. In the New RADIUS Client dialog box, type in a Friendly name for the the ISA Server firewall/VPN server(figure 7). You can use any name you like. In this example well use the DNS host name of the ISA Serverfirewall/VPN server, which is MSFIREWALL1 .

    Type in either the FQDN or the IP address of the ISA Server firewall/VPN server in the Client address (IPor DNS) dialog box. Do not enter a FQDN if your ISA Server firewall/VPN server has not registered itsinternal interface IP address with your internal DNS server. You can use the Verify button to test whetherthe IAS Server can resolve the FQDN (figure 8). Click Next .

    Figure 7 (1718)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    7/28

    Figure 8 (1719)

    5. On the Addition Information page (figure 9), leave the RADIUS Standard entry in the Client-Vendor drop

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    8/28

    down list box. Your ISA Server firewall/VPN server will use this setting. Type in a complex shared secret inthe Shared secret text both and confirm it in the Confirm shared secret text box.

    The shared secret should be a complex string consisting of upper and lower case letters, numbers andsymbols. Put a checkmark in the Request must contain the Message Authenticator attribute checkbox.This option enhances the security of the RADIUS messages passed between the ISA Server firewall/VPNand IAS servers. Click Finish .

    Figure 9 (1720)

    Configuring a VPN Client Remote Access Policy on the IAS Server

    You are ready to create a Remote Access Policy on the IAS Server. Remote Access Policies configured on the IASServer are enforced against VPN clients calling the ISA Server firewall/VPN server. The Windows Server 2003 IASserver has a Remote Access Policy Wizard that makes it easy to create a secure VPN client Remote Access Policy.

    Perform the following steps to create a VPN client Remote Access Policy on the IAS Server:

    1. In the Internet Authentication Service console, right click on the Remote Access Policies node and clickthe New Remote Access Policy command (figure 10).

    Figure 10 (1721)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    9/28

    2. Click Next on the Welcome to the New Remote Access Policy Wizard page (figure 11).

    Figure 11 (1722)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    10/28

    3. On the Policy Configuration Method page (figure 12), select the Use the wizard to set up a typicalpolicy for a common scenario option. In the Policy name text box, type in a name for the policy. In thisexample, well call it VPN Access Policy . Click Next .

    Figure 12 (1723)

    4. Select the VPN option on the Access Method page (figure 13). This policy is used for all VPN connections.You also have the option to create separate policies for PPTP and L2TP/IPSec VPN links. However, tocreate separate policies for PPTP and L2TP/IPSec connections, you need to go backwards in the Wizardand create two custom policies. In this example we apply the same policy to all VPN connections. ClickNext .

    Figure 13 (1724)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    11/28

    5. You can grant access to the VPN server based on user or group (figure 14). The best access controlmethod is on a per-group basis because it confers less administrative overhead. You can create a groupsuch as VPN Users and allow them access, or all your users access. It depends on who you want to giveVPN access to the network.

    In this example, we will select the Group option and click the Add button. This brings up the Select Groupsdialog box. Type in the name of the group in the Enter the object name to select text box and click theCheck names button to confirm that you entered the name correctly. Click OK in the Select Groups dialogbox and then click Next in the User or Group Access dialog box.

    Figure 14 (1725)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    12/28

    6. You can select the user authentication methods to allow on the Authentication Methods page (figure 15).

    You may wish to allow both Microsoft Encrypted Authentication version 2 and ExtensibleAuthentication Protocol (EAP) . Both EAP and MS-CHAP version 2 authentication are secure, so wellselect both the Extensible Authentication Protocol (EAP) and Microsoft Encrypted Authenticationversion 2 (MS-CHAPv2) checkboxes.

    Click the down arrow in the Type (based on method of access and network configuration) drop downlist box and select the Smart Card or other certificate option then click the Configure button. In the SmartCard or other Certificate Properties dialog box, select the certificate you want the server to use to identifyitself to VPN clients. The self-signed certificate appears in the Certificate issued to drop down list box. Thiscertificate is used to identify the server when VPN client are configured to confirm the servers validity. ClickOK in the Smart Card or other Certificate Properties dialog box and then click Next .

    Note : If you do not see the certificate in the Smart Card or other Certificate Properties dialog box, then restart the RADIUS server and start over. The certificate will then appear in the dialog box after the restart.

    Figure 15 (1726)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    13/28

    7. Select the level(s) of encryption you want to enforce on VPN connections (figure 17). All Microsoft clientssupport the strongest level of encryption. If you have clients that dont support 128 bit encryption, selectlower levels, but realize that you lower the level of security provided by the encryption method used by theVPN protocol. In this example well select only the Strongest encryption (IPSec Triple DES or MPPE128-bit) Click Next .

    Figure 16 (1727)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    14/28

    8. Review your settings on the Completing the New Remote Access Policy Wizard page and click Finish .

    Figure 17 (1728)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    15/28

    Configuring Remote Access Permissions

    The new Remote Access Policy requires the connection be a virtual or VPN connection. The VPN protocol can beeither PPTP or L2TP/IPSec. MS-CHAP v2 or EAP-TLS must be used to authenticate and the client must support thehighest level of encryption available for the VPN protocol they use to connect. The user must belong to the DomainUsers group in the domain specified in the Remote Access Policy.

    The next step is to configure Remote Access Permissions. Remote Access Permissions are different than RemoteAccess Policies. When a user calls the ISA Server firewall/VPN server, the parameters of the connection arecompared against Remote Access Policy or Policies defined on the IAS Server. Remote Access Policies are ahierarchical list The policy on top of the list is evaluated first , then the second listed policy is applied, then the thirdand so forth.

    VPN connection parameters are compared to the conditions of the policy. In the policy we created above, therewere two conditions: the connection type is a virtual connection and the user is a member of the Domain Usersgroup. If the connection request matches both of those conditions, then the Remote Access Permission of theaccount logging in is determined. Remote access permissions are determined differently depending on the type ofdomain the user account belongs to.

    Windows Server 2003 domains do not use the Mixed and Native Mode designations you might be familiar with inWindows 2000 domains. Windows Server 2003 supports domains of varying functional levels. If all the domaincontrollers in your domain run Windows Server 2003, the default functional level is Windows 2000 mixed. All useraccounts are denied VPN (Dial up) access by default in Windows 2000 Mixed Mode functional level. In Windows2000 Mixed Mode, you must configure each user account to have permission to log on to the VPN server. Thereason is that user account permissions override Remote Access Policy permissions in Mixed Mode domains.

    If you want to control Remote Access Permissions via Remote Access Policy, you must raise the domain functionallevel of Windows 2000 Native or Windows Server 2003. The default Remote Access Permission in Windows 2000and Windows Server 2003 domains is Control access through Remote Access Policy . Once you are able to useRemote Access Policy to assign VPN access permission, you can take advantage of group membership to allow ordeny access to the VPN server.

    When a connection request matches the conditions in the Remote Access Policy and the user is granted access viaeither the user account Dial-in settings or Remote Access Policy, the connection parameters are compared anumber of settings defined by the Remote Access Profile . If the incoming connection does not comply with thesettings in the Remote Access Profile, then the next Remote Access Policy is applied to the connection. If no policymatches the incoming connections parameters, the connection request to the ISA Server firewall/VPN server isdropped.

    The VPN Remote Access Policy you created earlier includes all the parameters required for a secure VPNconnection. Your decision now centers on how you want to control Remote Access Permissions:

    Allow Remote Access on a per group basis: this requires that you run in Windows 2000 Native or Windows

    Server 2003 functional levelAllow Remote Access on a per user basis: supported by Windows 2000 Native, Windows 2000 Mixed andWindows Server 2003 functional levelsAllow Remote Access on both a per user and per group basis: this requires Windows 2000 Native orWindows Server 2003 functional level; granular user based access control overriding group based accesscontrol is done on a per user basis

    Procedures required to allow per user and per group access include:

    Change the Dial-in permissions on the user account in the Active Directory to control Remote AccessPermission on a per user basisChange the domain functional level to support Dial-in permissions based on Remote Access PolicyChange the Permissions settings on the Remote Access Policy

    Changing the User Account Dial-in Permissions

    Perform the following steps if you want to control access on a per user basis:

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    16/28

    Click Start , point to Administrative Tools and click on Active Directory Users and Computers .1.In the Active Directory Users and Computers console (figure 18), expand your domain name and click onthe User node.

    2.

    Figure 18 (1729)

    Double click on a user account in the right pane of the console. In the user account Properties dialog box,click on the Dial-in tab (figure 19). The default setting on the account is Deny access. You can allow VPNaccess for the account by selecting the Allow access option. Per user account setting override permissionsset on the Remote Access Policy. Notice the Control access through Remote Access Policy option isdisabled. This option is available only when the domain is at the Windows 2000 or Windows Server 2003functional level.

    3.

    Figure 19 (1730)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    17/28

    Click Apply and then click OK to commit the Dial-in permission changes youve made to the account.4.

    Changing the Domain Functional Level

    If you want to control access on a per group basis, then you will need to change the default domain functional level.Perform the following steps to change the domain functional level:

    On a domain controller in your domain, open the Active Directory Domains and Trusts console. Click Start ,point to Administrative Tools and click on Active Directory Domains and Trusts (figure 20).

    1.

    Figure 20 (1731)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    18/28

    In the Active Directory Domains and Trusts console, right click on your domain and click on the RaiseDomain Functional Level command (figure 21).

    2.

    Figure 21 (1732)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    19/28

    In the Raise Domain Functional Level dialog box (figure 22), click the down arrow in the Select anavailable domain functional level drop down list, select either Windows 2000 native or Windows Server

    2003 , depending on the type of domain functional level your network can support. Click the Raise button aftermaking your selection.

    3.

    Figure 22 (1733)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    20/28

    Click OK in the Raise Domain Functional Level dialog box (figure 23). This dialog box explains the changeaffects the entire domain and after the change is made, it cannot be reversed.

    4.

    Figure 23 (1734)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    21/28

    Click OK in the Raise Domain Functional Level dialog box (figure 24) informing you that the functional levelwas raised successfully. Note that you do not need to restart the computer for the changes to take effect.However, the default Remote Access Permission will not change for user accounts until Active Directoryreplication and completed.

    5.

    Figure 24 (1735)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    22/28

    Return to the Active Directory Users and Computers console and double click on a user account. Click onthe Dial-in tab in the users Properties dialog box (figure 25). Notice how the Control access through

    Remote Access Policy option is enabled and selected by default.

    6.

    Figure 25 (1736)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    23/28

    Controlling Remote Access Permission via Remote Access Policy

    Now that you have the option to control access via Remote Access Policy, lets see how VPN access control viaRemote Access Policy is performed:

    Click Start , point to Administrative Tools and click on Internet Authentication Service .1.Click on the Remote Access Policies node in the left pane of the console (figure 26). You will see the VPNAccess Policy you created and two other, built-in Remote Access Policies. You can delete these otherRemote Access Policies if you require only VPN connections to your ISA Server firewall/VPN server. Rightclick on the Connections to other access servers Remote Access Policy and click Delete . Repeat with theConnections to Microsoft Routing and Remote Access server Remote Access Policy.

    2.

    Figure 26 (1737)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    24/28

    Double click on the VPN Access Policy in the right pane of the console. In the VPN Access PolicyProperties dialog box (figure 27) there are two options that control access permissions based on Remote

    Access Policy:

    3.

    Deny remote access permission Grant remote access permission

    Notice that this dialog box does inform you that the user account settings override the Remote AccessPermission settings: Unless individual access permissions are specified in the user profile, this policycontrols access to the network . Select the Grant remote access permission to allow members of theDomain Users group access to the VPN server.

    Figure 27 (1738)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    25/28

    Click Apply and then click OK in the VPN Access Policy Properties dialog box to save the changes.4.

    Configuring the ISA Server firewall/VPN Server to Support RADIUS and EAP-TLS Authentication for PPTPand L2TP/IPSec VPN Clients

    The next step is to configure the ISA Server firewall/VPN server to support RADIUS and EAP/TLS authentication.Perform the following steps to configure the ISA Server firewall/VPN server:

    Confirm that you have enabled the ISA Server firewall as a VPN Server. Please refer to ISA Server 2000VPN Deployment Kit document Configuring the Windows Server 2003 ISA Server 2000/VPN Server fordetails on how to configure the ISA Server firewall as a VPN server.

    1.

    Click Start , point to Administrative Tools and click on Routing and Remote Access . In the Routing andRemote Access console, right click on your server name and click the Properties command.

    2.

    Click on the Security tab in the servers Properties dialog box.3.

    Click the Configure button that lies to the right of the Authentication provider drop down list box. In theRADIUS Authentication dialog box (figure 28), click the Add button.

    In the Add RADIUS Server dialog box, type in the FQDN or IP address of your IAS Server. Make sure thatyour ISA Server firewall/VPN server can resolve the FQDN of the IAS Server to the correct IP address. Ifyou are not sure if the ISA Server firewall/VPN server can correctly resolve the FQDN of the IAS Server,use the IP address instead. Click the Change button.

    Type in the shared secret you configured on the IAS Server and then confirm the shared secret. Put acheckmark in the Always use message authenticator checkbox. Click OK in the Change Secret dialogbox, then click OK in the Add RADIUS Server dialog box, then click OK in the RADIUS Authentication

    dialog box. Click Apply in the servers Properties dialog box.

    Note You do not need to click on the Authentication Methods button that lies just under the Authentication Provider drop down list. This button allows you to configure authentication methods used by the ISA Server

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    26/28

    firewall/VPN server when using Windows Authentication instead of RADIUS Authentication .

    Figure 28 (1739)

    Click No in the Routing and Remote Access dialog box that informs you that you selected one or moreauthentication methods and would you like to view the Help topic.

    4.

    Click OK in the Routing and Remote Access dialog box (figure 29) informing that you must restart theRouting and Remote Access.

    5.

    Figure 29 (1740)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    27/28

    Click OK in the Routing and Remote Access Properties dialog box.6.Right click on the Routing and Remote Access node in the left pane of the console, point to the All Tasks

    command and click the Restart command.

    7.

    Figure 30 (1741)

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht

    f 28 01/11/2010 21:14

  • 8/8/2019 Configuring the ISA Server ..

    28/28

    The ISA Server firewall/VPN server is now ready to support VPN PPTP VPN connections using either MS-CHAPversion 2 or certificate based EAP/TLS authentication. Note that while we have configured RADIUS policy to supportcertificate based EAP/TLS authentication, the certificate used in this policy does not support L2TP/IPSec. You mustassign a machine certificate to the ISA Server firewall/VPN server, and the VPN client making the L2TP/IPSecconnection request must trust that certificate.

    iguring the ISA Server Firewall/VPN Server to Use RADIUS and... http://www.isaserver.org/img/upl/vpnkitbeta2/rraspolicyeaptlsradius.ht