Use a vpn to connect to an internal network

Assignment Help Basic Computer Science
Reference no: EM131413376

Objective: Use a VPN to connect to an internal network.

Description: In this project, you put the VPN to use. You create a VPN connection object on the remote client and connect to the TMG server. Then you create a firewall rule on TMG to allow the VPN clients access to the internal network. Once connected to the internal network, you map a drive on your Windows Server 2008 domain controller and place content on it.

1. Start Windows 7 and log in as an administrator.

2. Configure the Windows 7 IP settings. Enter an IP address of 192.168.1.120, a subnet mask of 255.255.255.0, a default gateway of 192.168.1.110, and a DNS server address of 10.0.0.125. You are now configured as an Internet client on the same network as the public side of the TMG server.

3. Click Start, and click Control Panel. If necessary, select Small icons from the View by menu in the upper-right corner, and click Network and Sharing Center.

4. Click Set up a new connection or network. Select Connect to a workplace, and click Next.

5. Click Use my Internet connection (VPN). Click I'll set up an Internet connection later.

6. In the Internet address text box, type 10.0.0.111, which is the IP address of your TMG server. In the Destination name text box, type Connection to corporate headquarters, and click Next.

7. In the User name text box, type ruser. In the Password text box, type Pa$word. Click the Remember this password box. In the Domain text box, type Teamx. Click Create. Click Close.

8. In the Network and Sharing Center window, click Connect to a network. In the Set Network Location window, click Work network. Click Connection to corporate headquarters, and click Connect. Click Properties, and click the Security tab. From the Type of VPN menu, select Point to Point Tunneling Protocol (PPTP). Notice that Require encryption is selected. Examine the content of the other tabs, and then click OK. If necessary, type ruser in the User name box. In the Password box, type Pa$word. If necessary, type Teamx in the Domain box. Click Connect. This attempt should fail.

9. Log on to TMG as an administrator. If necessary, open the Forefront TMG Management console. In the left frame, click Remote Access Policy (VPN). In the right frame, click Configure VPN Client Access. In the VPN Clients Properties window, click the General tab, and click the Enable VPN client access box. In the Maximum number of VPN clients allowed text box, type 5, and click Apply. In the Microsoft Forefront Threat Management Gateway window, click OK. Examine the content of the other tabs. Be sure that PPTP is enabled on the Protocols tab. Click OK. In the Forefront TMG window, click Apply. Click Apply, and then click OK.

10. Return to Windows 7, and attempt to connect to the internal domain controller, as you did in Step 8. This attempt should succeed. Open a command prompt, type ipconfig, and press Enter. You should see your network adapter with its 192.168.1.120 address and a virtual PPP adapter with an IP address in the 10.0.0.0/8 network, which was issued to you from the range that you configured on TMG. This address allows you to communicate on the internal network.

11. Log on to the Windows Server 2008 domain controller. Click Start, click Computer, and double-click Local Disk (C:).

12. Right-click any white space in the right frame, select New, and select Folder. Name the folder Target. Right-click Target, click Properties, click the Sharing tab, click Advanced Sharing, and click the Share this folder box.

13. Click Permissions, verify that Everyone is selected, and click the Full Control box in the Allow column. Click OK. Click OK.

14. Click the Security tab, and click Edit. In the Group or user names box, select Users (TEAMx\Users). Click the Full Control box in the Allow column. Click OK, and click Close.

15. Return to Windows 7. At a command prompt, type net use V:\\TeamxSRV\Target and press Enter. This attempt should fail. You are connected to the TMG server and you have a virtual network interface address on the internal network, but the firewall on TMG is keeping you out.

16. Return to TMG. In the Forefront TMG window, right-click Firewall Policy in the left frame. Click New, and click Access Rule. In the Access rule name text box, type Allow VPN Access and click Next. Click the Allow option button, and click Next. In the This rule applies to menu, select All outbound traffic, and click Next. Select Do not enable malware inspection for this rule, and click Next. Click Add, expand the Networks node, select VPN Clients, click Add, click Close, and click Next. Click Add, expand the Networks node, select Internal, click Add, click Close, and click Next. Accept the default user set of All Users, click Next, and click Finish.

17. In the Forefront TMG window, click Apply, click Apply, and click OK.

18. Repeat Step 15. Now that you have been allowed on the internal network, the command is successful. Change to the V: drive by typing V: at the command line and pressing Enter.

19. Create a file on the internal server from your remote Windows 7 system. Type copy con January_Sales.txt and press Enter. Type January sales have been slow but are expected to pick up. and press Enter. Type Ctrl+Z and press Enter.

20. Return to the Windows Server 2008 domain controller, and look in C:\Target. The new file should be present.

2275_7be64b42-a273-43ce-8f6b-d34502b63458.png

21. Leave your systems running for the next project.

Reference no: EM131413376

Questions Cloud

Describe alternatives for resolving the ethical dilemma : Summarize the ethical issue involved. Consider and describe alternatives for resolving the ethical dilemma, including possible ramifications for each alternative. Decide on a course of action
Describe a business that you may own some day : Imagine that you own each of the following businesses: Tinker's Home Security Service (sole proprietorship) Tinker & Tailor's Home Security Service (general partnership) Tinker & Tailor's Home Security Service (LP) Tinker & Tailor's Home Security ..
What would have been considered the right outcome : What would have been considered the "right" outcome? What would have been considered "wrong"? Why? To what ethical principle or principles was the person? Eho made the decision or took the action possibly adhering?
Discuss the main components of chaining : Discuss the main components of chaining and describe three common chaining procedures. Which would you select for Brenda and why? Provide the rationale for the behavior analyst's selection of behavior chaining to help Brenda
Use a vpn to connect to an internal network : Create a file on the internal server from your remote Windows 7 system. Type copy con January_Sales.txt and press Enter. Type January sales have been slow but are expected to pick up. and press Enter. Type Ctrl+Z and press Enter.
Are there gender differences in cohesive teams : Are there gender differences in cohesive teams? If so, what are they? Does cohesiveness make disengaging from a team more difficult when athletes leave it
Implications does the idea of the world : What implications does the idea of the world being flat have for business?
System development life cycle : An explanation of which of the FOUR (conversion, production, and maintenance) is most difficult in system development life cycle to do correctly and why?
Impact the accuracy of activity duration estimates : Many factors can impact the accuracy of activity duration estimates. Describe four of the problems associated with estimating time accurately, and the techniques you would use as a project manager to overcome them.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify content and functional requirements

Identify Content and Functional Requirements

  Privacy on a desktop application

How does data privacy on a mobile device differ from privacy on a desktop application?

  Identify advantages and disadvantages of including clients

What should the client know about the different management styles used in the initiation, execution, and closeout phases of the project?

  Minimum-cost staffing plan for the center

Determine a minimum-cost staffing plan for the center. How many full-time and part-time consultants will be needed? What is the minimum cost?

  Determine the total heat transfer for this process

Heat is transferred to the refrigerant such that the pressure inside the tank remains constant. The valve is closed when the last drop of liquid in the tank is vaporized. Determine the total heat transfer for this process.

  What questions should a control system answer

What questions should a control system answer?

  List four operating systems used on personal computers

List four operating systems used on personal computers, two operating systems used on servers, and four operating systems used on handheld devices. List advantages and disadvantages of the three most popular personal computer operating systems.

  Descriptions of data formats and to interpret raw data

The aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to interpret raw data according to a particular format.  In this exercise you will produce and read the dump of a ZIP file.

  Question regarding the java programming

Discuss GUI components, explain how to handle key and mouse events, and state how they relate to GUI programming in Java. What are the advantages of using an applet over a GUI?

  Calculate the time delay and round-trip path loss

Note that your path loss calculation ignores losses in the reflection at the moon's surface. What can you conclude about the likely commercial possibilities of this idea?

  Processes for developing the client solution

As a consultant, you bring to the table standard methods and processes for developing the client solution. Your solution may be a general one with special emphasis on at least two TCOs addressed in the course.

  Should digital dynamics use separate portals for employees

How could the concept of supply chain management apply to a company's service- based division? Provide some specific suggestions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd