been reading through this forum, and also 2012 r2 essentials, but somehow i am not getting my vpn to work
gen8 with 2 nics connected and ilo4 nic connected. Nic 1 is connected to internet, nic 2 to my internal network
nic 1: 192.168.2.200, with gateway
nic 2: 192.168.10.229, no gateway
nic 1 is connected to 4g router. Portforwardings for ports 80, 443, 1723 to ip 192.168.2.200
after installation of server 2016e activated a remotewebaccess.com adress at microsoft, and installed remotewebacces and vpn.
remotewebacces with /remote option is working
my windows 7 laptop is in the domain of my server, client connector installed, and backup etc working.
when i am at my office, or connected via a hotspot of my iphone, i want to make a vpn connection.
everytime i start this, i see shortly that username and login are checked, but that is it, connection stops.
i know i am overlooking something, but as allways, the longer you look, less change of finding it.
any suggestions?. No need to hurry, i can only test this again on saturday.😩😏. Have to work tomorrow.
any help is appreciated
A recent change in my ISP setup forced me to deal with an issue I have been keeping on the back burner. A while back, I had to change to a new VPN client for work. I had difficulty connecting as it told me a firewall must be blocking IPSEC or UDP. Blaming it on the router I had circled thru several with some initial success but ultimately failure. Having no choice now, I have narrowed it down to my network switch. the VPN is IPsec to a cisco vpn server (port 4500 and all).
Bottom line, with switches like GS108Tv2 and GS-1100-5 between my work pc and router (currently Sophos UTM 9) no problem. But my fancy tplink t1600g-28ts, no go. it validates the password ok but can't connect the vpn itself.
Any seasoned veterans out there have an idea how this switch could be messing it up?
thanks in advance!
I'm new around here, looked for the presentation thread but haven't found any!
Anyway I hope to be able to contribute (as far as my newbie's knowledge will be useful )....
Speaking about what I'm trying to do, I have this amazing microserver gen8, on which I have 2 3tb wd red as storage and an ocz 125gb ssd on 5° port.. Installed a couple of days ago mr. PROXMOX (I'm a complete newbie to it too ) and configured the xpenology 6.0 that runs amazingly!
Now.. I'm just wondering which is the best option to configure a vpn (possibily openvpn) and from my inexperience I found a couple of options:
- try a container with turnkey debian 8 OpenVPN
- install ubuntu on a VM and setup openvpn
- try the vpn server on xpenology
or the least pleasurable
- install openvpn on my windows 10 pc and leave it turned on in way to access the microserver through vpn..
What do you think is better to do? Considering that I am a real noob and will need some guide or some tutorial (already googled something and Have found a lot of material on the openvpn site.. but honestly can't find so much about proxmox and vpn)
PS: sorry for my english, but I'm italian and I'm still learning!
thanks a lot!
At my home office i have a HP Microserver N40L and i use “Windows Server 2012 R2 Essentials”.
On the past i had some initial configuration and instability problems with Anywhere Access + VPN, but somehow i finally have them working properly and stable for the last months.
But last week i needed to format the server and install a brand new and clean “Windows Server 2012 R2 Essentials”.
I have made the installation, then made all the updates, then i have added some roles and features and then i went to setup Anywhere Access + VPN and it’s giving me 2 errors (one saying that i have port 80 and 443 blocked and other saying i have more than one router on my network).
Both errors do not exist, because besides manual confirmation that ports are open, no network configuration was changed since last week. And if all was working in the past, now all should also work.
I have already try to turn all off and then try again to run the Anywhere Access + VPN repair wizard and the errors are still the same.
I have already pass too many hours trying to identify what is wrong… and i can’t wait to much longer.
So i have 2 requests to make to anyone reading this:
1- If anyone has any idea of what is the problema, and wants to share the advice, great! Please do.
2- I’m willing to hire and pay to an expert to remote login my server and solve the problem. I can provide remote access and be your remote eyes so you can see all the network setup. If you can do this, please reply to this thread with your email or send me a PM.
My network setup is as follows:
ISP Router (in bridge mode) > Router TP-Link ER-5120 > Smart Switch TP-Link TL-SG108E
Then Smart Switch then connects:
- Port 1 to Router
- Port 2 to Access Point TP Link TL-WA901ND (with QVLAN enable for private and public wifi networks)
- Port 4 to Unmanaged Switch TP-Link TL-SG1016
Then the Unmanaged Switch connects to my server and my home office computers.
After I have setup my office network and installed the “Windows Server 2012 R2 Essentials” Connector on all the Windows 10 desktop computers, all the desktops connect auto-connect to the server using the desktop Connector. The internal LAN is setup as a private domain network.
But with the Connector installation, I have noticed that it has also been created a VPN on all my desktop computer, inside my office on my internal LAN network that is disabled by default.
In a simple way and to resume, all my desktop computers connect properly to the server using just the desktop connector, with the VPN disabled.
I just use / enable the VPN on the laptop computers, always when I’m outside the office.
So my question is if I should also always enable the VPN by default on all my desktop computers that are located inside my office on my internal LAN network?
Can anyone advise me on this? Are there any kind of advantages vs disadvantages on having the VPN on vs off inside the internal LAN?