Module 4 Remote Access
Module 4 Remote Access
Lesson Objectives After completing this lesson, you will be able to:
Overview of VPNs
Site-to-site. Site-to-site
VPN connections, which also are known as router-to-router VPN connections, enable your
organization to have routed connections between separate offices or with other organizations over a
public network, while maintaining secure communications.
The definition of traffic-based rules consists of 5-tuple policies, that take into account the source and
destination IP addresses, the source and destination ports, and the network protocol.
LockDown VPN. This feature enforces a number of VPN device settings that affect its connectivity.
For example, you can ensure that a user cannot modify the VPN profile or disconnect an active VPN
connection.
You also can implement forced tunneling and block outbound traffic if the VPN connection is not
available.
1. Tap the Network icon in the notification area, and then tap Network settings.
2. In Network & internet, tap the VPN tab.
3. Tap Add a VPN connection.
4. In the Add a VPN connection dialog box, in the VPN provider list, tap Windows (built-in).
5. In the Connection name box, enter a meaningful name, such as Office Network.
6. In the Server name or address text box, type the FQDN of the server to which you want to
connect. This is usually the name of the VPN server.
7. In the VPN type list, select between Point to Point Tunneling Protocol (PPTP), L2TP/IPsec with
certificate, L2TP/IPSec with pre-shared key, Secure Socket Tunneling Protocol (SSTP), and IKEv2.
This setting must match the setting and policies configured on your VPN server. If you are
unsure, tap Automatic.
8. In the Type of sign-in info list, select either User name and password, Smart card, One-time
password, or Certificate. Again, this setting must match your VPN server policies.
9. In the User name (optional) box, type your user name, and then in the Password (optional) box,
type your password. Select the Remember my sign-in info check box, and then tap Save. To
manage your VPN connection, from within Network & internet, on the VPN tab, tap the VPN
connection, and then tap Advanced options. You can then reconfigure the VPN settings as
needed. Note: Your VPN connection will appear on the list of available networks when you tap
the network icon in the notification area.
Always On VPN
With traditional VPNs, the end user typically initiates the VPN connection by launching the VPN
client and authenticating. There are two common disadvantages with this:
Users have to be aware of what resources require VPN access and the additional steps the user must
perform every time they need to connect over VPN.
Traditional VPNs are an “all or nothing” solution.
Once connected, all network traffic is tunneled over the VPN.
This can lead to large amounts of bandwidth on the organization’s network being consumed when it
isn’t necessary.
The most notable example being remote users who frequently use publicly accessible websites and
resources.
They might need VPN access for one or two tasks, but inadvertently pass all internet traffic over the
organization’s network instead of directly through the end user’s ISP.
Always On VPN provides a more seamless experience for end users.
It supports remote access for domain-joined, nondomain-joined (workgroup), or Azure AD–joined
devices, and personally owned devices.
Administrators configure routing policies to determine when the client should direct traffic over the
VPN.
Policies can be based on user, hardware, or software criteria.
For example, you could enable device authentication for remote device management, and then
enable user authentication for connectivity to internal company sites and services.
Because it’s controlled by policies, the user no longer has to be concerned with when to connect or
disconnect from the VPN, whether they are remote or on the internal network.
Most organizations supporting VPN access typically have the technologies deployed that are needed
for Always On VPN.
Other than your Domain Controller and DNS servers, the Always On VPN deployment requires an
NPS (RADIUS) server, a Certification Authority (CA) server, and a Remote Access (Routing/VPN)
server.
Once the infrastructure is set up, you must enroll clients and then connect the clients to your on-
premises securely through several network changes.