Can't access network resources over VPN with Server 2008

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
This is kind of a cross post and I apologize, but I posted it where I think it should be (Operating Systems) since I am pretty sure it's a config problem and not actually a network problem, and I haven't had much of a response. I hope someone here can help me figure out what I'm missing.

http://forums.anandtech.com/showthread.php?t=2391291
 

IndyColtsFan

Lifer
Sep 22, 2007
33,655
687
126
Copied from other thread:

I was asked today to set up VPN access for a small office with a 2008 sp2 standard server. I have done this before on Server 2003 and it was simple, but this is the first time I've tried it on 2008. So I followed this tutorial since it seemed to be pretty simple and thorough.

Now, remote clients can log in to the server and are given an IP address in the proper DHCP scope for the office, but can't access any network resources by name or IP. They can't even ping the server by name or by IP address (it does respond to pings while on the local network). So obviously something is not configured properly for the VPN but I'm not sure what I am missing. Is the tutorial wrong and/or missing steps somewhere?

I verified that the Routing and Remote Access service is set to allowed in the server's firewall and port 1723 is forwarded from the router to the server's IP address but I don't know what else to check.

Which router are you using? IIRC, PPTP uses GRE as well -- is that allowed through the firewall?

EDIT: I have PPTP access to my house and I just noticed that on the outside firewall, I do have GRE (protocol 47) explicitly forwarded in addition to port 1723. Could this be your problem?
 
Last edited:

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
It's a Netgear WNDR3700. And yes, port 1723 and GRE protocol 47 are both forwarded to the server's IP address.
 

rsutoratosu

Platinum Member
Feb 18, 2011
2,716
4
81
so once vpn in, can you ping the server at all ? ie ping the vpn server's internal ip, and ping other ip on the network
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
Nope. Once the connection is established, the client computer gets what appears to be a valid IP address from the server, but can't ping anything at all. Not the server's IP or name, or any other IP on the office network, or any web site. So the client is trying to route all communications through the VPN connection (as it should) but they simply aren't going anywhere.
 

IndyColtsFan

Lifer
Sep 22, 2007
33,655
687
126
Are you able to see the connected clients on the server? Does the server have multiple NICs? Also, for the heck of it, have you tried disabling the Windows 2008 firewall and running a quick test?
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
The server has one NIC. The firewall is disabled. I'm not sure how I'd check to see if the server can see the connected clients. Where would I go to look at that? Or just see if it can ping them?
 

IndyColtsFan

Lifer
Sep 22, 2007
33,655
687
126
The server has one NIC. The firewall is disabled. I'm not sure how I'd check to see if the server can see the connected clients. Where would I go to look at that? Or just see if it can ping them?

It has been a long time since I looked at RRAS, but I thought there was a node which showed connected clients.
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
It will probably be several days before I go back to that client's office, but I'll see if I can find that connections list to see if the server actually acknowledges that the client is connected.

Any other suggestions for things I should check when I visit the client?
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
I made it out to the client's office today, and verified that the port 1723 and protocol 47 were forwarded from the router to the server. The server was showing the test client in the active RRAS clients list with the correct IP address, and disconnecting that client from the list also actually disconnected the client itself from the VPN. However, I still couldn't access any network resources.

Using another suggestion I found online, I also forwarded port 500 to the server, and changed the firewall settings on the server so that instead of just allowing the RRAS service (which said it was allowing port 1723) I manually added a new entry specifically for port 1723 and port 500 and now clients are able to ping network resources both by name and by IP address.

I don't know if it was the specific port 1723 firewall entry that fixed the problem or adding port 500, but it's working, and while I could log in to the router from here to disable the forwarding of port 500 for testing, if that kills the access then I'll have to drive an hour and a half back to the client to enable it again (they refuse to let me talk them through even simple changes over the phone) so I think I'll just leave it as it is for now. :)
 

IndyColtsFan

Lifer
Sep 22, 2007
33,655
687
126
I made it out to the client's office today, and verified that the port 1723 and protocol 47 were forwarded from the router to the server. The server was showing the test client in the active RRAS clients list with the correct IP address, and disconnecting that client from the list also actually disconnected the client itself from the VPN. However, I still couldn't access any network resources.

Using another suggestion I found online, I also forwarded port 500 to the server, and changed the firewall settings on the server so that instead of just allowing the RRAS service (which said it was allowing port 1723) I manually added a new entry specifically for port 1723 and port 500 and now clients are able to ping network resources both by name and by IP address.

I don't know if it was the specific port 1723 firewall entry that fixed the problem or adding port 500, but it's working, and while I could log in to the router from here to disable the forwarding of port 500 for testing, if that kills the access then I'll have to drive an hour and a half back to the client to enable it again (they refuse to let me talk them through even simple changes over the phone) so I think I'll just leave it as it is for now. :)

Yeah, that's very strange. I've never had to forward port 500 before in any of my PPTP implementations. From what I'm reading here, that should only be a requirement for L2TP as it is an IPsec control path and even then, you'd need some additional ports. Do they have IPsec implemented on their network? That might be why you have to forward that port.
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
No IPSEC that I'm aware of, but it's possible someone enabled something. I don't normally work on their server. I was just asked to set this up because the owner is a friend.

Anyway, I don't know why port 500 might have worked since it is definitely connecting using PPTP, but the connection does work now so I'll leave it alone.
 

xSauronx

Lifer
Jul 14, 2000
19,582
4
81
if that kills the access then I'll have to drive an hour and a half back to the client to enable it again (they refuse to let me talk them through even simple changes over the phone) so I think I'll just leave it as it is for now. :)

no teamviewer, logmein or some agent that gives you remote access?
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
no teamviewer, logmein or some agent that gives you remote access?

As logical (and preferable) as that would be, no. The owner wants to have this VPN connection available, but no 'public' remote desktop programs like Logmein or Teamviewer, and he's the boss so he gets to decide.
 

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
I'm starting to think that the ISP is doing something and the connection working after I added port 500 was just a coincidence. Without anything being changed at all on the office server or router, the VPN connection is now not working again. It's back to the same situation as before, where clients are able to connect and get an IP address, but can't do anything on the connection..
 

IndyColtsFan

Lifer
Sep 22, 2007
33,655
687
126
I'm starting to think that the ISP is doing something and the connection working after I added port 500 was just a coincidence. Without anything being changed at all on the office server or router, the VPN connection is now not working again. It's back to the same situation as before, where clients are able to connect and get an IP address, but can't do anything on the connection..

I don't know their network topology, so this may not work as I'm describing it but I'll go ahead and tell you how I would test and maybe you can do something similar. In my home environment, I have an external firewall and an internal firewall and a DMZ between them. If I were having weird issues with VPN and I wanted to rule out my configuration and point at the ISP, what I would do is take a laptop, wire it to the DMZ switch, give it an IP in the DMZ IP range, and I'd put a host entry into the laptop's hosts file which points the VPN host name to the DMZ IP of the VPN server. That way, I would know I'm connecting over my own equipment and network and remove the ISP from the equation. If that test works, then we're looking at only two possibilities as issues -- my external firewall (which I'd double and triple check) or something the ISP is doing.

Is their network topology configured in such a way that you can perform a similar test?
 
Last edited:

Fardringle

Diamond Member
Oct 23, 2000
9,200
765
126
I made another trip out to this small office yesterday and finally figured out why the VPN wasn't working. It turns out they have a Comcast router (for their IP phones) that cannot be set to bridged mode, instead of the basic modem that he was absolutely sure he had, and that router wasn't set to forward anything at all to the 'real' router. I don't have any idea why the VPN connections were still able to authenticate when nothing was being forwarded, but now that it's actually set up properly, it's working great. Thank you for the suggestions, and now I'll go sit in a corner and sulk because I missed something so simple (I didn't even look at the modem) the other times I went out there... :)
 
Last edited:

sonitravel09

Senior member
Jun 25, 2014
217
4
46
If you use a single NIC interface the solution for me was to configure RRAS with VPN and Lan Routing, use a static pool in RRAS and make sure the client has unchecked USE DEFAULT GATEWAY ON REMOTE NETWORK. That is the key actually. On the client side in properties of your VPN connection you will find in the TCP/IP properties under the advanced tab. If you want to access other LAN resources then configure VPN and NAT. For me I only needed to see a share on the server.