Originally posted by: Blammo300
We are behind a firewall on both ends. I am however unsure of what type of VPN I am running. How do I find this out on the server?
Check the properties of the VPN connection you are trying to make. If you set the "Type" to PPTP, then it'll force a PPTP connection. Setting the type to "L2TP" will force an L2TP (certificate-based or Shared Secret-based) VPN connection.
Also how would I go about authorizing my laptop with a server certificate?
Install Certificate Services on your Windows Server and make it a Root Certification Authority.
Establish a connection to your Windows Server.
Open Internet Explorer. In the Address bar, enter http://"ServerName"/certsrv and click OK.
In the Enter Network Password dialog box, enter Administrator in the User Name text box and enter the Administrator?s password in the Password text box. Click OK.
Click the Request a Certificate link on the Welcome page.
On the Request a Certificate page, click the advanced certificate request link.
On the Advanced Certificate Request page, click the Create and submit a request to this CA link.
On the Advanced Certificate Request page, select the Administrator certificate from the Certificate Template list. Place a checkmark in the Store certificate in the local computer certificate store checkbox. Click Submit.
Click Yes in the Potential Scripting Violation dialog box.
On the Certificate Issued page, click the Install this certificate link.
Click Yes on the Potential Scripting Violation page.
Close the browser after viewing the Certificate Installed page.
Click Start and then click the Run command. Enter mmc in the Open text box and click OK.
In the Console1 console, click the File menu and the click the Add/Remove Snap-in command.
Click Add in the Add/Remove Snap-in dialog box.
Select the Certificates entry in the Available Standalone Snap-ins list in the Add Standalone Snap-in dialog box. Click Add.
Select the Computer account option on the Certificates snap-in page.
Select the Local computer option on the Select Computer page.
Click Close in the Add Standalone Snap-in dialog box.
Click OK in the Add/Remove Snap-in dialog box.
In the left pane of the console, expand the Certificates (Local Computer) node and the expand the Personal node. Click on the \Personal\Certificates node. Double click on the Administrator certificate in the right pane of the console.
In the Certificate dialog box, click the Certification Path tab. At the top of the certificate hierarchy seen in the Certification path frame is the root CA certificate. Click the your Server's named certificate at the top of the list. Click the View Certificate button.
In the CA certificate?s Certificate dialog box, click the Details tab. Click the Copy to File button.
Click Next in the Welcome to the Certificate Export Wizard page.
On the Export File Format page, select the Cyptographic Message Syntax Standard ? PKCS #7 Certificates (.P7B) option and click Next.
On the File to Export page, enter c:\cacert in the File name text box. Click Next.
Click Finish on the Completing the Certificate Export Wizard page.
Click OK in the Certificate Export Wizard dialog box.
Click OK in the Certificate dialog box. Click OK again in the Certificate dialog box.
In the left pane of the console, expand the Trusted Root Certification Authorities node and click the Certificates node. Right click the \Trusted Root Certification Authorities\Certificates node, point to All Tasks and click Import.
Click Next on the Welcome to the Certificate Import Wizard page.
On the File to Import page, use the Browse button to locate the CA certificate you saved to the local hard disk and click Next.
On the Certificate Store page, accept the default settings and click Next.
Click Finish on the Completing the Certificate Import Wizard page.
Click OK on the Certificate Import Wizard dialog box informing you that the import was successful.