4620-1 ch08.f.qc 10/28/99 12:22 PM Page 281 Chapter 8 Internet Secrets In This Chapter Learning how to connect to the Internet Understanding Virtual Private Networks (VPN) Understanding Point-to-Point Tunneling Protocol (PPTP) Configuring Internet Explorer for Proxy Server and HTTPS (Secure) T his chapter could easily be an entire book. In fact, there are many books on the Internet (you can see many of these books listed at www.idgbooks.com). More important, let me set the tone for this chapter so that you will know what to expect. The Internet is necessarily discussed in almost every chapter of this book. So I am using this chapter to answer a few questions about the Internet, ones that I frequently encounter as a practicing Windows 2000 Server consultant. Obviously the history of the Internet has been covered in more texts than you or I care to count, so I’ll leave that topic alone. But it is interesting to note that the Internet is creating its own history each day. Its short life to date suggests that there are untold opportunities for you to capitalize on the Internet. But for you to do that, you first need to successfully attach your Windows 2000 server to the Internet. You have several ways to do this. In this chapter, after installing Remote Access Service, I’ll proceed with the dial-up approach and work toward more complex Internet configurations. Configuring Remote Access Service Hail to Windows 2000 Server, for it has simplified many tasks from its NT predecessors, including the installation and configuration of Remote Access Service (RAS). But first, a quick history lesson. You will recall that Remote Access Server (RAS) has been part of the remote networking solution set in Microsoft’s networking family since the earliest days of Windows NT Server (at which time it would only interact with the NetBEUI protocol). 4620-1 ch08.f.qc 282 10/28/99 12:22 PM Page 282 Part II: TCP/IP ■ ■ RAS has made something of a political comeback in the networking community. For years, RAS enjoyed mixed reviews at best for its unreliable support for modem-based dial-in and dial-out activity. However, with the advent of Virtual Private Networks (VPNs), RAS is back. It actually manages the VPN function very well in Windows 2000 Server, and I will discuss this later in this chapter. Well, RAS has come a long way in Windows 2000 Server. The RAS installation is much more intuitive, starting with the Windows 2000 Configure Your Server screen (see Figure 8-1). Following are the steps to configure Remote Access Service for inbound Internet-based traffic. This sets the foundation for the Virtual Private Networking (VPN) discussion later. Figure 8-1: Windows 2000 Configure Your Server STEPS: Configure Remote Access Service Step 1. From the Windows 2000 Configure Your Server screen, select the Networking link in the left pane and then select Remote Access. Select the “Open” link to launch the Routing and Remote Access MMC. Right-click the server object in the left pane (for example, TCI1) and select Configure and Enable Routing and Remote Access from the secondary menu (see Figure 8-2). 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 283 283 Chapter 8: Internet Secrets ■ ■ Figure 8-2: Configure and Enable Routing and Remote Access selection Step 2. The Welcome screen of the Routing and Remote Access Server Setup Wizard appears. Click Next. Step 3. The Common Configurations screen appears (see Figure 8-3). Select Remote Access Server. Click Next. Figure 8-3: Remote Access Server Be very careful about selecting the Network router option. First of all, there are many compelling reasons, such as advanced configuration management, to use true routers (such as Cisco) on your Windows 2000 network. Second, it enables two-way routing of network traffic to and from the Internet (if you’re connected directly to the Internet) and overrides the safeguards imposed by Microsoft Proxy Server’s local address table (LAT). Continued 4620-1 ch08.f.qc 284 10/28/99 12:22 PM Page 284 Part II: TCP/IP ■ ■ STEPS: Configure Remote Access Service Step 4. (continued) The Remote Client Protocols screen appears (see Figure 8-4). Select the appropriate button to accept or elect to add more networking protocols for remote access. Click Next. Figure 8-4: Remote Client Protocols screen Step 5. The IP Address Assignment screen appears (see Figure 8-5). After making your selection, click Next. Figure 8-5: IP Address Assignment screen Step 6. The Managing Multiple Remote Access Servers screen appears (see Figure 8-6). The screen allows you to elect to manage all RAS servers from a central point. This election clearly depends on whether you are managing a smaller LAN with only one RAS 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 285 Chapter 8: Internet Secrets 285 ■ ■ server (in which case the answer would be “No”) or managing a RAS server farm (in which case the answer would be “Yes”). Make a selection and click Next. Figure 8-6: Managing Multiple Remote Access Servers screen Step 7. Click Finish on the Completing the Routing and Remote Access Server Setup Wizard to complete the RAS configuration (see Figure 8-7). You will be returned to the Routing and Remote Access MMC. Select the WAN Miniport and click the Configure button. Select the Remote access (inbound) checkbox and enter the number of Maximum ports you want to allow (see Figure 8-7). The default is five for Maximum ports, which means you’ve configured five virtual circuits for your Virtual Private Network (VPN). That means up to five VPN connections can exist at one time. Figure 8-7: Finishing the RAS configuration 4620-1 ch08.f.qc 286 10/28/99 12:22 PM Page 286 Part II: TCP/IP ■ ■ Take a moment to look over the RAS configuration you have created by expanding the objects in the left pane of the Routing and Remote Access MMC. For example, if you select the Ports object in the left pane (below the server object), you will see the WAN Miniports that have been created with VPN support in the right pane (see Figure 8-8). Figure 8-8: Ports The L2TP ports relate to having the Remote Access Server use Internet Protocol security (IPSEC), a topic I cover in Chapter 13. If you right-click on the Ports object in the left pane and select Properties from the secondary menu, a Port Properties dialog box will be displayed that provides detailed information on the ports and allows you to modify the configurations (see Figure 8-9). Figure 8-9: Ports Properties 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 287 Chapter 8: Internet Secrets 287 ■ ■ The number of maximum ports you configure will create the denominator for the multiplexing algorithm used in Windows 2000 Server VPN scenarios. Huh? Simply stated, if you configure five ports, and you have five VPN sessions occurring simultaneously, the five sessions collectively divide the WAN bandwidth you have. For example, if your WAN link were a 256Kbps connection, this bandwidth would be divided amongst the active VPN sessions. Be sure to consider that fact when you decide on the maximum ports to configure. Perhaps you only want a few (say two) ports configured to protect your WAN-related bandwidth! To modify the configuration, select the Configure button while one of the devices is selected. The Configure Device screen will appear. Note in Figure 8-10, the PPTP WAN Miniport is configured for inbound connections only. This occurs because the Remote access connections (inbound only) checkbox is selected. Figure 8-10: Port configuration With a right-click on the Remote Access Policies object, and by selecting New, Remote Access Policy from the secondary menu, you can create a RAS policy that meets your needs. For example, you can establish day and time restrictions that a user can or cannot access your network via a VPN connection (see Figure 8-11). Dial-Up Connection Historically, RAS has been presented in the context of dial-in users. But did you know that RAS is used to expedite connections to the Internet as well? I’ll explore RAS’s role in Windows 2000 Server starting with a simple dial-up scenario. 4620-1 ch08.f.qc 288 10/28/99 12:22 PM Page 288 Part II: TCP/IP ■ ■ Figure 8-11: Time of day constraints A simple dial-up connection to the Internet assumes that you have performed several tasks: ■ You have correctly installed a modem via the Phone and Modem Options applet under the Control Panel. ■ You have installed the TCP/IP protocol. This was discussed in Chapter 4. ■ You have a valid Internet user account with the Internet service provider (ISP) of your choice. This should be a dial-up account that supports PPP, not SLIP. Such accounts for individuals with unlimited use average $20 to $25 per month. Business dial-up accounts are more expensive, but can easily be found for under $100 per month, with $50 per month being the average. ■ You have installed and configured RAS using the preceding steps (in the Configuring Remote Access Service section). ■ It is also important that the dial-out RAS capabilities be configured to use the TCP/IP protocol for an Internet connection scenario (again, see the preceding discussion in the Configuring Remote Access Service section). ■ You have configured a network and dial-up connection. These steps are explained in the text that follows. Creating and configuring a dial-up connection to the Internet can be dramatically easier if you request the setup configuration information from your ISP. By working closely with your ISP, you can save time when configuring your dial-up Internet connection. Every ISP that I’ve worked with will provide setup instructions on their Web page to assist you (see Figure 8-12). What information isn’t provided on their Web page can usually be obtained with a quick telephone call to the ISP’s technical support group. In fact, the ease with which you obtain the 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 289 289 Chapter 8: Internet Secrets ■ ■ configuration information that you need is a leading indicator of how strong your relationship with the ISP will be. Figure 8-12: An ISP dial-up configuration FAQ Configuring a network and dial-up connection Assuming that you’ve addressed each of the prerequisite points just described, it is now time to configure a dial-up connection. STEPS: To configure a dial-up connection Step 1. Launch the Network and Dial-up Connections applet in Control Panel. The Network and Dial-up Connections screen will appear. Step 2. Double-click the Make New Connection button. The Welcome to the Network Connection Wizard appears. Click Next. Step 3. The Network Connection Type screen appears (see Figure 8-13). Select the Dial-up to the Internet radio button. Click Next. The Internet Connection Wizard appears (see Figure 8-14). Continued 4620-1 ch08.f.qc 290 10/28/99 12:22 PM Page 290 Part II: TCP/IP ■ ■ STEPS: To configure a dial-up connection (continued) Figure 8-13: Network Connection Type screen Figure 8-14: Internet Connection Wizard The Internet Connection Wizard (ICW) first made its appearance in Small Business Server (SBS) and, having proved popular, was imported to Windows 2000 Server. I discuss SBS in Chapter 16. Step 4. The Setting up your Internet connection screen appears. You will select between connecting to the Internet with a phone and modem or from a local area network (LAN). After making your selection, click Next. 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 291 291 Chapter 8: Internet Secrets ■ ■ Step 5. The Step 1 of 3: Internet account connection information screen appears (see Figure 8-15). Enter the telephone number for your Internet Service Provider (ISP). Figure 8-15: Internet account connection information Microsoft claims “Most ISPs do not require advanced settings” on the Internet account connection information screen. This is not true. In fact, more often than not, you will need to click the Advanced button to provide DNS server information. Step 6. Click the Advanced button. The Advanced Connection Properties dialog box will be displayed. Select the Addresses tab (see Figure 8-16). Complete the address information as required and click OK. Figure 8-16: Advanced Connection Properties — Addresses Continued 4620-1 ch08.f.qc 292 10/28/99 12:22 PM Page 292 Part II: TCP/IP ■ ■ STEPS: To configure a dial-up connection (continued) It is here that you will provide IP address information and DNS information relating to your ISP connection. In most cases, your IP address is dynamically assigned when you’re just a good old end user; if you’re using a dedicated dial-up connection for your server and it’s running Microsoft Exchange (and the Internet Mail Service), you’ll most likely have a dedicated IP address to facilitate your e-mail routing (MX record-related). Also note on the Connection tab of the Advanced Connection Properties that Point to Point Protocol (PPP) is selected by default. This is typically correct, as few ISPs now support Serial Line Internet Protocol (SLIP) connections. Step 7. Assuming you completed any advanced configurations, you are now back at the Step 1 of 3: Internet account connection information screen. Click Next. One final word on telephone numbers. Be advised that you may need to enter the full ten-digit telephone number for additional telephone numbers supported by your ISP within the same general geographic area. With the advent of area code redistricting, ten-digit telephone numbers may be needed to place a call within your city (or even the same neighborhood!). For example, in Seattle, the metropolitan area now has several area codes, including 206, 425, 360, and 253. You only need to dial the area code and the telephone number to place a call locally; you do not need to precede the area code with a “1” when calling these area codes within the Seattle area. Step 8. The Step 2 of 3: Internet account logon information screen appears. Enter your ISP logon name and password. Click Next. Step 9. The Step 3 of 3: Configuring your computer screen appears. Provide a connection name and click Next. Step 10. The Set Up Your Internet Mail Account screen appears. It is here you would configure your POP e-mail account. To be honest, in most cases with Windows 2000 Server it is unlikely you would be configuring a POP e-mail account at the server. You are more likely to use a Microsoft Exchange-based e-mail account (let’s be serious here!). Select Yes or No and click Next. Step 11. Assuming you selected No in Step 10, the Complete Configuration screen will appear. Click Finish to complete dial-up configuration via the ICW. 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 293 Chapter 8: Internet Secrets 293 ■ ■ The preceding steps to configure an Internet dial-up connection will automatically modify your Internet Explorer (IE) configuration to use the new default dial-up connection that you have created. If you are on a network and using a full-time Internet connection, this will come as a big surprise to you. To fix this undocumented misconfiguration, simply launch IE and select Internet Options from the Tools menu. Select the Connections tab. Note the Always dial my default connection radio button was automatically selected for you as a result of the steps you just performed. I recommend that you select the Dial whenever a network connection is not present radio button. Dialing the Internet It is now time to call your ISP, successfully connect, and start using the Internet. There is no greater test in the eyes of your users than the ability to connect to and use the Internet. In fact, it’s unlikely users have much interest in the settings covered in this chapter; they just want to use the Internet. My advice on connecting to the Internet? Be sure to test this feature several times under different conditions and times of day before announcing your new Internet connection. There is nothing more disconcerting than to implement many of the Internet dial-up settings displayed in this chapter only to have your users call and say, “I can’t get my Internet e-mail.” Proper and extensive testing of the Internet dialing capability will prevent such calls. Assuming that you have successfully configured your network and dial-up connection (the steps earlier in this chapter), you are now ready to connect to the Internet. STEPS: To connect to the Internet via Network and Dial-Up Connections Step 1. Launch the Network and Dial-Up Connection applet from Control Panel. Step 2. Double-click the connection you want to use (for example, NWLink). Step 3. The Connect dialog box appears (see Figure 8-17). Confirm the user name and password you will use to connect to the Internet. Click the Dial button. 4620-1 ch08.f.qc 294 10/28/99 12:22 PM Page 294 Part II: TCP/IP ■ ■ Figure 8-17: Connect dialog box Step 4. After a few moments, you should be successfully connected to the Internet via your ISP. You are now ready to browse with your Web browser. If you have any troubles with your Internet dial-up connection, click the Properties button on the Connect dialog box. You may then double-check you settings on the General, Options, Security, Networking, and Sharing tabs. Dial-up connection status Often, it is desirable to know whether or not you are still connected to the Internet or to know the speed at which you are connected. Just observing the dancing activity light on an external modem is not helpful. You can monitor your Internet connection activity via the Routing and Remote Access MMC. Simply expand the server object in the left pane (for example, TCI1) and click Ports so that all of the ports are listed in the right pane (see Figure 8-18). 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 295 Chapter 8: Internet Secrets ■ 295 ■ Figure 8-18: Routing and Remote Access MMC Then double-click the port which is responsible for your Internet connection (for example, Sportster 28800...Modem). The Port Status dialog box will be displayed (see Figure 8-19). I have found the Port Status dialog box to be useful for more than just confirming my connection, connection speed, and call duration. It has been invaluable when working with technical support from the ISP to troubleshoot connection problems. The Port Status dialog box replaces Dial-Up Networking Monitor from Windows NT Server’s Control Panel. You might recall Port Status was a tab sheet in Dial-Up Networking Monitor (the other two tab sheets were Summary and Preferences). 4620-1 ch08.f.qc 296 10/28/99 12:22 PM Page 296 Part II: TCP/IP ■ ■ Figure 8-19: Port Status dialog box Port Status does not update dynamically, so you don’t have to press F5 or open and close it repeatedly for screen refreshes. You may recall that the Status tab sheet in Windows NT Server 4.0’s Dial-Up Networking Monitor did update dynamically. Dial-up networking with ISDN modems Connecting to the Internet via Network and Dial-up Connections with an ISDN modem is not very different from connecting via an analog modem. Two items must be addressed. First, make sure you have ordered and worked closely with your local telephone company to ensure that you have a fully functional and tested ISDN line at your location. Second, be sure to correctly install your ISDN modem on your Windows 2000 server. It will most likely be necessary to use the Windows 2000 Server drivers on the driver disk that ships with your ISDN modem. Note that the preceding discussion applies to ISDN modems, not ISDN routers. ISDN routers are discussed in the text that follows. 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 297 Chapter 8: Internet Secrets 297 ■ ■ Digital and Wide Area Network Internet Connections Certainly one of the most popular, reliable, and robust ways for Windows 2000 servers to connect to the Internet is directly via a digital network connection. But the term “directly” can mean a lot of different things. I will discuss five Internet/network connection scenarios, but understand that depending on how you design your Windows 2000 Server network, there are many different ways to connect to the Internet. Scenario 1: ISDN router An ISDN router (see Figure 8-20) is a low-cost solution for many businesses that enables a robust connection using either one (64Kbps) or two (128Kbps) ISDN channels to connect to your ISP. Typically, ISPs offer an ISDN connection solution that may act as dial-on-demand where the ISDN router calls the ISP and establishes a connection every time Internet-bound activity is detected by the ISDN router. These ISDN dial-on-demand arrangements usually have a monthly connect hour limit (say 200 hours), after which the business pays something like $10 per hour for each additional connection hour. Such dialon-demand arrangements can often cost under $200 per month. Another ISDN router-based solution is a full-time connection to the ISP, which by definition assures unlimited connection hours. This type of arrangement typically starts at $300 per month, but the charges may vary widely between ISPs. ISP-side ISP Host DNS Servers 198.137.231.1 192.135.191.1 INTERNET ISP's ISDN Router DNS Servers LAN Port 204.6.107.199 ISDN Router *Ethernet Windows 2000 Server 204.6.107.200 Figure 8-20: An ISDN router connection path to the Internet 4620-1 ch08.f.qc 298 10/28/99 12:22 PM Page 298 Part II: TCP/IP ■ ■ This router-based Internet connection solution requires that you make two entries on your Windows 2000 server for the connection to be fully functional. It also requires that your ISDN router be properly programmed to accommodate LAN and real Internet IP addresses and dial the ISP. First, you will need to make sure that the default gateway value for the TCP/IP configuration is populated with the address of the router’s LAN port. Second, you will need to complete the DNS fields on the DNS tab sheet with the DNS IP address values provided by your ISP. Note that in the remaining four Internet/network connection scenarios, it will be necessary to populate the default gateway and DNS fields in a similar manner. The key point to remember is that the default gateway field is typically the LAN port of the router (unless you are instructed otherwise, such as in a firewall scenario) and the DNS IP address values are the DNS servers used by the ISP. And in each of these scenarios, significant programming of the routers is required. Don’t kid yourself otherwise. Scenario 2: ISDN and WAN combination An ISDN connection may be combined with a WAN (see Figure 8-21) by small companies that may have an existing corporate WAN and want the Internet connection to be separate. I’ve seen this type of implementation in older business firms where old-guard CEOs and the like believe a separate Internet connection is the safest connection. And who is to say that they are wrong? Such a scenario also centralizes all Internet traffic through a single point, typically the home office of the company. Scenario 3: Direct Frame Relay connection Direct Frame Relay (Figure 8-22) is one of the most popular Windows 2000 Server Internet connection scenarios. Here, the ISP is connected via a frame relay WAN connection. This is a straightforward solution that enables different types of communications standards such as fractional T1, full T1, or even faster solutions to be easily implemented. Many old timers in the WAN connectivity area still consider a frame relay connection to be the most robust connection of all, even when compared to such new offerings as DSL and cable modems. However, note that I didn’t say frame relay was the cheapest, but perhaps the most reliable. 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 299 Chapter 8: Internet Secrets ■ 299 ■ ISP-side DNS Servers 198.137.231.1 192.135.191.1 INTERNET ISP Host ISP's ISDN Router DNS Servers LAN Port 204.6.107.199 ISDN Router Branch Ethernet Frame Relay Cloud Ethernet - Home Office Corporate WAN Router Branch Office Router Customer's LAN/WAN Windows 2000 Server 204.6.107.200 Figure 8-21: An ISDN and WAN connection to the Internet Router LAN Port 204.6.107.199 INTERNET Frame Relay Cloud ISP Host Ethernet Router Windows 2000 Server 204.6.107.200 ISP's Router Customer's LAN Figure 8-22: A frame relay connection between customer and ISP 4620-1 ch08.f.qc 300 10/28/99 12:22 PM Page 300 Part II: TCP/IP ■ ■ Scenario 4: WAN connection A WAN connection (Figure 8-23) is another popular Internet connection scenario for Windows 2000 Server networks. Here the ISP is a node on the company WAN. Simply stated, other nodes such as branch offices connect directly to the ISP without having to route Internet-bound traffic through the home office. With sufficient firewall protection in place, this is a both a viable and desirable solution. Branch Office Ethernet Branch Office Router Router LAN Port 204.6.107.199 INTERNET Frame Relay Cloud ISP Host Ethernet Router ISP's Router Branch Office Router Windows 2000 Server 204.6.107.200 Branch Office Ethernet Customer's LAN Figure 8-23: An Internet connection via a company WAN Scenario 5: WAN over the Internet (VPN) A WAN over the Internet is an increasingly popular connection scenario where each company node is also a node on the Internet. That is, the company WAN uses the Internet as its network backbone in a safe and secure manner. Such a scenario demands that the ISP be reliable, as it plays a central role in this solution. It is not a good idea to shop for ISPs by price alone when looking at implementing a virtual private network (VPN) solution (see Figure 8-24). 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 301 Chapter 8: Internet Secrets 301 ■ ■ Router ISP Router Internet Router Windows 2000 Server Branch Office ISP Router ISP Router Router Windows 2000 Server 204.6.107.200 Main Windows 2000 Server Branch Office Virtual Private Network Figure 8-24: A company VPN over the Internet The good news is that everyone enjoys a robust connection to the ISP and thus the Internet. That will keep the Web surfers happy. VPNs are further discussed in the next section on Virtual Private Networks. Scenario 6: DSL connections Another popular broadband connection to the Internet today is Digital Subscriber Lines (DSL). Using telephone lines (copper wire), you can make a high speed, full-time connection to the Internet for a surprisingly low cost (as low as $30 per month for full-time connection to the Internet). 4620-1 ch08.f.qc 302 10/28/99 12:22 PM Page 302 Part II: TCP/IP ■ ■ Implementing a DSL solution is easy. It’s the old two NIC-a-roo trick. That is, you place two network adapters in your Windows 2000 server. The first network adapter is for the internal LAN (say 10.0.0.x). The second NIC card is for the direct connection, using a crossover cable to the DSL router (a.k.a. modem, bridge). Figure 8-25 shows the most common DSL implementation. NIC #1 Internal Network NIC #2 Connects to DSL Router/Bridge Telco DSL Service Internet Windows 2000 Server DSL Router Bridge Telco ISP Figure 8-25: Common DSL implementation Depending on your telephone company, ISP and DSL router manufacturer, you may be using the DSL router as a modem or a bridge. You’ll know you’re using the DSL router as a router when you explicitly program the LAN and WAN ports with IP addresses and perhaps enable network address translation (NAT) so your SMTP-based e-mail can flow through to your mail server. You can tell you’re using your DSL router as a modem or bridge if you perform virtually no configuration tasks and you just plug it in, enabling traffic to flow through it without any activity performed against the traffic (for example, routing). Many telephone companies are in the business of providing DSL services (see Figure 8-26). In fact, I can say that it’s most likely the fastest growing segment of telephone company services today. Why? You’re already wired for it in your business and home if you have a telephone line connected and are located near one of the telephone company’s central offices. You typically must be within 15,000 linear cable feet of a telephone company’s central office to qualify for DSL service. This isn’t a good old “asthe-crow-flies” measurement. Rather, it’s within 15,000 feet of cable, and given the odd twists and turns cable runs can snake themselves into, 15,000 feet for the purposes of measuring DSL eligibility is going to be significantly less than you would imagine if you were to get into your car, drive to the neighborhood central office (CO), and determine your drive was less than three miles or approximately 15,000 feet. 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 303 Chapter 8: Internet Secrets 303 ■ ■ Figure 8-26: US West DSL Service The 15,000-foot CO-related DSL eligibility limitation mentioned previously is subject to change as telephone companies perfect the delivery of DSL services, develop better communication algorithms and, best of all, place repeaters between you and the CO to regenerate the DSL signal! In other words, the 15,000-foot value is likely to increase to 20,000 feet or more in the near future. Scenario 7: Cable modems A viable alternative to DSL service when seeking a high-speed and low-cost connection to the Internet is the use of cable modems. Cable modems, as the name implies, are network communication devices that connect your computer to the coaxial TV cable you’ve probably become addicted to (not the cable, but the cable service!). Dollar for dollar, cable modem-based Internet connections compare with DSL services when it comes to speed, cost, and reliability (not that all three components can’t be improved). And in many ways, the cable modem infrastructure is similar to DSL (two network adapters, communications intermediary), as seen in Figure 8-27. 4620-1 ch08.f.qc 304 10/28/99 12:22 PM Page 304 Part II: TCP/IP ■ ■ NIC #1 Internal Network NIC #2 Connects to Cable Modem Cable Modem Service Internet Windows 2000 Server Cable Modem Cable Service Provider ISP (Note this is often the same as cable service provider) Figure 8-27: Cable modem service But there are subtle differences between cable modem and DSL service. I’ve found the following to be true: ■ Bursty caching. Cable modem service is much more bursty than DSL. I found this out when a DSL-based VPN could accommodate entries into the corporate database without falling behind the keystrokes. The same scenario with cable modem service found the users getting ahead of the keyboard (that is, the character typed didn’t appear on the screen for several seconds). ■ Multiplexed situation. You are one with your neighbors in a cable modem scenario. Why? Because you are dividing that coaxial cable with your teenage kids watching MTV-2, your neighbor’s cable modem session, and that sports nut down the block watching ESPN. Simply stated, with cable modem service, you split the available bandwidth with everyone using the cable service on your block. That means, of course, that you will suffer poor performance via the cable modem connection as more and more neighbors log on to the Internet using the same approach. With cable modems, if possible, attempt to do your Internet computing session during non-peak hours such as midday when fewer neighbors are watching cable TV. It makes a dramatic difference in the performance you will enjoy with your cable modem service. ■ Primarily home use. The cable service providers have positioned cable modem services for use by homes, not businesses. One workaround for this is to run a small business from home, which won’t raise the suspicions of the cable company. ■ No Internet hosting. Because cable modem services are multiplexed solutions and are oriented to home use, the cable companies are very strict that you should not run a bona fide Internet server on the host 4620-1 ch08.f.qc 10/28/99 12:22 PM Page 305 Chapter 8: Internet Secrets 305 ■ ■ computer you’ve attached to the cable modem service. In other words, don’t be runnin’ a WWW or FTP server from your Windows 2000 Server at your home office when you have a cable modem service. It’s another case of necessity being the mother of invention. Consider the following the next time you’re in the middle of the boonies and you don’t qualify for DSL service: try cable modem service! That’s exactly what I did for a branch office of a not-for-profit that was literally located miles down a country road. It quickly became apparent that DSL wouldn’t work, but TCI provided cable modem service in the area. The service was ordered and implemented, enabling the end result, creating a VPN back to the home office, to be successfully achieved at a relatively low cost compared to frame relay. My point is that you should consider cable modem service when nothing else works. Several cable companies, including TCI (see Figure 8-28), are now providing cable modem services. To be brutally honest, the rollout of cable modem service is lagging significantly behind that of DSL services. Part of the reason is that cable companies must make significant infrastructure upgrades to accommodate cable modem service (such as making the flow of information two-way instead of one-way). Figure 8-28: TCI cable modem service 4620-1 ch08.f.qc 306 10/28/99 12:22 PM Page 306 Part II: TCP/IP ■ ■ Virtual Private Networks I’ll never forget that day. There I was, sitting in the IS Director’s office at a leading water cutting tool manufacturer. I was being quizzed relentlessly over the pluses and minuses of Windows NT Server 4.0, which at that time had just been released. The question posed was to name the top new features in Windows NT Server 4.0. After striking out with the obvious answers such as the new Windows 95-like GUI desktop, I gave up. The correct answer, in the eyes of the IS Director, was that Point-to-Point Tunneling Protocol (PPTP) was the top new feature in Windows NT Server 4.0. My experience that day spawned a lingering curiosity to learn more about PPTP and VPNs and to visit sites that have successfully deployed this solution. Whereas in the Windows NT days, finding successfully deployed VPNs were a challenge, I can report with great excitement that in the era of Windows 2000 Server, VPNs are now commonplace. Defining Virtual Private Networking It is now possible to feel connected to your company’s network while working from home or traveling on the road via a virtual private network (VPN). More importantly, network administrators appreciate the security provided by the point-to-point tunneling protocol (discussed next). As you would expect, the virtual nature of a VPN means that you do not have to be located within the four walls of your company. You can be outside, connecting to the company network via the Internet. Read on. Defining PPTP PPTP is really nothing more than a network communications protocol that permits the secure transfer of data from a remote site, such as a branch office, to a host server (typically the main server at the home office). Implementing this solution creates a virtual private network running over TCP/IP-based networks, such as the Internet. PPTP may be implemented over the Internet with dial-up connection or LAN/WAN digital connections as discussed in the previous section. In fact, Scenario 5 depicted a VPN that shows a typical PPTP implementation (see Figure 8-24). Security is implemented via encryption. The encryption occurs when the data is prepared for transmission over the Internet “tunnel” and the data packets are encapsulated by PPTP. Because of this encapsulation, the underlying LAN or network at the ends of the VPN may actually use any of three networking protocols: TCP/IP, NetBEUI, or IXP/SPX. Contrary to popular belief, the VPN clients do not need to use TCP/IP on their internal LANs. 4620-1 ch08.f.qc 10/28/99 12:23 PM Page 307 307 Chapter 8: Internet Secrets ■ ■ It is also important to understand that your ISP must support PPTP. The list of ISPs that provide such support is growing. When Windows NT Server 4.0 was first released, there was only one ISP in the Seattle area (Microsoft’s hometown) that provided such support. Now it is an exception to find an ISP that doesn’t support PPTP. Even the granddaddy of them all, CompuServe, supports PPTP (believe it or not!). The PPTP server must be Windows 2000 Server or Windows NT Server 4.0. PPTP clients may be Windows 2000 Server, Windows 2000 Professional, Windows NT Server 4.0, Windows NT Workstation 4.0, or Windows 98/95. Many resources are available for learning about how to implement PPTP over the Internet. Your ISP will provide you with specific PPTP configuration parameters, such as IP addresses, use of PPTP filtering, and so on. Searching Microsoft support area on its Web site (www.microsoft.com) will yield several pages on PPTP configurations. PPTP was installed on a Windows 2000 Server in the first part of this chapter in the Configuring Remote Access Service section. You will also need to install PPTP and VPN functionality on the client machine that will “VPN” into the corporate network. Here are the steps for implementing PPTP on a Windows 98 workstation. STEPS: To install PPTP on a Windows 98 client Step 1. Launch the Network applet in Control Panel. Step 2. Select the Add button. Step 3. Select Adapters. Select Microsoft as the manufacturer and then select the Microsoft Virtual Private Networking Adapter as shown in Figure 8-29. Click OK and, if necessary, provide the path to the Windows 98 source files. Figure 8-29: The Microsoft Virtual Private Networking Adapter Continued 4620-1 ch08.f.qc 308 10/28/99 12:23 PM Page 308 Part II: TCP/IP ■ ■ STEPS: To install PPTP on a Windows 98 client (continued) Step 4. If you have already installed TCP/IP, click OK at the Network dialog box and reboot your Windows 98 machine. If necessary, install the TCP/IP protocol. Step 5. Log on to your Windows 98 workstations and launch Dial-up Networking from My Computer. Step 6. Double-click Make New Connection. The Make New Connection dialog box will appear. Step 7. Complete the name and device fields in manner similar to Figure 8-30. It is important you select Microsoft VPN Adapter in the Select a device field. Click Next. Figure 8-30: Make New Connection dialog box Step 8. On the next screen, type in the host name or IP address (see Figure 8-31). This is the Internet-side IP address of the Windows 2000 Server network adapter card. This address is akin to dialing a telephone number to reach the VPN-capable Windows 2000 Server. It is also the address that is configured as an RAS-capable device. Click Next. For reasons I can’t fully explain, I have had much greater success trying to VPN into a Windows 2000 Server using an IP address than the host name. Somewhere, somehow the name resolution is going south on the ether. 4620-1 ch08.f.qc 10/28/99 12:23 PM Page 309 309 Chapter 8: Internet Secrets ■ ■ Figure 8-31: Host name or IP address Step 9. Click Finish. You have completed the Windows 98 client-side VPN configuration. You are now ready to implement a VPN between a PPTP server and a client. Here is how you would accomplish that. First, confirm the Windows 2000 Server and the workstation you intend to use have been properly set up. You are then ready to initiate a VPN session between remote host and Windows 2000 Server. STEPS: To create a VPN session between a Windows 98 client and Windows 2000 Server Step 1. From Dial-up Networking on the Windows 98 client, launch the VPN dialer you just created (for example, Corporate VPN). The Connect To dialog box will appear. Step 2. Enter your Windows 2000 domain user name and password (see Figure 8-32). Confirm the IP address or host name of the VPNenabled Windows 2000 Server you will contact. Continued 4620-1 ch08.f.qc 310 10/28/99 12:23 PM Page 310 Part II: TCP/IP ■ ■ STEPS: To create a VPN session between a Windows 98 client and Windows 2000 Server (continued) Figure 8-32: Connect To dialog box Step 3. Click Connect. An attempt to connect to your Windows 2000 Server will be made. If successful, you will be logged on to the domain. You have now established an RAS-based VPN session with a Windows 2000 Server. Another way to tell that you have successfully connected via a VPN session to a Windows 2000 Server is to look for the tell-tale network connection icon on the right side of your Windows 98 task bar. You know what I’m talking about — those little green dual computers! Step 4. Many sites that use VPN solutions further extend the VPN session by having the remote client (for example, the Windows 98 client) attach to and make use of a Terminal Server (a.k.a. Microsoft Windows Terminal Server) on the company network. Assuming you plan to do this and have installed the Windows Terminal Server client on your Windows 98 client, it is now time to launch the Terminal Server Client (see Figure 8-33) found in the Terminal Server Client program group. 4620-1 ch08.f.qc 10/28/99 12:23 PM Page 311 311 Chapter 8: Internet Secrets ■ ■ Figure 8-33: Terminal Server Client Step 5. Enter the Terminal Server name or IP address (for example, 10.0.0.4) in the Server field and click Connect. A Terminal Server session will be launched and the logon screen will appear (see Figure 8-34). Note that I’ve had more luck trying to connect to a Terminal Server via its IP address than its NetBIOS name (go figure!). Figure 8-34: Terminal Server session logon Step 6. Logon with your domain user name and password. Once authenticated, you will be presented with a bona fide Terminal Server session desktop (see Figure 8-35). You are now ready to accomplish your work. Continued 4620-1 ch08.f.qc 312 10/28/99 12:23 PM Page 312 Part II: TCP/IP ■ ■ STEPS: To create a VPN session between a Windows 98 client and Windows 2000 Server (continued) Figure 8-35: Terminal Server session desktop Want a final look at “VPNing,” as I like to call the verb form of this activity? In Figure 8-36, you can see the packet capture, via Network Monitor, of a VPN session between two Windows 2000 servers over the Internet. You will note the first several packets in the capture related to TCP and SMB session establishment. Once the VPN session is established, the data is encrypted and can’t be read with Network Monitor. I cover packet analysis and Network Monitor in Chapter 19. 4620-1 ch08.f.qc 10/28/99 12:23 PM Page 313 Chapter 8: Internet Secrets 313 ■ ■ Figure 8-36: Packet capture of Windows 2000 Server-based VPN session Internet Explorer Secrets I would be remiss if the Web browser topic wasn’t at least addressed in this chapter. On the other hand, it is important not to repeat the work of others that will teach you how to use a browser. Such browser basic books are listed at IDG Book’s Web site (www.idgbooks.com). I assume that you know how to use a browser to access information on the Internet. This assumption includes the ability to type an address, or URL, in the address field of Internet Explorer (IE) to get to a Web site on the Internet. Here’s an important secret that’s worth sharing. It’s an actual experience that I’ve had at client sites involving IE. The situation was this: A law firm administrator was responsible for managing the firm’s money market account at one of the online stock brokerages (such as e*trade). Like many networks that are connected to the Internet, this firm used a proxy server to protect itself from intruders. But not only did the law firm need the firewall protection of Proxy Server, but as I learned, an IS configuration modification was required to permit the client to access the firm’s confidential trading account information (which was an HTTPS secure session). 4620-1 ch08.f.qc 314 10/28/99 12:23 PM Page 314 Part II: TCP/IP ■ ■ When implementing an Internet connection via a proxy server, it is necessary to configure the proxy settings in IE so that browsing activity is directed through the proxy server and HTTPS is permitted. To do this, complete the following steps. STEPS: Configure Proxy Server and HTTPS support Step 1. Select Internet Options from the Tools menu in IE (Figure 8-37). Figure 8-37: Internet Options — Connections Step 2. Select the LAN Settings button. Step 3. Select the Use a proxy server checkbox. Step 4. Select the Advanced button. The Proxy Settings dialog box will appear. Step 5. Complete all of the fields with the appropriate Proxy Server IP address (or host name) and Port value (see Figure 8-38). You may also select the Use the same proxy server for all protocols checkbox after populating the HTTP field to auto-populate each of the remaining fields except the Socks field. Click OK. You will be returned to the Local Area Network (LAN) Settings dialog box. 4620-1 ch08.f.qc 10/28/99 12:23 PM Page 315 Chapter 8: Internet Secrets ■ 315 ■ Figure 8-38: Proxy Settings dialog box Step 6. Click OK. You will be returned to the Internet Options dialog box. Step 7. Click OK. You will be returned to IE. You must close and open IE for the new changes to take effect. It is common to only configure the HTTP setting in the Proxy Settings dialog box when using a proxy server on a network with IE. But many sites use HTTPS, which is the Secure field on the Proxy Settings dialog box. If the Secure field is left blank, you cannot access sites such as online stock brokerages. And that was exactly the problem at the law firm. Once I “fixed” the Secure field in IE’s Proxy Settings, the legal administrator was once again able to manage the law firm’s money. That was an important victory for me, the Windows NT Server consultant. The Proxy client configuration in Microsoft Small Business Server (SBS) leaves the Secure field blank (even though it populates the remaining Type fields in the Proxy Settings dialog box). So if you want to access HTTPS sites on an SBS client, you will need to manually configure the Secure setting on your IE browsers. SBS is discussed in Chapter 16 of this book. 4620-1 ch08.f.qc 10/28/99 316 12:23 PM Page 316 Part II: TCP/IP ■ ■ Summary This chapter covered the following: Configuring Remote Access Service Dial-Up Connection Digital and Wide Area Network Internet connections Virtual Private Networks Internet Explorer secrets Configuring Internet Explorer for Proxy Server and HTTPS (Secure)