JediFonger
2[H]4U
- Joined
- Jan 2, 2003
- Messages
- 2,777
^i'm using a D-Link DFL-200 firewall and server is running AD/DHCP/DNS/etc. VPN remote client is WXPP.
i've setup the remote VPN user to connect to the firewall's VPN server using WXPP's built-in VPN client (pptp). the remote VPN client can connect to the firewall and ping firewall's IP but can't ping any other IP inside of the
firewall. the VPN user is also receiving an ip that should be able to communicate computers inside the VPN (like 10.0.0.201). the remote VPN client can't view any shared folders on computers inside the firewall.
the firewall itself has a ping tool and can ping the VPN client's public and DHCP assigned address so the firewall/VPN (pptp server) can see the remote VPN user is connected. the firewall/vpn server can also see all of the inside addresses including server 10.0.0.1.
all of the computers inside the firewall can ping the ip assigned to the remote VPN user connected to the firewall but can't see anything on the remote VPN computer. it's just not available. what i mean is shared folders, inside computers can't see any share folders outside of the firewall.
so, it sounds like there's an authentication/config issue.
with workgroups, when i setup the firewall as a pptp server and assign the IP range from 10.0.0.201-254, then create a pptp user. the remote VPN user can connect and browse the shared folders and inside PC can browse share folders on the outside.
with domains, do i have to enable VPN server on the ad/dhcp/dns server? i thought the firewall itself was the pptp server and that enables the remote VPN clients to terminate their connections at the firewall and then connect to the domain network as if the remote client was physically located at the LAN? i thought that's the whole purpose?
what am i missing here?
re: policies, right now, inside computers can send stuff out (from LAN to WAN) and receive http and the usual stuff. from WAN to LAN there is no policies set therefore i think it's all restricted.