This message brings up a subject I could use some input on. Here we have a seperate VPN and firewall setup, and they get confused. Does a straight firewall that supports VPN work any better? Are there disadvantages to having it all on one box? I can imagine it being cheaper and easier to support, but are there any security or managment issues that might make it a bad idea? -----Original Message----- From: MSU Network Administrators Group [mailto:[log in to unmask]]On Behalf Of Doug Nelson Sent: Tuesday, November 04, 2003 5:35 PM To: [log in to unmask] Subject: Re: DHCP, VPN, and Firewall combination question > > In the library, we're having a combination problem with DHCP, VPN, > and our building firewall, and are running out of places to look. > > The firewall blocks Windows ports (137-139, 389, 445, and 3389) at > the boundary of the Library staff physical network. We have a VPN server > inside the staff network. A PC connects using a DHCP connection in the > Library (or elsewhere on campus) and gets an IP address that is outside the > staff network. It then connects to the VPN, which assigns it an IP address > inside the staff network. Once that is done, Outlook can connect to our > mail server (which is inside the staff network), but the PC cannot map to > shared drives inside the staff network. It also cannot ping into the staff > network. If I change the firewall to allow the Windows ports from the > DHCP-assigned IP address, the PC can map to shared drives inside the staff > network. (Inference: the packets required to map the drive carry the > DHCP-assigned IP address, not the VPN-assigned IP.) However, the same PC, > connecting from home using DHCP through Comcast and the same VPN connection, > can map drives. (Inferen! ce! : the drive is mapped using the > VPN-assigned IP address.) Ipconfig shows the same information both in the > Library and over Comcast, except for the DHCP-assigned IP address and its > subnet mask (255.255.255.0 for Comcast, 255.248.0.0 in the Library). > > Where should we look next? When using a VPN connection, what > determines whether packets are sent with the VPN-assigned IP or the > DHCP-assigned IP? > > Any hints, tips, or outright solutions will be appreciated! > --Bill Wheeler I don't know of a really good (or simple) solution, but as someone else pointed out, it has to do with the source IP, VPN server, and destination IP's all living within the same network. We have noticed this, too, in our first attempts to set up our central VPN server. I suspect this works best when the IP addresses behind the VPN server are in a separate subnet from those on the "public" side. One way to solve this would be to use a firewall with NAT, and use private IP's on all local systems, or at least all of the VPN target systems. Part of the problem here is that many campus systems use a wide netmask (255.248.0.0), including any which use the campus DNS. Changing that netmask may help this particular problem, but the wide netmask is there to solve other problems, so I don't really want to change that. It may be necessary to play some routing games on the client PC, although I hope it doesn't come to that, since it's messy. However, if you want to try it, take a look at the ROUTE command. You may have to change some of the route metrics, or perhaps delete/replace some of the overlapping routing entries. Doug Doug Nelson [log in to unmask] Network Manager Ph: (517) 353-2980 Computer Laboratory http://www.msu.edu/~nelson/ Michigan State University