Hi John.
From the description of your network, there should be no reason the use a
vpn [unless you just want to try it out of course]. Ipsec alone should be
able to secure communications on the lan. Since your computers are on the
same network - 192.168.1.xxx , they are not actually using the router to
communicate with each other, but are simply going through the switch. They
only use the router to connect to other network such as the internet.
Ipsec configuration is totally separate from vpn. It may be confusing
because ipsec ESP however is used for encryption in l2tp.
All you should need to do to use ipsec to secure lan communications using
normal transport mode is to configure the Local Security Policy/security
settings/ipsec security policy on each computer - no need to try configuring
a vpn connection. When ipsec policy is configured correctly it requires no
action on the part of the user and transparently secures network traffic
according to the rules in the policy. I would suggest you start by assigning
the request policy [right click policy/assign] on each computer, but editing
the all ip rule for authentication methods and select add use this
string/preshared key where you would enter your "password" for the ipsec
rule being sure to move it to the top of the list above kerberos. The
request policy will allow ipsec aware computers to secure communications
with each other as defined in the policy rules, but still allow
comminucations with non ipsec aware computers such as the internet.
Of course you will want to verify that network traffic is indeed being
secured between your two computers after configuring and assigning the ipsec
policies. To do that enter mmc in the run box to bring up the MMC and then
select file/add&remove snapin/add - select ipsec security monitor and close
the available snapin window and hit OK. Then you select your computer and in
main mode and quick mode look at security associations to see if your ipsec
configuration is correct in that an encrypted session has been set up. Look
under the columns for ESP confidentiality and ESP integrity to see if
something like 3DES and HMAC-MD5 are showing which will indicate that your
security association to the computer specified in the SA is encrypting data
according to the rules in the ipsec policy. Hope some of this helps. ---
Steve
john said:
Thanks again Steven,
Here are more details:
active directory on the ws2003 server pc is not enabled. They are on the
same home lan (this is more an experiment than trying to secure anything)
using ips from the linksys 4 port switch/router. both server pc, and client
xp pc are on wireless, as an .11b AP is plugged into the router, so the pc's
*are* going through the router whose wan port goes to a cable modem to the
net.
so the ws2003 server gets a dhcp from the linksys (router is 192.168.1.1),
and gives out 192.168.1.103 to the ws2003 pc, and 192.168.1.101 to the xp
pc. each pc has only 1 network (wireless) interface active.
i've tried pptp instead of auto to minimize key exchange issues, and i've
also used preshared key. the linksys firmware has ipsec and vpn passthrough
enabled.
the ipsec connections between the pc and server are not communicating, and
enabling of the server's snap in with server request assigned, disables it's
main network connection. the pc is not going through the server, they are
both attaching to the linksys through the ap and either can be turned off
and the will run fine for net access.
i'm not sure that an ipsec connection (without disabling main tcp
connection!) with single nics on each pc on the same subnet with dhcp
assigned addresses from a linksys router can work, at least with the ws2003
enterp ed, and xp pro (sp1). if you know otherwise, or have plug ins you
could send, that would be great, i will keep working on this. Thanks!