00:04
riding the remote access requires some additional configuration in our environment. We actually going to now work with our routing environment and figure the settings that we need to get figure.
00:17
Sarah manager and tools
00:19
survival. We need to be on
00:21
Ed. Choose from our routing remote access
00:26
going to open that up,
00:27
preserve our routing your road access counsel,
00:29
that is reality. Has situs configured here? We actually want to
00:33
un configure things so we could see the process of figuring him. So in this particular case, you may have if it's the first time you've done it
00:41
gotten the dialog box that tells you to enable direct action
00:45
if terms of our lab we're gonna cancel and that do that.
00:48
So we're gonna actually
00:52
server here. We're gonna disable routing remote access in this right There's also enable track taxes below that if we need to.
00:59
So we disable routing remote access,
01:00
says you're disabling the broader and removing its configuration to enable the router. You have to reconfigure it,
01:07
notice it says you have to reconfigure it from scratch.
01:10
We're gonna actually say yes because that's what we want to do when I go through the process of
01:14
reconfiguring so we could see the process.
01:18
moment here while that actually
01:19
disables all the writing remote access functionality that's already in place. That a writer. So there you go. Stopping, routing, remote access and others. We now have stopping remote access management,
01:30
and we then have a blank routing environments. Now, we have nothing in our pain on the right. We just have the rotter,
01:38
which means we now have two,
01:40
so haven't configure and enable it,
01:42
we just disable it now we're just going to re enable it
01:46
for the purpose. We want to have it done
01:48
figure and enable reason for wizard
01:53
goes to the next screen here. You don't need to worry about that first screen.
01:57
And now we need to tell what type of configuration that we want.
02:00
So remember, we work to figuring
02:02
is a V p. Ed. So what we want to do is promote actually style of Soviet VPN. You also have
02:08
that if we need never catches translation virtual private network access, and that if we were gonna choose that option,
02:15
secure connection between two private now where actually is basically a point to point VPN connection
02:20
or a custom configuration? Let's just customize it to whatever degree that we want to.
02:25
Well, we're going to do
02:28
choose remote access Dalla for VP yet because that's what we're working with.
02:31
You wouldn't click out next,
02:34
and we're gonna choose a VP ET
02:36
We could choose dial up also,
02:38
but we're going to choose just the VP yet.
02:45
And now we have to tell it,
02:49
interface? Is there going to be used?
02:51
So now we're kind of face. We actually have a decent too
02:54
and Internet. So if you have three connections that we're working with here,
03:00
so we have to have to choose,
03:01
which would we want A
03:04
work with would actually work with Ethernet to here.
03:06
Grants it select Ethan. It too,
03:09
in the cell reduces enable security on selecting interface by setting up packet filters. Static packet filters allow only DPM traffic to gain access to the server through the selected interface.
03:25
so we basically wantto make sure that we clear that. So
03:29
there was security on the selected interface with setting up static packet filters. So what, you want to clear that on Ethan? It too. It was Easter, that one in the Internet and also clears it. So
03:40
isn't it to where sugar too
03:44
disabled the enable security on
03:47
environment. So go ahead, click. Next.
03:53
And now we have, ah, networking says so you can assign remote VP clients to the network that you want them to use.
04:00
So we had to choose which water we're gonna work with. We're gonna show you stick with that Ethernet rather than our internet
04:05
to stick with Easy. That a click on
04:11
And now we actually have to take the next set.
04:15
the next piece of the puzzle is going to say,
04:16
How do you want I p addresses to be assigned to remote place when you get conducted in from external source?
04:24
How do you want to have an I P address assigned to that environment?
04:30
automatic or we could use a specified range of addresses.
04:33
which one do you want to do? Well, we want to use a specified range of addresses, so we actually want to force them to a specific part of our bargain.
04:41
So we go ahead and click next,
04:45
and we need to then assign a rage of addresses. So it's go ahead, create a rage of addresses to use here.
04:58
you want a quick? I knew that. Next,
05:00
and start your start, I p addresses
05:11
and we're gonna live it down to a narrow group. So 172 dot
05:17
There's really allowing
05:20
11 i p addresses. So it's a very limited number that tell us out here in the
05:28
how many I P addresses were actually allowing, which in this case is 11.
05:31
There. Go ahead and click out.
05:34
Now we could cook out next new added delete. We could do any of those options next.
05:41
It's his managing multiple remote access service. Is
05:45
are we going to manage multiple remote access service is
05:47
yes, we're going to do this. So where Russia has set up this server to work with a radius silver.
05:55
That's why did you want to be able to use radius for authentication.
05:58
It's a very quick at next.
06:01
And in hotels enter the primary and alternate radius service that this server will use for remote authentication in the county.
06:10
Well, that's for two straight forward were shot to put in our
06:14
primary and alternate if we have what ultimate. So.
06:16
But in this case, we know what we set up for our radio. Several when the vast was Ellen Dash D C. One
06:24
Hey, we're also gonna have to know that
06:26
shared secret password, so I actually have to put that. And also So
06:30
this is what this is where you want to be Careful about how long of a shared secret password you may use, because you have to type that all in there.
06:38
So go ahead, click on next. We're not gonna have a secondary at this point, or an alternate radio server will get just the one.
06:45
But if we had a secondary obviously would fill in the box there also
06:49
This is completing the rowdy remote access servers setup wizard and gives us our
06:54
A list of the configuration settings that we have enabled
06:58
and that we go ahead and click on.
07:00
Could you finish here?
07:02
And it will go through it.
07:03
Finish the process for us.
07:09
There you go. This is too sport
07:11
the relaying of DCP messages from remote access class. He must configure the properties of the D A. Should be really agent with the I p addresses of your
07:19
No, pay attention. What? It says there
07:21
the a c p. Relay agent.
07:28
You were just a quick okay here because it's not really girlie habits. Could figure anything,
07:31
but if we were using D C P relay In other words, we're using automatic address ng. We might need that use DCP relay across there.
07:39
That's what we cook. Okay, just acknowledge it. It actually complete the initialization information, and I'll start the remote access management environment.
07:47
And now we actually have
07:49
it all configured. So we have our network interfaces, airports or what? Access clients.
07:55
Uh, what s class logging policies? I p v. Four i p six. We have a configured environment