Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

AD domain authentication through VPN

Status
Not open for further replies.

ravashaak

Technical User
Nov 23, 2003
104
US
I am attempting to authenticate remote systems against my Windows 2000 domain. But before I go into details, let me lay out the setup:

Remote WinXP SP2 Laptop
w/ Cisco VPN client 4.0.5
|
|
|
Linksys 4-port 10/100 router
(PPTP passthrough enabled)
|
|
|
- - - - - - - -
| INTERNET |
- - - - - - - -
|
|
|
Cisco VPN Server
on Subnet A
|
|
|
Windows 2000 AD domain
on Subnet B



In my corporate environment, the network department runs the vpn server, top-level BIND DNS (non-dynamic) servers, and of course, the network itself. I recently requested that they setup relaying for my AD DNS servers as well as for my WINS server. This was in preparation for authenticating my machines through the VPN against my domain DC's.

I installed the Cisco VPN client v4.0.5 (Rel) onto my Windows XP SP2(firewall disabled) laptop. I configured the VPN client connection for "Group Authentication" and the VPN client to start before logon.

I can connect via the VPN client to our corporate cisco vpn server. However, it appears to me that the computer itself is not authenticating against my AD domain, and hence not becoming a member of the "domain computers" group. This causes problems because my gpo-defined startup scripts reference directories on my domain servers. These directories grant access based upon "domain computers"
group membership. The scripts run, but they encounter "access denied" errors when they attempt to access server resources. To me it appears that the machine account is not being authenticated against the AD domain, but I am not 100% certain. As I am uncertain how exactly to verify this. I guess there could also be some other reason that my remote systems cannot access the server-based resources, but if it's not authentication based, then what could it be?

There could be many causes here. Perhaps the relaying for my AD DNS and WINS servers is not functioning correctly. Perhaps a group policy setting is hampering remote authentication. Perhaps it's something else entirely.

I plan to ask the network department to verify the functionality of the AD DNS and WINS relay. However, I can't continually ask them to double-check their settings. So, what I need (in absence of an outright solution) are some troubleshooting tips. The more information I can verify myself, the less I have to bother others with
problems that are most likely mine to begin with.

Thanks for any and all suggestions.

- Ravashaak
 
Ok, I'm bumping this just once. If there's no answers afterwards, I'll give up the ghost :)

- Ravashaak
 
Well, although I would prefer a cleaner solution, I seem to have discovered an effective workaround. What I have done is added an entry to my lmhosts file on the remote PC per the instructions in the following link:


I'll need to perform further testing to discover exactly why this works. It could be that the dns/wins relaying is not working correctly, it could even have something to do with having a split dns namespace for my domain (ie abc.123.com to the outside world and xyz.abc.123.com internally). Although I'd prefer a non-lmhosts solution, I'll take it if it works.

Ahhhhh. Now I can scan/patch my systems via startup script no matter where they go :)

- Ravashaak
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top