HI.
> I have been asked to place one of my domain controllers into our DMZ in order for our vpn users to be able to authenticate using their network logins
Seems to me like a bad idea.
What kind of authentication - do you mean the XAUTH authentication for VPN connection (RADIUS), or authentication after the VPN is established and the user already have the yellow icon?
In any case I don't see the advantage of DC in the DMZ, unless I didn't get something here.
Try to add more description and details:
What OS in use on client computers?
What kind of services are accessed by VPN users?
What other servers are in the same DMZ?
And more details that are relevant...
Remember that one of the basic ideas of DMZ is that servers on the DMZ cannot access the internal network because they are at higher risk for attacks from the Internet.
If someone hacks a neighbor server (web server for example) in DMZ, it can then take control of the DC and from there it can control the whole entire network (for example simple change of logon script). This is not science fiction...
If VPN users have already access to the inside network, then there is no advantage for additional server in DMZ.
There are other issues like bandwidth. For example if your logon script or group policy is configured to automatic deploy software to workstations, it can cause bandwidth issues.
I normally prefer not to configure VPN clients to logon to the internal network. They logon locally before initiating VPN, and then use VPN to access specific services on the internal network (and/or for remote control/terminal services if they need to run things like database software).
Such services can run even on a XP Home machine that is not participating in the domain - do you get the idea?
Yizhar Hurwitz