By now, all of you would be aware of what SSTP is and would also have got your questions answered in the FAQ column. We also saw in this blog, how to configure a SSTP client connection.
In this post, let's quickly look at the steps required to configure the VPN server as a SSTP server. We will use Routing and Remote Access on Longhorn server for this.
The VPN server will have two interfaces - public interface facing the internet and the private interface facing the intranet.
Step 1: Configuration of server authentication certificate on VPN server to be used for SSL
Step 2: Configuring the VPN server
The next step is to configure the RRAS server for VPN. Given below are the different steps that need to be done in order.
As you can see - all the steps given above except need of machine certificate remains same for RRAS server configuration that accepts PPTP connection. Infact the exact same steps are required for RRAS server configuration that accepts L2TP connection (because L2TP/IPSec requires machine certificate to be installed on RRAS server).
Additional troubleshooting and configuration points:
Soon - we will be publishing a step-by-step guide which will explain the entire setup in detail.
Janani VasudevanSoftware Design Engineer/TestRRAS, Windows Enterprise Networking
[This posting is provided "AS IS" with no warranties, and confers no rights.]
PingBack from http://www.security-blog.eu/2007/10/01/sstp-vpns-mit-windows-2008-server/
SSTP requires a machine certificate on the RRAS server which needs to be set inside HTTPS listener (i.e.
SSTP by default is configured to listen on all the interfaces (i.e. 0.0.0.0 for IPv4 or ::/0 for IPv6).