设为首页 收藏本站
查看: 720|回复: 0

[经验分享] Windows Server 2012 SSTP ***

[复制链接]

尚未签到

发表于 2018-6-8 21:05:59 | 显示全部楼层 |阅读模式
If you want to build a *** to transfer files securely to and from your server and a remote location and you want to use Windows Server 2012, then an SSL oriented *** will be method of choice. SSL is the same technology your bank, Amazon, and the rest of the world uses to keep communication over the internet private. SSL uses encryption technology.Basic information about SSL is available here.
SSL can be used for other forms of secure file transfer in the Windows world, such as WebDAV, but this article is about using and building a secure type of *** known commonly as SSTP. Windows Server has technology built in that make an SSTP *** relatively simple to build. Windows PC does not include SSTP *** server technology as a part of Windows desktop, but you can make a Windows desktop PC a secure WebDAV server, if you want. Windows desktop can easily be made into an SSTP client that connects to an SSTP server.
You Have Choices
Windows Server 2012 allows you to build an SSTP *** in three different ways. They range from ridiculously simple to simple but slightly tedious. By ‘simple’, I mean simple assuming you feel comfortable with SSL and certificates. Enough information to ground you firmly can be found here,here, here, here, and here. I wish I could say the entire concept was ‘snap the fingers easy,’ but if it were, you wouldn’t be reading this and everyone would already know how to do it.
Regardless of the choices you make on the server, the client PC will connect the same way. There’s only one way to make a network connection to an SSTP *** from a Windows PC.
Port 443 on your router will also need to be forwarded to your *** server. Don’t forget to install your root certificate on all clients and the server.
I’m going to try to describe all three methods here.
Choice 1: Anywhere Access
If you have Windows Server 2012 Essentials, then you can use the Anywhere Access wizard to create a secure SSTP *** along with remote access. Read Windows Server 2012 R2 Essentials Anywhere Access. The Anywhere Access wizard is ridiculously simple to use, although managing SSL certificates may be a little confusing if you’ve never been exposed to them in the past. You don’t need to read any more of this page unless you’re curious.
Choice 2: Using the SSL Certificate Bound to Your Web Server
IIS and the Certificate Signing Request describes how to link an SSL certificate to your Windows Server Internet Information Services (IIS) web site. Afterward, you need to load the Routing and Remote Access role and associate the web site certificate with a field on the Security tab of the serverProperties by selecting it from a drop down box.
Choice 3: Using AD CS to Make Your SSTP Certificate Without Involving IIS In Any Way
This is a traditional way to build an SSTP ***. If you look for YouTube videos on this subject, this technique will be the one most often illustrated. You’ll need to load the Active Directory Certificate Services (AD CS) role and the Certification Authority Web Enrollment feature. Since you’re most likely managing a small, one server environment, you’ll configure AD CS as an Enterprise Root Server. If you’re configuring a multi-server environment with many users in an Active Directory domain, then you need more information than I am providing because AD CS can take on an entirely different scope in that instance. After you use AD CS to build your SSTP certificate, you also modify Routing and Remote Access as described above in Choice 2.
How To Do It
Choice 2 & 3: Modify The User Profile
If you are building your own SSTP *** connection, you need to modify the user profile of every user who will access it. This is the same modification you make for PPTP *** users.
DSC0000.jpg ____________________
Choice 3 only: Use AD CS to Create and Install SSTP Certificate Without IIS
In spite of the 29 pictures below, this is not hard, just tedious. Afterward, you configure Routing and Remote Access in the next section.
In summary, you first create an MMC console with the Certificate Template, Certificate Authority, andCertificate snap-ins. When given a choice, you add them to the computer account and / or local computer. If you understand that, you’ve eliminated about 1/3 of the pictures.
Next you duplicate the IPSec template and give the duplicate specific characteristics by flipping though the tabs.

  •   Subject Name: Supply in the request
  •   General: Give the template display name a friendly name
  •   Request Handling: Allow private key to be exported
  •   Extensions: Add Server Authentication to Application Policy
Thirdly, you go back to the MMC, select Certificate Authority / Certificate Template, right click, New / Certificate Template To Issue; then select the friendly name you made up in the step above.
Finally, you go back to the MMC, select the Certificates snap in / Personal / Certificates / right click / All Tasks / Request New Certificate. Click through until you see your friendly name. Underneath you’ll see some blue lines. Click for additional configuration. Add a common name and type your URL in the box underneath. Apply it.
Now you’re ready to configure Routing and Remote Access and link the certificate to your secure ***.
MMC Snap-In Selections:
DSC0001.jpg
DSC0002.jpg DSC0003.jpg DSC0004.jpg DSC0005.jpg DSC0006.jpg DSC0007.jpg DSC0008.jpg ____________________
Duplicate the IPSec Template
In the right, select Certificate Templates. In the center, select IPSec. Right Click. Duplicate Template.
DSC0009.jpg ###
Fill in the following tabs as illustrated below.
DSC00010.jpg DSC00011.jpg DSC00012.jpg DSC00013.jpg DSC00014.jpg DSC00015.jpg DSC00016.jpg DSC00017.jpg ____________________
Issue the New Template
Return to the MMC and select Certificate Authority. Expand it. Select Certificate Template / Right click / New / Certificate Template to Issue. Select your new template.
DSC00018.jpg DSC00019.jpg DSC00020.jpg Add the Certificate to the Certificate Store
In these final steps, you go back to the MMC and select the Certificates snap-in. Select Certificates / Personal / Right Click / All Tasks / Request New Certificate. Keep clicking through until you see the screen with your certificate and the blue underlined text. Click on the blue text and configure as illustrated, except use your URL and not the one in the picture.
DSC00021.jpg
DSC00022.jpg DSC00023.jpg DSC00024.jpg DSC00025.jpg DSC00026.jpg DSC00027.jpg DSC00028.jpg DSC00029.jpg ____________________
Done. Now for Routing and Remote Access.
Choice 2 and 3: Install and configure Routing and Remote Access
The following images were copied from Windows Server 2012 PPTP *** since, except for the last image, the installations are identical. Once you’ve loaded the Routing and Remote Access role, you could use the following images to configure a *** on Windows Server 2008 R2 if you wanted to.
Install the Routing and Remote Access Role
DSC00030.jpg
Configure Routing And Remote Access Services
Right click the selection next to the red mark. Select Configure and Enable Routing and Remote Access. The wizard will nag you about including DirectAccess. Just select *** only. DirectAccess is an always on SSTP ***.  The client must be in a domain and running Windows 7 Enterprise or Ultimate or the equivalent Windows 8 version. DirectAccess is more complicated to install than a typical SSTP *** or a secure WebDav Server.
DSC00031.jpg
###
Click Next.
DSC00032.jpg ###
Select Custom Configuration.
DSC00033.jpg ###
Select *** Access
DSC00034.jpg ###
Done.
DSC00035.jpg
###
Start the Service.
DSC00036.jpg
###
Right click the server name and select Properties.
DSC00037.jpg ###
Select the IPv4 tab. Select static address pool. Click Add.
DSC00038.jpg ###
Type in a range on your local network for IP addresses. The *** server will give the client PC a local IP address within this range. Make it relatively wide so it won’t conflict with one already in use on your local network. Or, better yet, sign on to your router and reserve a range if your router has this feature. Enter that range here.
DSC00039.jpg ###
Select the Security tab. In the drop down box toward the bottom, select your SSL certificate.
Done. Now Add A Network Connection to your Client PC.
DSC00040.jpg
____________________
Configuring The PC for *** Use
The only tricky part here is to add a value named NoCertRevocationCheck to the Windows registry. The spelling and capitalization have to be identical. Otherwise, the *** will not connect.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SstpSvc\Parameters
DSC00041.jpg DSC00042.jpg
###
Open the Network and Sharing Center and click Set up A New Connection or Network. Then Connect to a Workplace.
DSC00043.jpg ###
Click Use my Internet Connection (***)
DSC00044.jpg
###
Fill in the blanks. Don’t connect to the internet just yet.
DSC00045.jpg ###
Type in the designated user and password.
DSC00046.jpg ###
Next, you need to change a tab on the properties of the connection you just created. Find the *** connection by left clicking on the network icon in the lower right corner of the Desktop. Right click on the new *** connection and select Properties. Change it to look like this. Then Connect.
DSC00047.jpg ###
If you return to the Network and Sharing Center and  find the connection while it is open, the status should look like this. It confirms you are on a secure ***. Done.
DSC00048.jpg ____________________
  About these ads
  

  转自:https://advancedhomeserver.com/windows-server-2012-sstp-***/

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-520891-1-1.html 上篇帖子: Windows Server 2012从评估版转成正式版(windows2008相同) 下篇帖子: 基于Windows 2012R2 AD RADIUS无线认证
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表