You are on page 1of 20

• Articles

• Authors
• Blogs
• ISA Server Articles
• Links
• Message Boards
• Newsletter
• RSS
• Security Tests
• Services
• Software
• White Papers

Top of Form

Search Site Submit

Site Search
Advanced Search
Bottom of Form

Configure a VPN Connection Using Windows


XP
In this article we will learn how to configure a connection to a virtual
private network (VPN) using Windows XP. This article will show you
how to create a new VPN connection using Microsoft Windows XP.
By creating an encryption tunnel through the Internet, data can be
passed safely.
VPN Overview
A VPN is a private network created over a public one. It’s done with encryption, this way, your
data is encapsulated and secure in transit – this creates the ‘virtual’ tunnel. A VPN is a method of
connecting to a private network by a public network like the Internet. An internet connection in a
company is common. An Internet connection in a Home is common too. With both of these, you
could create an encrypted tunnel between them and pass traffic, safely - securely.
If you want to create a VPN connection you will have to use encryption to make sure that others
cannot intercept the data in transit while traversing the Internet. Windows XP provides a certain
level of security by using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling
Protocol (L2TP). They are both considered tunneling protocols – simply because they create that
virtual tunnel just discussed, by applying encryption.
Configure a VPN with XP
If you want to configure a VPN connection from a Windows XP client computer you only need
what comes with the Operating System itself, it's all built right in. To set up a connection to a
VPN, do the following:
1. On the computer that is running Windows XP, confirm that the connection to the Internet
is correctly configured.
• You can try to browse the internet
• Ping a known host on the Internet, like yahoo.com, something that isn’t blocking ICMP
2. Click Start, and then click Control Panel.

3. In Control Panel, double click Network Connections


4. Click Create a new connection in the Network Tasks task pad

5. In the Network Connection Wizard, click Next.


6. Click Connect to the network at my workplace, and then click Next.

7. Click Virtual Private Network connection, and then click Next.


8. If you are prompted, you need to select whether you will use a dialup connection or if
you have a dedicated connection to the Internet either via Cable, DSL, T1, Satellite, etc.
Click Next.

9. Type a host name, IP or any other description you would like to appear in the Network
Connections area. You can change this later if you want. Click Next.
10. Type the host name or the Internet Protocol (IP) address of the computer that you want to
connect to, and then click Next.
11. You may be asked if you want to use a Smart Card or not.
12. You are just about done, the rest of the screens just verify your connection, click Next.
13. Click to select the Add a shortcut to this connection to my desktop check box if you want
one, if not, then leave it unchecked and click finish.
14. You are now done making your connection, but by default, it may try to connect. You
can either try the connection now if you know its valid, if not, then just close it down for
now.

15. In the Network Connections window, right-click the new connection and select
properties. Let’s take a look at how you can customize this connection before it’s used.
16. The first tab you will see if the General Tab. This only covers the name of the
connection, which you can also rename from the Network Connection dialog box by right
clicking the connection and selecting to rename it. You can also configure a First
connect, which means that Windows can connect the public network (like the Internet)
before starting to attempt the ‘VPN’ connection. This is a perfect example as to when you
would have configured the dialup connection; this would have been the first thing that
you would have to do. It's simple, you have to be connected to the Internet first before
you can encrypt and send data over it. This setting makes sure that this is a reality for
you.
17. The next tab is the Options Tab. It is The Options tab has a lot you can configure in it.
For one, you have the option to connect to a Windows Domain, if you select this check
box (unchecked by default), then your VPN client will request Windows logon domain
information while starting to work up the VPN connection. Also, you have options here
for redialing. Redial attempts are configured here if you are using a dial up connection to
get to the Internet. It is very handy to redial if the line is dropped as dropped lines are
very common.
18. The next tab is the Security Tab. This is where you would configure basic security for
the VPN client. This is where you would set any advanced IPSec configurations other
security protocols as well as requiring encryption and credentials.
19. The next tab is the Networking Tab. This is where you can select what networking items
are used by this VPN connection.
20. The Last tab is the Advanced Tab. This is where you can configure options for
configuring a firewall, and/or sharing.
Connecting to Corporate
Now that you have your XP VPN client all set up and ready, the next step is to attempt a
connection to the Remote Access or VPN server set up at the corporate office. To use the
connection follow these simple steps. To open the client again, go back to the Network
Connections dialog box.
1. One you are in the Network Connection dialog box, double-click, or right click and select
‘Connect’ from the menu – this will initiate the connection to the corporate office.
2. Type your user name and password, and then click Connect. Properties bring you back to
what we just discussed in this article, all the global settings for the VPN client you are
using.
3. To disconnect from a VPN connection, right-click the icon for the connection, and then
click “Disconnect”
Summary
a dve rti se me nt

In this article we covered the basics of building a VPN connection using Windows XP. This is
very handy when you have a VPN device but don’t have the ‘client’ that may come with it. If the
VPN Server doesn’t use highly proprietary protocols, then you can use the XP client to connect
with. In a future article I will get into the nuts and bolts of both IPSec and more detail on how to
configure the advanced options in the Security tab of this client.

About Robert J. Shimonski


Robert J. Shimonski is an enterpreneur, a professional technology consultant and a published
author with over 20 years of experience working with technology. Robert's specialities include
virtualization, network/systems management, network/systems design and architecture, security
analysis, storage area network (SAN) design and depllyment and project
development/management.
Click here for Robert J. Shimonski's section.

Receive all the latest articles by email!


Get all articles delivered directly to your mailbox as and when they are released on
WindowSecurity.com! Choose between receiving instant updates with the Real-Time Article
Update, or a monthly summary with the Monthly Article Update. Sign up to the
WindowSecurity.com Monthly Newsletter, written by George Chetcuti, BSc in Computing & IS
(Honors), containing news, the hottest tips, security links of the month and much more.
Subscribe today and don't miss a thing!
Top of Form
Check 10,9,39 {D67B20E7-F97D HTML

• Monthly Newsletter

• Real-Time Article Update (click for sample)

• Monthly Article Update (click for sample)


Enter email ad

Bottom of Form

Latest articles by Robert J. Shimonski


• Windows 7 Security Primer (Part 3)
• Windows 7 Security Primer (Part 2)
• Windows 7 Security Primer (Part 1)
• Using Certificate-Monitoring Tools with Windows Server 2008
• Physical Security Primer (Part 2)

Related links
• Virtual Private Networking
• Comparing VPN Options
• Secure Socket Tunneling Protocol
• Configuring Gateway to Gateway L2TP/IPSec VPNs Part 2: Configuring the
Infrastructure

Featured Links*
Secure your Enterprise Network from External Threat
The solution empowers you to monitor the breaches, attacks, viruses, worms and trojans against
your network. It assists you to quickly contain the attacks.
Comprehensive, Automated and Flexible Compliance Solution
Get the reports generation automated for major regulatory compliance acts: PCI-DSS, HIPAA,
SOX& GLBA. Be ready to create reports for future compliance acts.
AuthLite for Strong Logon Security - Two Factors, One Touch, Zero Drivers
2-Factor Authentication affordable for any organization. Easy Active Directory, VPN, and
Extranet integration. Tokens use existing software; no drivers needed!
Automatic network-wide patch management
Fix network security vulnerabilities before they are exploited by easily deploying patches and
service packs throughout the network as soon as they are made available. Free 30-day trial!

Receive all the latest articles by email!


Receive Real-Time & Monthly WindowSecurity.com article updates in your mailbox. Enter your
email below!
Click for Real-Time sample&Monthly sample
Top of Form

Check 9,10 ON ON {D67B20E7-F97D HTML

Enter Email

Bottom of Form

Become a WindowSecurity.com member!


Discuss your security issues with thousands of other network security experts. Click here to join!
Community Area
Log in | Register
Solution Center
• Articles & Tutorials
○ Authentication, Access Control & Encryption
○ Content Security (Email & FTP)
○ Firewalls & VPNs
○ Intrusion Detection
○ Misc Network Security
○ Product Reviews
○ Viruses, trojans and other malware
○ Web Application Security
○ Web Server Security
○ Windows 2003 Security
○ Windows Networking
○ Windows OS Security
○ Windows Server 2008 Security
○ Wireless Security
• Authors
○ Chris Sanders
○ Derek Melber
○ Ricky M. Magalhaes
○ Thomas Shinder
○ Deb Shinder
○ Mitch Tulloch
○ Robert J. Shimonski
• Blogs
• Message Boards
• Newsletter Signup
• RSS Feed
• Security Tests
• Services
○ Email Security Services
○ Managed security services
• Software
○ Anti Virus
○ Authentication / Smart cards
○ Email Anti-Virus
○ Email Content Security
○ Email Encryption
○ Encryption
○ Endpoint Security
○ Event Log Monitoring
○ File integrity checkers
○ Firewall security log analyzers
○ Firewalls
○ Free Tools
○ Group Policy Management
○ Intrusion Detection
○ Misc. Network Security Tools
○ Network Access Control
○ Network Auditing
○ Patch Management
○ Security Scanners
○ VPNs
○ Web Application Security
○ Web Content Security
• White Papers
Featured Products

Strong Authentication
For the Enterprise

Vulnerability & Patch Mgmt Download FREE trial!


Readers' Choice
Top of Form

269

Which is your preferred Email Anti-Virus solution?

• BitDefender Antivirus 2010

• Frontgate Perimeter Defense

• GFI MailSecurity for Exchange/SMTP

• Kaspersky Security for Mail Server

• modusGate&directQuarantine

• Panda Security for Enterprise


• SecurityGateway for Exchange / SMTP Servers

• SPAMfighter Exchange Module

• SpamTitan ISO

• Trend Micro InterScan Messaging Security Suite


please specif y

• Other
Vote!

Bottom of Form

TechGenix Sites
ISAserver.org
The No.1 Forefront TMG / UAG and ISA Server resource site.
MSExchange.org
The leading Microsoft Exchange Server 2010 / 2007 / 2003 resource site.
WindowsNetworking.com
Windows Server 2008 / 2003 & Windows 7 networking resource site.
VirtualizationAdmin.com
The essential Virtualization resource site for administrators.

• Articles
• Authors
• Blogs
• Books
• ISA Server Articles
• Links
• Message Boards
• Newsletter
• RSS
• Security Tests
• Services
• Software
• White Papers
About Us : Email us : Product Submission Form : Advertising Information
WindowsSecurity.com is in no way affiliated with Microsoft Corp. *Links are sponsored by
advertisers.
Copyright © 2011 TechGenix Ltd. All rights reserved. Please read our Privacy Policy and
Terms & Conditions.

Pentruputeri de administrator

http://forum.softpedia.com/lofiversion/index.php/t208063.html

You might also like