+ All Categories
Home > Documents > Module Advanced Networking

Module Advanced Networking

Date post: 30-May-2018
Category:
Upload: kumararguru
View: 220 times
Download: 0 times
Share this document with a friend

of 50

Transcript
  • 8/9/2019 Module Advanced Networking

    1/50

    Advanced Networking

    Microsoft Windows XP New Hire

    Microsoft Confidential Provided Under NDA

  • 8/9/2019 Module Advanced Networking

    2/50

    2004 Microsoft Corporation. All rights reserved.

    Microsoft, Internet Explorer, and Windows are either registered trademarks ortrademarks of Microsoft Corporation in the United States and/or other

    countries.

    The names of actual companies and products mentioned herein may be thetrademarks of their respective owners.

    THE CONTENTS OF THIS PACKAGE ARE FOR INFORMATIONAL ANDTRAINING PURPOSES ONLY AND ARE PROVIDED "AS IS" WITHOUT

    WARRANTY OF ANY KIND, WHETHER EXPRESS OR IMPLI ED,

    INCLUDING BUT NOT LIMITED TO THE IMPLI ED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR P URPOSE, AND NON-

    INFRINGEMENT.

    No part of the text or software included in this training package may bereproduced or transmitted in any form or by any means, electronic ormechanical, including photocopying, recording, or any information storage and

    retrieval system, without permission from Microsoft. Because Microsoft mustrespond to changing market conditions, it should not be interpreted to be acommitment on the part of Microsoft, and Microsoft cannot guarantee the

    accuracy of any information presented after the date of publication. The names

    of actual companies and products mentioned herein may be the trademarks oftheir respective owners.

    To obtain authorization for uses other than those specified above, please visit

    the Microsoft Copyright Permissions web page athttp://www.microsoft.com/permission/copyrgt/img-req.htm.

    This content is proprietary and confidential, and is intended only for usersdescribed in the content provided in this document. This content and

    information is provided to you under a Non-Disclosure Agreement and cannotbe distributed. Copying, disclosing all or any portion of the content and/orinformation included in this document is strictly prohibited.

  • 8/9/2019 Module Advanced Networking

    3/50

    Table of Contents

    Introduction ..................................................................................5 Inte rnet Connect ion Sharing (I CS) ................................................7

    What Is I nternet Connect ion Sha ring? ....................................................7Network Address Translation..................................................................7DHCP Allocator .....................................................................................8DNS Proxy and Resolver ........................................................................8Discovery and Control .........................................................................10

    Hardware Requ irements .......................................................................11 Veri fying Con figu ration .........................................................................12

    Host IP Addressing.............................................................................. 13Client IP Addressing ............................................................................13

    Troubleshoot ing ....................................................................................14 Troubleshooting ICS Client Configuration ...............................................15Troubleshooting Connectivity from the ICS Client to the Internet ..............15Troubleshooting Connectivity from the ICS Client to the Internet ..............16Things to Remember ...........................................................................17

    Br idge ..........................................................................................19 Troubleshoot ing ....................................................................................22

    Remote Desktop .......................................................................... 23 Remote Desktop Features .....................................................................23 Remote Desktop Componen ts ...............................................................23

    Remote Desktop Protocol 5.1 ...............................................................23Remote Desktop Connection................................................................. 24Remote Desktop Web Connection..........................................................24Remote Desktop vs. NetMeeting ...........................................................25

    Configuration and Use...........................................................................26Enable Remote Desktop ....................................................................... 26Configuring a Client Connection............................................................28Remote Desktop Web Connection..........................................................34

    Remote Desktop and Remote Ass istance Compared..............................35Intended Purpose and Audience............................................................35

    Troubleshoot ing ....................................................................................36 Connectivity Issues with RDC ...............................................................36Visual Issues in RDC Sessions............................................................... 38

    Feature Issues in RDC Sessions ............................................................39Performance Issues with RDC...............................................................39

    VPN..............................................................................................41 Incoming VPN Connec tions ...................................................................43Troubleshoot ing ....................................................................................46

    Windows Messenger ....................................................................49 Login Issues ....................................................................................... 49Audio/Video Conferencing Considerations...............................................49

    Table of Figures

    Figure 1: Autodial configuration in Dial-up Connection Properties .............................................. 9Figure 2: ICS Host configuration...........................................................................................10Figure 3: ICS Client configuration .........................................................................................11Figure 4: ICS configuration..................................................................................................12Figure 5: Network Bridge.....................................................................................................19Figure 6: Bridged Network Connection Properties ...................................................................20Figure 7: Bridge Properties ..................................................................................................20Figure 8: Remote Desktop Connection ..................................................................................25Figure 9: Remote Tab in System Properties ...........................................................................26Figure 10: Remote Sessions Warning ....................................................................................27

  • 8/9/2019 Module Advanced Networking

    4/50

    Figure 11: Add Remote Desktop Users.................................................................................. 27Figure 12: Establish a Client Session ....................................................................................28Figure 13: Remote Connection General Tab........................................................................... 29Figure 14: Remote Connection Display Tab ...........................................................................30Figure 15: Remote Connection Local Resources Tab ............................................................... 31Figure 16: Remote Connection Programs Tab ........................................................................ 32Figure 17: Remote Connection Experience Tab ......................................................................33Figure 18: RDC Behind a PC NAT .........................................................................................37Figure 19: RDC behind a Hardware NAT................................................................................ 38Figure 20: Create VPN ........................................................................................................ 41Figure 21: VPN Configuration ..............................................................................................42Figure 22: Configure Incoming Connection............................................................................44Figure 23: Configure Direct connection.................................................................................45

  • 8/9/2019 Module Advanced Networking

    5/50

    Advanced Networking

    5

    Introduction

    Module Objectives:

    Discuss Internet Connection Sharing. Define a Network Bridge. Describe Remote Desktop. Explain Virtual Private Networking (VPN). Discuss Windows Messenger.

  • 8/9/2019 Module Advanced Networking

    6/50

  • 8/9/2019 Module Advanced Networking

    7/50

    Advanced Networking

    7

    Internet Connection Sharing (ICS)

    With Internet Connection Sharing (ICS), all the users of a small network canaccess the Internet by sharing the connection on one computer on thenetwork.

    What Is Internet Connection Sharing?

    ICS has several related functions that allow the home or small office user to

    share their one Internet connection with all other users on their network. Thesefunctions are:

    First, Network Address Translation, which does the passing and translating ofnetwork data from the private network to the public Internet. Then there is theDHCP allocator, which is a means of handing out IP addresses to the clients on

    the network. Next, there is the DNS Proxy and Resolver, which is used to

    resolve name queries for the internal network. Windows has autodialfunctionality, if the external connection is not always on. And finally, WindowsXP ICS allows automatic discovery and control by the network clients.

    Internet Connection Sharing is the same in both the Home and Professionalversions of Windows XP.

    Internet Connection Sharing was first introduced in Windows 98SE. Thetechnology was also included in Windows 2000 and Windows Millennium

    Edition.

    Network Address Translation

    Network Address Translation, or NAT, is really the primary function of ICS. Itdoes the passing and translating of data from the internal to the external

    network. NAT is a well-known Internet technology that has been in use for

    some time. To review the NAT process briefly:

    A request to an external resource is made from a client on the internalnetwork, which has an IP address in the RFC-defined private IP address rangeof 192.168.0.x (this is the private IP address range used in Windows ICS). The

    NAT computer takes the request, gives it a valid, public IP source address (itsown) and forwards the request on to the destination. When the responsecomes back, addressed to the NAT computers IP address, the NAT computer

    accepts the response, translates it back, and sends it on to the client computer

    that made the original request.

    One of the new technologies that Windows XP introduces into this is called NAT

    traversal. NAT traversal allows Internet applications that use specific

    technologies such as DirectPlay, Instant Messaging, Real-Time Communicationsor streaming media, to run on client computers of the private network, without

    requiring any manual configuration by the user. Some Internet applications

    that use this technology are the Remote Assistance utility built in to WindowsXP, and games that use DirectPlay version 8 or version 4.

  • 8/9/2019 Module Advanced Networking

    8/50

    8

    It should be noted that while they have largely the same functionality, NAT is

    not an application or Winsock proxy server, like Microsofts Proxy Server

    product. NAT works at a much lower level, requiring no configuration of theapplication, or installation of client software to enable its functionality. Becauseof this, it is transparent to the client it just works.

    DHCP Allocator

    The DHCP allocator in Windows XP ICS provides IP configuration information tothe clients on the internal network it functions like a mini-DHCP server. This

    functionality has not changed from versions of ICS in previous releases of

    Windows.

    When the network client, which is configured for DHCP starts, it sends a DHCP

    Discover request to the ICS host. The ICS host sends IP configurationinformation to the client, such as an IP address in the private IP address rangefrom 192.168.0.2 through 254, and a default gateway and DNS server address

    of 192.168.0.1 (which is the IP address of the ICS host itself on the internal

    side).

    This functionality is not the same as a full-blown DHCP server. For example, itis not configurable: it cannot be disabled, aside from disabling ICS itself, and

    the IP address range that it uses is always the same and cannot be changed orexpanded.

    DNS Proxy and Resolver

    The DNS Proxy functionality of ICS is necessary to enable clients to get toInternet resources by their familiar Fully Qualified Domain Names, such as

    www.microsoft.com.

    The DNS Proxy on the ICS host automatically relays a name resolution request

    for an external resource from a client out to its own DNS server on theInternet. When that reply comes back, the DNS Proxy does two things: it sends

    the response back to the client that requested it, and it also caches thatresponse in its own DNS cache. In this way, if that name resolution request

    comes through again, the DNS Proxy can simply directly respond to therequest, instead of having to forward it on and wait for the reply.

    While DNS Proxy functionality has always been in ICS, the DNS Resolverfunctionality was first introduced into ICS in Windows Methis is now inWindows XP. The DNS Resolver is a sort of mini-DNS server for the internal

    network. Previously, without this feature, for an internal client to resolve thename of another internal client, the first client had to rely on some form ofNetBIOS name resolution, while still using DNS for external name resolution.Now, the client can go to the same DNS server to resolve either external OR

    internal names.

  • 8/9/2019 Module Advanced Networking

    9/50

    Advanced Networking

    9

    Autodial

    Autodial takes these factors into account, and will generally keep a shared

    Internet connection alive, even if the user on the ICS hosts either logs off orswitches to a different user.

    Figure 1: Autodial configuration in Dial-up Connection Properties

    In the situation where the connection is not already established, again autodial

    will try to behave intelligently and automatically connect, using cached (or

    saved) credentials for the shared connection, whether the Internet requestcomes from a network client, or a user on the ICS host itself. Even if thecredentials for the shared Internet connection are not cached, when the

    Internet request comes through, autodial will pop up a screen on the ICS host

    asking for the credentials when it needs to establish the connection.

    The only time autodial will fail is if credentials have never been stored on the

    dial-up connection, and no one is logged on to the ICS host at the time autodialtries to make the connection (or if the user logged on to the ICS host does nothave the correct credentials for the dial-up connection).

  • 8/9/2019 Module Advanced Networking

    10/50

    10

    Discovery and Control

    Discovery and control of the ICS host by the clients is a new feature ofWindows XP ICS. It is enabled on the ICS host in the same area where ICS isenabled (and autodial as well, if the shared connection is dial-up). When

    enabled, the ICS host advertises its presence and availability to be controlled

    using a proprietary protocol named the ICS Simple Beacon Protocol.

    Figure 2: ICS Host configuration

    This advertisement is then picked up by the client, and a new icon for the ICShost appears in the Windows XP clients network connections folder. There isalso a standalone application that can be installed on Windows 2000, Windows

    Me and Windows 98 computers to allow them to control and monitor the ICShost as well.

  • 8/9/2019 Module Advanced Networking

    11/50

    Advanced Networking

    11

    When the icon in the network connections folder is double-clicked, a status

    screen for the shared Internet connection appears as shown below.

    Figure 3: ICS Client configuration

    This interface provides the user the status and some basic statistics for theconnection. In addition, two buttons are available for the client, Properties andDisable.

    The disable button does just that it disables (or disconnects) the sharedInternet connection, and this will affect every user on the network.

    The Properties button gives a few details of the connection, but also leads to a

    Settings button that allows the client user to enable, disable or configure

    shared services, such as a published FTP server, just as if the user were at theICS host.

    Hardware Requirements

    There are no specific hardware requirements for Internet Connection Sharing,other than that there be an Internet Connection to share. In other words, atleast two connections must be present. Any outbound connection listed in the

    network connections folder will have ICS listed on the Advanced tab, with theoption to enable or disable it shown as a check box, along with the options toenable the autodial and Discovery and Control options.

    Note: ICS set up on only one adapter at a time on the host machine at a time.

  • 8/9/2019 Module Advanced Networking

    12/50

    12

    Verifying Configuration

    Figure 4: ICS configuration

    To verify the host adapter settings or to enable ICS:

    1. Log on to the host computer as Administrator or Owner.

    2. On the taskbar, click start, and then click Control Panel.

    3. In Control Panel, click Network and Internet Connections found under Picka category.

    4. Under or pick a Control Panel icon, click the Network Connections icon.

    5. Right-click the connection that you use to connect to the Internet. For

    example, if you connect to the Internet using a modem, right-click theconnection that you want under Dial-up.

    6. On the shortcut menu that appears, click Properties.

    7. Click the Advanced tab.

    8. Under Internet Connection Sharing, verify that Allow other network users toconnect through this computers Internet connection check box is selected.

    9. If sharing a dial-up Internet connection, verify that the Establish a dial-up

    connection whenever a computer on my network attempts to access the

    Internet check box is selected provided you want to allow your computer toautomatically connect to the Internet.

  • 8/9/2019 Module Advanced Networking

    13/50

    Advanced Networking

    13

    While in Network Connections verify that the home adapter has been setup

    correctly.

    Host IP Addressing

    Addressing for the shared adapter on the ICS host is provided by the ISP, andcan be either static or dynamic. Internal addressing on the home adapter is

    static and ICS clients obtain IP addresses provided by ICS on the hostmachine.

    Client IP Addressing

    Clients obtain their IP addresses from the ICS host DHCP Allocator component.

    Ensure that when connected, the ICS client obtains an address in the192.168.0.x range, with a subnet mask of 255.255.255.0. Clients should alsoreceive a DNS server configuration from the host. When connected they should

    be configured to use the ICS host address (192.168.0.1) as their DNS Server

    address.

  • 8/9/2019 Module Advanced Networking

    14/50

    14

    Troubleshooting

    Although ICS is straightforward and simple in its presentation to the customer,

    there are areas where there may be problems.

    The first of these may occur if the ICS host is incorrectly configured, which cancause routing problems. One of the most common issues is where the user

    adds a default gateway setting to the internal network adapter. Since theadapter is set by ICS to a specific IP address of 192.168.0.1, this enables the

    default gateway configuration to be set, and many users seeing this believethat it must be configured, and may do so. This would be incorrect, though. In

    general, each computer on a network, no matter how many networkconnections, should have only one default gateway. In the case of an ICS host,

    that default gateway should be set on the shared connection, and on no otherconnection. Often, the shared connection is configured via DHCP, so no specific

    configuring is needed.

    To find out if this is the problem, the route print command can be used toview the route table. Also, the IPCONFIG /ALL command will show if more than

    one connection has a default gateway setting.

    The next issue can occur with applications run on client computers that connect

    to the Internet. If these applications expect to be directly connected to theInternet, especially if they assume that they have a valid IP address, their

    functionality might be impaired. Some applications, such as the RemoteAssistance application built into Windows XP, and games that use DirectPlay,

    have been taken into account for this issue, and use NAT traversal to assist in

    overcoming it.

    Finally, if a problem does come up, tracing can be enabled on the ICS host to

    determine where the problem is occurring. This can be configured by eitherusing the Netsh command or changing the registry to enable tracing on the

    IPNATHLP component. Netsh command is: Netsh ras set tracing ipnathlp

    enabled. The registry is located at:HKLM\Software\Microsoft\Tracing\IPNATHLP. If done by changing the registry,the computer must be rebooted for the tracing to begin. Enabling via the netsh

    command does not require a reboot.

    With Tracing enabled, a trace log file named IPNATHLP.LOG is created in the

    Windows\Tracing folder, which traces all packets that go through the ICS host

    very useful for troubleshooting.

    Troubleshooting Internet Connection Sharing involves three primary steps:

    Troubleshooting Internet Connectivity from the Host Machine Disable ICS and then test for connectivity to the Internet from the ICS

    host computer.

    If that is successful, enable ICS and test for connectivity again.

  • 8/9/2019 Module Advanced Networking

    15/50

    Advanced Networking

    15

    If the connection is lost once enabling ICS but home network connectivityis working, verify that the correct adapter has been shared.

    Troubleshooting ICS Client Configuration

    Once connectivity from the ICS host to the Internet has been established, thenext step is to check the configuration on the ICS client computers. The

    configuration settings on the client that must be checked are:

    TCP/IP should be configured so that Obtain an IP address automaticallyand Disable DNS are selected.

    Internet Explorer Connections should be set to Never dial a connection. Internet Explorer Connections LAN settings should have Use a proxy

    server disabled.

    Verify that the client machines can browse the Private network. Verify the Internet Connection Firewall is not enabled on the client

    machines.Note: On Windows XP SP2 computers, leave Windows Firewall enabled,

    but enable the Allow incoming echo request option in the ICMPSettings. This interface is available on the Advanced tab of the WindowsFirewall control panel interface.

    Troubleshooting Connectiv ity f rom the ICS Client to the Internet

    Test connectivity to the ICS host by pinging 192.168.0.1 from the client. If this succeeds, continue to the next step. If it fails, check for an addressing or physical connectivity issue.

    Try to open a Web page in IE by IP address. If this succeeds, continue to the next step. If it fails:

    Test connectivity to the same site on the ICS host.

    Check other sites by IP address.

    Check for local IE issues. Try to open a page by host name.

    If this succeeds, ICS is working properly. If this fails:

  • 8/9/2019 Module Advanced Networking

    16/50

    16

    Test on ICS host to eliminate DNS issue. Check DNS server address used on client.

    Once connectivity from the ICS host to the Internet has been established, thenext step is to check the configuration on the ICS client computers. The

    configuration settings on the client that must be checked are:

    TCP/IP should be configured so that Obtain an IP address automaticallyand Disable DNS are selected.

    Internet Explorer Connections should be set to Never dial a connection. Internet Explorer Connections LAN settings should have Use a proxy

    server disabled.

    Verify that the client machines can browse the Private network. Verify the Internet Connection Firewall is not enabled on the client

    machines.

    You can also assign a unique static IP address to the client machines in the

    range of 192.168.0.2 to 192.168.0.254. For example, you can assign thefollowing static IP address, subnet mask, and default gateway:

    IP Address 192.168.0.2 Subnet mask 255.255.255.0 Default gateway 192.168.0.1

    This configuration is only recommended for specific networking needs and fortesting connectivity issues. (Refer to KB article Q306126)

    Troubleshoot ing Connectiv ity f rom the ICS Client to the Internet

    Test connectivity to the ICS host by pinging 192.168.0.1 from the client.

    If this succeeds, continue to the next step. If it fails, check for an addressing or physical connectivity issue.

    Try to open a Web page in IE by IP address

    If this succeeds, continue to the next step If it fails:

    Test connectivity to the same site on the ICS host Check other sites by IP address

  • 8/9/2019 Module Advanced Networking

    17/50

    Advanced Networking

    17

    Check for local IE issues Try to open a page by host name If this succeeds, ICS is working properly

    If this fails: Test on ICS host to eliminate DNS issue Check DNS server address used on client

    Things to Remember

    With connectivity issues involving Internet Connection Sharing, it is important

    to narrow down the issue to the specific area that the problem resides. WithICS, not only may the problem be an application problem (like InternetExplorer), it could also be a network connectivity problem.

    Bridging is supported and detected by the Home Networking Wizard on mixednetworks in Windows XP. The wizard does not bridge a network adapter that is

    connected to an external DSL or cable modem.

    The Network Setup Wizard can only be run on computers running Windows 98,

    Windows 98SE, Windows Me, Windows XP Home Edition and Windows XP

    Professional. ICS only supports 5 client machines per Internet connection.

    Not all applications may be able to communicate through the ICS host without

    special configuration support from the manufacturer. If Web browsing from theICS client to the Internet is functioning, then ICS is working correctly.

  • 8/9/2019 Module Advanced Networking

    18/50

  • 8/9/2019 Module Advanced Networking

    19/50

    Advanced Networking

    19

    Bridge

    Network Bridge in Microsoft Windows XP provides an easy way to connectseveral network segments to make them appear as a single network. Allbridged adapters on the bridging computer appear as a single network

    interface to applications and protocols.

    Creating a Bridge

    Bridges are created by using two methods in Windows XP:

    By the Network Setup Wizard, when the selections indicate multiplenetwork interfaces are for the home network.

    Manual Creation.The result of either method is the same:

    Adapters participating in the bridge are grouped in the NetworkConnections folder.

    Limited properties available for bridged connections. Configures TCP/IP and Service bindings in the properties for the bridge.

    When you have created a bridge, the bridged connections are grouped in the

    Network Connections folder as shown below.

    Figure 5: Network Bridge

  • 8/9/2019 Module Advanced Networking

    20/50

    20

    Modification of the participating adapters is not recommended; therefore only

    limited properties are available, as shown below.

    Figure 6: Bridged Network Connection Properties

    Because the two connections have been bound together as one virtual network,

    properties such as the TCP/IP configuration must be set on the bridge using thebridge properties interface.

    Figure 7: Bridge Properties

  • 8/9/2019 Module Advanced Networking

    21/50

    Advanced Networking

    21

    In addition to the network configuration, the bridge properties also enable you

    to add or remove specific network connections from the bridge configuration,

    as shown in the Adapters portion of the interface above.

    If you need to modify individual network interface properties, press the Shiftkey, right-click, and select the properties for the interface.

    When troubleshooting a customers network issue, it can be useful to remove

    the bridge from the configuration until the underlying issue is resolved. To dothis, simply delete the Bridge in the Network Connections folder.

    Note:If you want to see how a bridge appears in the Windows XP Network

    Connections folder, create one yourself. If you only have one network adapter

    on the computer, install the Microsoft Loopback Adapter using the AddHardware wizard. This is a software-implemented network adapter that only

    connects to the local machine. Even though it doesnt connect you to another

    network, it does give you the ability to bridge this new network connection withyour existing NIC connection.

    Bridge Technology Overview

    The Bridge component interconnects network segments by forwarding framesfrom one segment to another. This appears to be transparent to the

    networking layers that are above Layer 2.

    Bridges in Windows XP are designed to simplify the setup and administration ofa multi-segment home network. The classic model of a multiple-segment IP

    network involves assigning each network segment a subnet number, correctly

    configuring hosts on each subnet, and configuring packet forwarding betweenthe subnets. Bridging the segments that comprise a home network simplifies

    the situation and the entire home network can be operated as a single IP

    subnet.

    The Windows XP Bridge driver binds to multiple network adapter drivers, and

    shows a single bridge connection in the Network Connections folder. Thiscauses all bridged network segments to appear as a single virtual network

    adapter. This is advantageous because the bridges behavior effectively

    combines the bridged network segments into a single logical segment andpresents only a single virtual interface to transport drivers. The single virtualinterface causes the network binding structure to reflect a logical arrangement

    of the network.

    For example, the TCP/IP driver expects to be able to associate each adapter

    with an IP subnet. When a single subnet number is shared by more than one

    adapter, TCP/IP behaves undesirably. It sends all outbound IP packets to thefirst shared-subnet adapter it was bound to in the absence of host-route entriesin the IP routing table. The bridges status as an intermediate driver solves this

    problem.

  • 8/9/2019 Module Advanced Networking

    22/50

    22

    Troubleshooting

    What should you do if you cannot create a bridge?

    Verify that the connections to be bridged are of a supported type, such asEthernet, HomePNA, or 802.11 Wireless.

    Verify need for the bridge and eliminate any potential topology issues. Verify if the bridge can be eliminated from the configuration. Verify if the network adapters are installed properly.

    What should you do if the bridge is not functioning properly after it is created?

    Verify that the interface configurations have not changed after the bridgewas created.

    Check documentation from the manufacturer to verify that all adapterssupport Promiscuous mode.

    If one or more adapter does not support promiscuous mode, test thebridge in Compatibility Mode.

  • 8/9/2019 Module Advanced Networking

    23/50

    Advanced Networking

    23

    Remote Desktop

    Remote Desktop provides the ability to gain access to and operate a remotecomputer. While this capability is based on Terminal Services, it providesfunctionality well beyond that of the Terminal Services provided by Windows

    2000.

    All Remote Desktop functionality is provided with Windows XP Professional. The

    XP Home Edition contains the client, but cannot serve as a host. RemoteDesktop is based upon Terminal Services technology. Only the keyboard input,mouse input, and display output data are transmitted over the network to the

    remote location. Remote Desktop hosting is available on Windows XPProfessional.

    Remote Desktop Features

    When you establish a Remote Desktop session, it becomes the only activesession on that machine. The remote console locks down, meaning that itdisables display of the session on the remote computer's monitor and disables

    input via the remote computer's keyboard and mouse. If a session is currentlyactive at the remote machine, the user will be prompted to relinquish control.The user can approve or deny the request.

    Unlike the 2000 Terminal Services, Remote Desktop can handle high screen

    resolutions and color depths. It will display in as many colors as the clientcomputer will support, up to 24-bit. While this capability is configurable by the

    client, and can be overridden by the remote host; it is handled automatically in

    most cases.

    Many of the new features of Remote Desktop are provided by Remote DesktopProtocol 5.1. Well detail those items later in the lesson.

    Remote Desktop Components

    The key components of Remote Desktop are its protocol RDP and its clients,Remote Desktop Connection and Remote Desktop Web Connection. Well take a

    closer look at each of them.

    Remote Desktop Protocol 5.1

    The capabilities of RDP 5.1 allow many improvements over the TerminalServices provided on Windows 2000. Resource redirection is the key to much ofthe improved functionality of a Remote Desktop session. For instance, the

    following features are available:

    Since your local file systems appear in the sessions Explorer views, filescan easily be transferred from one machine to the other.

  • 8/9/2019 Module Advanced Networking

    24/50

    24

    If you launch a program in the remote session that has audio output, thesound comes out of the clients speakers.

    If you are running an application that uses a serial port, like a bar-codereader, it will utilize the port on the client machine.

    If you print from a remote application, the default printer will be theclients default printer, so it will print where you are. If you copy data to the clipboard from the remote session, it can be

    pasted into the local session, or vice-versa.

    Client resources are available within a session:

    Remote Desktop Connection

    Remote Desktop Connection is a tool that allows your client computer to

    establish a Remote Desktop session with another computer running

    Windows XP Professional. These computers could be located anywhere,provided that they have network access from one to the other. The client usermust also have been granted permissions to remotely access the host

    computer.

    The Remote Desktop Connection tool is installed by default when you installWindows XP Professional or Home Edition. You can also install this tool

    manually on a computer running Windows 95, Windows 98, Windows NT, or

    Windows 2000 Professional. There is a utility on the Windows XP Pro CD thatinstalls the Remote Desktop Connection on these non-XP clients.

    Remote Desktop Connection connects a client computer to another computer

    running Windows XP Professional. Network access and appropriate permissionsare required. Remote Desktop Connection is configured by default in Windows

    XP Professional. It can be installed manually on computers running MicrosoftWindows 95, Windows 98, Windows NT, and Windows 2000 Professional. The

    clients for these operating systems are on the Windows XP Professional CD

    Remote Desktop Web Connection

    Users who travel can use Remote Desktop Web Connection to gain secureaccess to their primary workstation from any computer running Windows andMicrosoft Internet Explorer 4.0 or higher.

    Remote Desktop Web Connection can establish a Remote Desktop session witha remote computer, even if Remote Desktop Connection is not installed on the

    client computer. Remote Desktop Web Connection must be installed on a Web

    server with Internet Information Services and Active Server Pages enabled.

  • 8/9/2019 Module Advanced Networking

    25/50

    Advanced Networking

    25

    When a client establishes a connection by using a Remote Desktop Web

    Connection, the session traffic does not go through the web server that hosted

    the control. The session is established directly between the client and hostcomputers.

    Figure 8: Remote Desktop Connection

    Remote Desktop delivers virtually the same functionality as the Remote

    Desktop Connection, but over the Web. It is implemented by an ActiveX control

    embedded in a web pageno special client is needed, but TCP/IP is required. Itrequires Internet Information Server (IIS) and Active Server Pages (ASP) for

    hosting the control. The traffic does not route through the web server. Theremote session opens in a web page. With Remote Desktop Web Connection, a

    Terminal Services connection can be deployed by sending a URL.

    Remote Desktop vs. NetMeeting

    Traditional remote-control products, including NetMeeting, have what is known

    as "the janitor problem. This means that people can see your remotely-

    activated desktop at the office when you connect to it and unlock it from home.The Windows XP Remote Desktop actually disconnects your console when youconnect remotely, so all anyone sees when you're using the computer remotely

    is the log on screen. For that reason, when you're remotely connected, aperson can't walk up to your PC's console and take control of your session.Thus, Remote Desktop is more secure than NetMeeting because it prevents

    third party intervention and viewing.

    Remote Desktop is a console session, making the remote session the sole

    active point of control. NetMeeting uses joint control, leaving the hostcomputer accessible from the console. NetMeeting allows anyone near the

    machine to observe all activity

  • 8/9/2019 Module Advanced Networking

    26/50

    26

    Configuration and Use

    Remote Desktop is configured on the target computer the computer with the

    desktop you want to use remotely. Then, the client software is used to make aconnection to that computer.

    Enable Remote Desktop

    In Windows XP Professional, Remote Desktop access is enabled by a checkboxin the Remote tab of the System Properties dialogs. To enable Remote Desktop

    access to a computer running Windows XP Professional, you must haveadministrative privileges.

    On the Start Menu, right-click My Computer and select Properties. Click the Remote tab. In the Remote Desktop section, put a check in the box to allow users to

    connect remotely.

    Figure 9: Remote Tab in System Properties

  • 8/9/2019 Module Advanced Networking

    27/50

    Advanced Networking

    27

    When Remote Desktop is enabled, a warning appears as shown below. This

    notifies the administrator that users with null passwords will be unable to

    connect remotely. This behavior is universal in Windows XP and is explained ingreater detail in the Security lessons of this training. The dialog also points outthat Remote Desktop may be blocked by firewalls or other intermediary

    software or devices.

    Figure 10: Remote Sessions Warning

    To set permission for remote access, press the Select Remote Users button.

    Note the warning that remote users must have passwords and that firewallsmay block Remote Desktop access.

    Figure 11: Add Remote Desktop Users

    Assigning Remote Desktop Rights

    For a user to establish a Remote Desktop connection with a Windows XP

    Professional machine, the right to do so must be granted. The following series

    of dialogs provides a mechanism for viewing, adding, or removing users fromthe Remote Desktop access list.

  • 8/9/2019 Module Advanced Networking

    28/50

    28

    Configuring a Client Connection

    Now that we have enabled Remote Desktop and granted access rights to users,we need to configure a client to make a connection to it.

    From a Windows XP Professional or Home Edition machine, the RemoteDesktop Connection tool is located in the communications group in the Start

    menu structure.

    The initial dialog that it opens is all that is needed to launch a Remote Desktop

    Connection. Entering the remote machine name, the authorized username, and

    pressing Connect is all that is necessary.

    Launch the Remote Desktop Connection tool by selecting: Start > All Programs> Accessories > Communications > Remote Desktop Connection. In the dialog,

    enter the Remote Computer Name and an authorized username.

    Figure 12: Establish a Client Session

    Click the Connect button to establish the session. The next section examines

    the additional settings available via the Options button.

  • 8/9/2019 Module Advanced Networking

    29/50

    Advanced Networking

    29

    Connection Configuration General

    The General tab is used for creating a quick method of launching a specific or

    customized Remote Desktop Connection. By entering the Remote machinename and the authorized username, then pressing Save As, the connection canbe launched in the future by double-clicking an icon. This approach is most

    convenient f or frequently used connections.

    Figure 13: Remote Connection General Tab

    On this tab you can enter the computer and user information as before, butalso add the domain and password of the user. This tab also allows you to savethe connection settings as an RDP file, much like a dial-up connectoid. The

    Open button allows modification of a previously saved connection

  • 8/9/2019 Module Advanced Networking

    30/50

    30

    Connection Configuration Display

    The Display tab can be used to specify the color depth and screen resolution of

    the Remote Desktop. Although Remote Desktop can auto-detect and configurethese settings, customization for special circumstances or applications may beappropriate. The default is full screen and 24-bit color, or the color depth of the

    client, which ever is lower.

    Figure 14: Remote Connection Display Tab

    This tab allows you to specify the display settings for the session, including:

    The initial screen size for the session The color depth for the session

    At the bottom there is a check box to enable or disable the connection bar. This

    bar provides window controls for the full screen session. The controls can be

    used to minimize, maximize, restore, or close the Remote Desktop window.The connection bar provides controls similar to a window title bar. This is

    necessary since there are no such controls on the desktop.

  • 8/9/2019 Module Advanced Networking

    31/50

    Advanced Networking

    31

    Configuration Local Resources Tab

    The Local Resources tab controls aspects of the interaction between the

    Remote Desktop and the local machine.

    Figure 15: Remote Connection Local Resour ces Tab

    The following resources can be configured on this tab:

    Sounds can be played on the remote speakers, the client speakers, or notat all. The Windows shortcut key combinations, such as Alt-Tab can be applied

    to the remote machine, the local machine, or to the remote machine only

    when the Remote Desktop is full-screen.

    The ability to have a remote session print to a clients printer has obviousbenefits, but the option to have it print in the remote location can be

    configured here.

  • 8/9/2019 Module Advanced Networking

    32/50

    32

    Connection Configuration Programs

    The Programs tab is especially useful when configuring a connection in order to

    repeatedly perform a specific function. This could be running a report orchecking mail. This option relieves the user of navigating the remote UI tolaunch the application each time. This tab allows you to configure a specific

    program to be launched at the start of the session.

    Figure 16: Remote Connection P rograms Tab

  • 8/9/2019 Module Advanced Networking

    33/50

    Advanced Networking

    33

    Configuration Experience Tab

    The Experience tab is used to reduce the visual data that is transmitted overthe connection. The selection of a specific connection speed changes the visualsthat will be transmitted, optimizing the balance of performance and aesthetics.

    Manually selecting an item may trigger the settings to be shown as Custom.Care should be taken with specifying a speed higher than actual as seriousperformance degradation could result.

    Figure 17: Remote Connection Experience Tab

    This tab allows you to configure a number of settings which will affect theperformance of the session. Select the connection speed from the dropdown

    box, which changes the on/off defaults for the following settings:

    Desktop Background Dragging full windows Menu and window animation Themes Bitmap caching

    Save the Connection

    After changing any of the settings in these five dialogs, remember to go backto the General tab and save the connection. Failure to do so will force you tomake the changes each time you establish the connection.

  • 8/9/2019 Module Advanced Networking

    34/50

    34

    Remote Desktop Web Connection

    In addition to the Remote Desktop Connection software included with WindowsXP, there is a web-based option. This option is called the Remote Desktop Web

    Connection.

    Like the regular client, this software creates a connection to the Remote

    Desktop host using TCP port 3389. The only difference is that you do not needto have the full client installed on the client computer. You simply connect to aweb page that loads the Remote Desktop Web Connection ActiveX control, and

    can then logon to the Remote Desktop computer.

    Benefits

    Following are a few benefits of the Remote Desktop Web Connection.

    Users who are away from their computers can use Remote Desktop WebConnection to gain secure access to their primary workstation or favorite

    Terminal Server from any computer running Windows and Internet

    Explorer.

    With Remote Desktop Web Connection, deploying a connection can be aseasy as sending a URL.

    The Remote Desktop Web Connection is targeted at a lowest commondenominator cross platform system. Remote Desktop Web Connectioncan also meet the needs of organizations that want identical clients on all

    platforms, thus reducing the total cost of ownership

    The delivery of extranet applications is also now possible with the RemoteDesktop Web Connection. Corporations that want to deploy Terminal

    Server to serve up a set of applications using the Remote Desktop Webconnections to their vendors, suppliers, can now do so easily,

    inexpensively, and efficiently over the Internet.

    Installation

    The Remote Desktop Web Connection can be downloaded from the following

    location to install on a web server:http://www.microsoft.com/windowsxp/downloads/tools/rdwebconn.mspx

    See that web page for information on installing the software.

  • 8/9/2019 Module Advanced Networking

    35/50

    Advanced Networking

    35

    Remote Desktop and Remote Assistance Compared

    Microsoft Windows XP includes both Remote Desktop and Remote

    Assistance. They are similar in appearance, but quite different inimplementation and intent. This lesson will illuminate the differences.

    In many ways, Remote Desktop and Remote Assistance are very much alike.

    They are both capable of providing a remote control session for a computer fora user who is not at the physical location of the machine.. They are both built

    on the Terminal Services architecture. They both require permission toestablish a session, and either session type can be terminated from either

    machine. Despite all those similarities, they are quite different.

    Intended Purpose and Audience

    Remote Desktop is targeted at a user who has a desktop machine containinghis applications and data files. Remote Desktop allows him to connect from a

    variety of remote locations and operate the machine as if he were there.Remote Desktop is designed for potential every day use.

    Remote Assistance is targeted at a user who needs assistance from a support

    organization or friend. This may be for resolving a problem, or demonstrating atechnique. It is likely to be used only infrequently.

    Remote Desktop

    Remote Desktop is designed for frequent accesses by an individual orsmall group of users.

    Remote Desktop is generally designed for a user to remotely operatehis/her own machine from another location.

    Remote Desktop and Remote Assistance are available on Windows XPProfessional.

    Remote Assistance

    Remote Assistance is intended for one-time or infrequent access fortroubleshooting and resolving a problem, or demonstrating a technique.

    Remote Assistance is intended for a helpdesk, friend, or other supportperson to access the machine of an end-user.

    Remote Assistance is available on the Windows XP Home Edition

  • 8/9/2019 Module Advanced Networking

    36/50

    36

    Troubleshooting

    Issues with Remote Desktop fall into three basic categories.

    The inability to establish a Remote Desktop Connection under somecircumstances.

    Unexpected reduction of display resolution or visual quality. Poor performance during a Remote Desktop session.

    We will cover each of these areas.

    Connectivity Issues with RDC

    Remote Desktop Connectivity failures largely fall into two categories:

    The inability to connect due to incomplete configuration The inability to connect due to specific network configurations

    General Connectivity Points

    When a Remote Desktop Connection fails, you must first check to make sure

    the basics have been addressed. Windows XP Professional machines do notaccept remote connections by default. They must be enabled by anadministrator via the remote tab of System Properties.

    Local administrators have access rights by default. All others must be granted

    remote access privileges. This can also be done via the remote tab of system

    properties. Remember that all external connections to Windows XP machinesare blocked if the user does not have a password.

    RDC Connectivity behind NATs

    Remote Desktop Connections are established by specifying the machine nameor the IP address of the remote computer. If the remote machine is behind a

    NAT, its machine name is not exposed on the public side of the NAT. Its IP

    address is similarly inaccessible, since the NAT uses its own external IP addressto handle the communication on the public side. This situation is notinsurmountable, but special configuration will be required to make it work.

    A machine behind a NAT router or ICS cannot participate in an inbound Remote

    Desktop connection without special accommodations. The NAT, by default, willnot traverse public to private address for inbound connections. The NAT, by

    default, will not pass or forward traffic on port 3389 (used by Terminal Servicesand Remote Desktop)

  • 8/9/2019 Module Advanced Networking

    37/50

    Advanced Networking

    37

    NAT Variants

    There are several types of NATs that may be encountered and each requires adifferent process to troubleshoot failures. Each accepts Internet-boundcommunication from its clients then uses its own IP address to communicate on

    the public, or Internet side. The NAT tracks the communications, and sends the

    return responses to the appropriate client. This allows multiple machines to use

    a single external connection, and provides a measure of anonymity to theclients. The most frequently encountered NAT types are:

    Internet Connection Sharing, or ICS, which is a simple NAT NAT enabled on a multi-homed server PC, such as Windows 2000 Server NAT implemented by hardware

    RDC behind ICS

    The best resolution in the ICS case is to establish a Remote DesktopConnection to the ICS machine, which is exposed on the public side. From

    within that session, a Remote Desktop Connection can then be made to thetarget machine. There is some additional overhead in this approach, but itaddresses the issue with a supported method.

    RDC behind a PC NAT

    There are two possible workarounds when the remote machine is behind a PCNAT.

    The first is basically identical to the ICS workaround. Establish a RemoteDesktop Connection or Terminal Server Connection to the NAT machine which

    is exposed on the public side. From within that session, a Remote DesktopConnection can then be made to the target machine. The same additional

    overhead as the ICS case will somewhat limit performance.

    The second possibility is to use the NAT configuration tools to forwardcommunication on port 3389 to Machine A, then make the Remote Desktop

    connection to the external IP address of the NAT router. The session

    communication will be automatically forwarded to Machine A.

    Figure 18: RDC Behind a PC NAT

  • 8/9/2019 Module Advanced Networking

    38/50

    38

    With this workaround, all Remote Desktop Connections from outside the NAT to

    machines behind the NAT will be limited to Machine A, so Machine B in the

    diagram could never receive a Remote Desktop connection.

    Note: If a remote (Terminal Server or Remote Desktop) computer isconfigured to use a port other than 3389, the appropriate port can be specified

    in the Remote Desktop Connection. In the Computer field, follow the machinename with a colon and the port (e.g. Servername:3390).

    RDC Behind a Hardware NAT

    Hardware NAT routers have become popular due to their low cost and virtuallyautomatic configuration in many instances.

    The only option with a hardware NAT is the same as workaround 2 in theprevious case. Use the NAT configuration tools to forward communication on

    port 3389 to Machine A, then make the Remote Desktop connection to theexternal IP address of the NAT router. The session communication will be

    automatically forwarded to Machine A.

    Figure 19: RDC behind a Hardware NAT

    Again, with this workaround, all (port 3389) Remote Desktop Connections fromoutside the NAT to machines behind the NAT will be limited to Machine A.

    Visual Issues in RDC Sessions

    Visual issues may be encountered with Remote Desktop. A Remote Desktopconnection uses the display resolution and color depth specified in the

    connection, or the current settings on the machines involved, whichever islowest.

    Trying to transmit a 32-bit desktop wallpaper at a lower color depth can result

    in poor appearance. Disabling the transmission of the desktop background isthe easiest resolution.

  • 8/9/2019 Module Advanced Networking

    39/50

    Advanced Networking

    39

    Feature Issues in RDC Sessions

    When connecting from a machine other than Windows XP, you will be unable toredirect disk drives, redirect audio, use color depths above 256, redirectnetwork printers, or cache logon credentials.

    Important: Only those features listed in the Remote Desktop Connectiondialogs are available over Remote Desktop. There are Windows XP features

    that are not available, such as ClearType or MIDI audio, primarily forperformance reasons.

    Performance Issues with RDC

    When using the Remote Desktop Connection, after the screen is initially drawn,

    the server only sends changes on the display to the client. High resolutions andcolor depths require more information to draw the screen. Animation requiresconstant updates to be sent to the client. Using images as wallpaper also

    effects performance because as items are moved on the desktop parts of the

    wallpaper image must be resent to the client. Viewing web pages withanimation will also degrade performance due to increased screen update

    requirements.

    If the client is connecting over a dial-up connection, but the connection isconfigured as LAN, the additional default feature inclusion will result in very

    poor performance.

    Resolution for Performance Issues

    Resolving performance issues with Remote Desktop is generally a matter ofdisabling bandwidth-consuming features until the performance reaches

    acceptable levels. To access the Remote Desktop Connection dialog box, click

    Start > All Programs > Accessories > Communications > Remote DesktopConnection

    The Experience tab has a connection speed setting that automatically changes

    the visuals transmitted during the session. Make sure the connection speed isset to the actual speed, or lower. Using the Custom setting and manuallydisabling features may be appropriate.

    On the Display tab, consider reducing screen resolution and color depth. On the Local Resources tab, turn off audio redirection if it is not needed

    for the task being performed.

  • 8/9/2019 Module Advanced Networking

    40/50

    40

  • 8/9/2019 Module Advanced Networking

    41/50

    Advanced Networking

    41

    VPN

    Virtual Private Networking (VPN) offers affordable, secure access for home andsmall offices operating over any networking technology over which IP packetscan be sent.

    VPN Connection

    A VPN is a simulated private network that has links across shared or public

    networks, such as the Internet or a corporate network. Although VPNconnections go through these public networks, their data is encapsulated and

    secured while crossing these shared paths.

    Figu re 20: Create VPN

  • 8/9/2019 Module Advanced Networking

    42/50

    42

    VPN Configuration

    To configure a VPN client connection, right click the icon and choose Properties.

    Figure 21: VPN Configuration

  • 8/9/2019 Module Advanced Networking

    43/50

    Advanced Networking

    43

    Incoming VPN Connections

    In addition to acting as a VPN Client, Windows XP Professional Edition can act

    as a VPN server, accepting incoming VPN connections for connectivity to ahome network.

    To allow incoming connections on a Windows XP computer, use the New

    Connection Wizard to create an incoming connection icon. The wizard, ofcourse, can be run from the Network Connections folder. You can access it

    from the Control Panel, click Network and Internet Connections, and then clickthe Network Connections control panel icon. To launch the New Connection

    Wizard, click the Create a new connection link under Network Tasks.

    The first screen of the wizard is an introductory one; click Next to create anincoming connection icon; choose Set up an advanced Connection, and clickNext. The wizard gives two choices, to Accept incoming connections or to

    Connect directly to another computer. Choose the first option and click Next.

    The next screen allows you choose which devices will allow incoming

    connections. You can do it with Direct connections via a parallel port or by a

    serial port or you can choose a modem if you have one. If you have an infraredport, that will be listed here as well. You can also choose to configure the

    properties of these devices at this point. Clicking Next, you are promptedwhether you want to allow virtual private connections to this computer. Choose

    to allow it and click Next.

    The next screen lists the users that are configured on this computer. You cancheck the boxes of the users that you want to allow to connect to this box. At

    this point, you can also configure the properties of some of these users

    changing their passwords. You can configure the call back options, which allows

    the user to call in to this computer. They will then be disconnected and thiscomputer can then call them back at a specific call back number or at a

    number that a caller specifies. This will help to save toll charges for the user.

    Clicking Next goes to the Networking Software screen. Here, you can enable or

    disable the items that you want to be used for this connection. For example,the Internet Protocol (TCP/IP), File and Printer Sharing, Client for Microsoft

    Networks. From here, you can also configure the properties of these items. Forexample, with Internet Protocol (TCP/IP), you can specify to either assign IP

    addresses to the people calling in using a DHCP server on the network or you

    can specify a set of IP addresses that will be assigned to these users. You canalso check to allow the calling computer to specify its own IP address. Once

    these items are selected, click Next. You get a summary screen and then you

    can click Finish.

  • 8/9/2019 Module Advanced Networking

    44/50

    44

    You now have an incoming connections icon. The Properties dialog has three

    tabs: General, Users and Networking.

    Figure 22: Configure Incoming Connection

    The General tab provides some of the same options that available during thewizard. You can choose which devices to allow incoming connections on and

    you can configure the properties of these devices. You can also choose to allow

    VPN connections by checking or un-checking the box or you can check the iconat the bottom of the dialog box, which will show an icon in the NotificationArea, or System Tray, when this connection is alive.

    The Users screen for incoming connections allows you to select which users will

    be allowed to connect to this machine. Again, you can change the properties of

    this user or you can create a new user at this point from this screen, giving auser name, full name and a password for that user. You also have two otheroptions down here. The first of which will require all users to secure their

    passwords and data and the other which will always allow directly connected

    devices, such as Palm Talk computers, to connect without providing apassword.

    Finally, on the Networking tab you can select which network components to

    enable or disable by checking the box. You can configure the properties ofthose items or install new items, clients, services or other protocols.

  • 8/9/2019 Module Advanced Networking

    45/50

    Advanced Networking

    45

    Configuring Direct Connections

    To configure Direct connections, right-click the icon created by the New

    Connection Wizard and choose Properties. These configuration options areexplored in the accompanying demonstration. Please view this demonstrationnow.

    Figure 23: Configure Direct connection

  • 8/9/2019 Module Advanced Networking

    46/50

    46

    Troubleshooting

    Troubleshooting for VPN connections involves the following components:

    Client VPN Connection Configuration Network Connectivity Support for PPTP Traffic on the Connection Server VPN Configuration

    The following sections provide guidance on specific troubleshooting steps forisolating each of these components of the VPN configuration.

    The steps below assume a Point to Point Tunneling Protocol (PPTP) VPN, which

    is the type of VPN server provided by Windows XP Professional. If the customer

    is using an alternate type of VPN (Layer 2 Tunneling Protocol L2TP), or usingthird party VPN client software, only the first two troubleshooting processesapply. This is because there are different requirements for PPTP and L2TP.

    Client VPN Connection Configuration

    Start your troubleshooting by checking that the Network Connection on the

    client computer has the correct information for the server name and protocol

    the default is PPTP, which is the type of VPN server provided by Windows XPProfessional.

    As a test, create a new network connection for the VPN and test. Note any

    error messages and use the Knowledge Base for further troubleshooting.

    Network Connectiv ityOnce you have determined that the connection is set up properly on the client,

    test basic connectivity between the client and server using ping. Resolve any

    connectivity issues before continuing with further troubleshooting.

    Support fo r PPTP Traffic on the Connection

    The Windows XP Support Tools provide two tools for verifying PPTP connectivity

    requirements are in place:

    pptpsrv.exe: acts as a server to verify the two types of network trafficfrom the client can be received.

    pptpclnt.exe: acts as a test client for the above tool.Note that these two tools do not establish a VPN connection they just verify

    that the two computers can pass the right types of traffic for a PPTP VPN

    connection to succeed. PPTP uses TCP port 1723 and that GRE 47 packets.

    Also note that if the connection uses L2TP or third party VPN software, you willneed to collaborate with the support organization for the VPN server software

    to troubleshoot further. The following steps do not apply.

  • 8/9/2019 Module Advanced Networking

    47/50

    Advanced Networking

    47

    To use these tools for troubleshooting:

    1. Install the Windows XP Support Tools on both computers. Theinstallation is done using \Support\Tools\Suptools.msi on the Windows

    XP CD ROM.

    2. First, disable the Incoming Connection on the Windows XP Professionalcomputer which is acting as the server. This ensures that the utility canbind to the right port.

    3. Next, open a CMD window on the server computer and run the pptpsrvcommand.

    4. Then open a CMD window on the client and run the command: pptpclnt, replacing with the computer name orIP address of the server computer.

    5. Watch the prompts on both computers, noting the results.a. If the connection succeeds, this means the network or Internet

    connections support the right kind of traffic for a PPTP VPNconnection to succeed.

    b. If the connection fails, but you dont see any indication of why itfails on the server, troubleshoot basic connectivity.

    c. If you receive the following error message, this indicates a nameresolution problem. Test using the IP address of the server with the

    pptpclnt command:

    Error 11001 getting Host information:WSAHOST_NOT_FOUND: Host not found

    d. If the initial connection succeeds, but there is an indication of aproblem with the kind of traffic received, use the informationreturned to troubleshoot the connection.

    This last type of failure indicates that a firewall or router between thecomputers is likely not passing the type of traffic required to establish the

    connection. If the two computers are on home networks, consider the

    following:

    Check the configuration and documentation for any routers in use at theedge of the home networks. You may need to recommend that thecustomer check the configuration of the routers, and configure them to

    pass VPN traffic. Configuration for TCP 1723 passthrough isstraightforward, but it is less common to have an option for GRE 47. In

    most cases home routers enable this when you choose to allow VPNtraffic.

    Try connecting each computer directly to the Internet rather than througha router as a test. Before doing this, verify the computers are configuredwith a software firewall.

  • 8/9/2019 Module Advanced Networking

    48/50

    48

    If third party firewall software is in use, consider disabling that protectionand testing with the Windows XP firewall, either Internet Connection

    Firewall or Windows Firewall, depending on the service pack level of thecomputer.

    Server VPN Configuration

    If the previous test is successful, this means that connectivity and firewalls arenot the problem. It is more likely that the server is misconfigured in some way.

    If the server is a Windows XP Professional computer, delete the IncomingConnection icon in the Network Connections Folder and go through the Create

    New Connection wizard to create a new VPN connection.

    If the server is another type, consult with the support organization for that

    operating system or device for further assistance.

  • 8/9/2019 Module Advanced Networking

    49/50

    Advanced Networking

    49

    Windows Messenger

    Windows Messenger is an Instant Messaging client that includes real timecommunications tools for Instant Messaging to other Internet users, voice andvideo communication, and online collaboration. It is installed by default on

    Windows XP Home edition and Windows XP Professional edition. WindowsMessenger is comparable to version 4.0 of MSN Messenger.

    Because MSN Messenger has been updated several times with new featuresand functionality, it is the recommended Instant Messaging client for homeusers.

    For this reason, this document focuses only on a few key elements of WindowsMessenger that could impact support.

    Login Issues

    Failures with logon to the Passport service are a top support issue. Forinformation on resolving these issues, see the following Knowledge Base

    article:

    Common Solutions for Windows Messenger Account Logon Problems (307294)

    Audio/Video Conferencing Considerations

    There are some hardware requirements for conferencing in Windows

    Messenger. Typically, audio capabilities are considered a minimum requirement

    for a conference, while video is always optional.

    Audio requirements:Both parties should have a full duplex sound card and one of the following:

    PC speakers and an external microphone plugged into the sound card Audio headset with microphone that plugs into the sound card Soundcards on the Windows XP HCL will work with Windows Messenger

    audio conferencing.

    Video requirements:

    For video conferencing, one or both parties need a supported videocapture device such as a USB webcam.

    Audio and Video Tuning Wizard

    The Audio Tuning Wizard will launch the first time you attempt to establish and

    audio session with another contact. Additionally, the wizard can be launched atany time by selecting Audio and Video Tuning Wizard from the Tools menu.

  • 8/9/2019 Module Advanced Networking

    50/50

    Before launching the wizard, you should make sure all programs that utilize

    A/V devices are closed. Also, make sure any cameras, speakers, and

    microphones are properly plugged-in and powered on. The wizard helps theuser configure the following:

    Selection of microphone or speaker device (sound card) Use of speakers/microphone vs. headset Speaker volume calibration Microphone volume calibration Video device selection

    Note:

    Any time you change the configuration of the A/V system, the Audio and VideoWizard should be re-run. For example, if you specify that you are using a

    headset, AEC will be disabled to conserve system resources. If you switch, to aspeaker/microphone setup, re-run the wizard to enable AEC and recalibrate thevolume.


Recommended