Tag: Virtual Private Network

Azure OpenVPN Support

OpenVPN support in Azure VPN gateways

Today, the Azure networking team announced the General Availability (GA) of OpenVPN protocol in Azure VPN gateways for P2S connectivity. OpenVPN is an open-source software that implements a virtual private network (VPN) connectivity. Since OpenVPN is widely used in the industry, a lot of devices already have an OpenVPN client built-in. OpenVPN support for Azure VPN gateways should make it easy to set up new VPN connectivity to Azure virtual networks.

To use OpenVPN, you can now just simply select the tunnel type OpenVPN. You can find more information about how to set up an Azure VPN gateway on here.

We are announcing General Availability (GA) of OpenVPN protocol in Azure VPN gateways for P2S connectivity. OpenVPN is a popular open source VPN protocol supported in all major platforms (Windows, macOSX, Linux, Android) and available pre-installed on several WiFi routers and IOT devices. Adding OpenVPN protocol to Azure P2S VPN greatly expands our client footprint for TLS/SSL-based VPN customers and ecosystem.

– Ali Zaman, Senior Program Manager at Microsoft

To enable OpenVPN on your gateway you can run the following Azure PowerShell commands. Make sure that the gateway is already configured for point-to-site (IKEv2 or SSTP) before running the following commands:

$gw = Get-AzVirtualNetworkGateway -ResourceGroupName $rgname -name $name
Set-AzVirtualNetworkGateway -VirtualNetworkGateway $gw -VpnClientProtocol OpenVPN

You can find more information about OpenVPN support in Azure on Microsoft Docs:

Next to the Windows Server Azure Network Adapter, which allowed you to configure P2S VPN for Windows Server directly from Windows Admin Center, this is another step to make connectivity to Azure even easier. If you have any questions, please let me know in the comments.

If you want to learn more about Azure networking in general, check out the recording from my Microsoft Ignite The Tour session in Amsterdam, where I was speaking about the basics of building a Hybrid Connectivity with Microsoft Azure.



How to Install VPN on Windows Server 2008 R2

This HowTo should show you how to install a VPN Server on Windows Server 2008 R2. This is a HowTo for a small environment or a stand-alone hosted Server.

  1. Install the Role “Network Policy and Access Services” with the Server Manager
    Install Role Network policy and Access ServicesInstall Role Network policy and Access Services
  2. Select the Role Services “Routing and Remote Access Services”
    Install Role Network policy and Access ServicesInstall Role Network policy and Access Services
  3. Configure and Enable Routing and Remote Access in the Server Manager.
    Configure and Enable Routing and Remote AccessConfigure and Enable Routing and Remote Access
  4. Choose “Custom Configuration” if you just have one Network Interface in the Server
    Custom Configuration
  5. Choose “VPN access”
    VPN access
  6. Finish and click next
    VPN accessVPN access
  7. Allow access for users “Network Access Permission”. You can set that in de Dial-In Tab under the User Premission.
    User Permission Dial-In Access
  8. Open Ports in your FirewallFor PPTP: 1723 TCP 47 GRE
    For L2TP over IPSEC: 1701 TCP 500 UDP
    For  SSTP: 443 TCP

Optional: If you don’t have a DHCP Server in your local network you have to add a static address pool. This could be if you have a stand-alone Server by your provider.

  1. Right click on “Routing and Remote Access” and open Properties
    Add Static address pool
  2. Click on the IPv4 Tab and check “Static address pool”
    Add Static address pool
  3. Add a static address pool of private IP addresses
    Add Static address pool
  4. Add secondary IP Address to the Server network interface which is in the same subnet as this pool.

I also have other posts for about installing VPN on Windows Server: